NFO={0x1c, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0x4}}}]}, 0x3c}}, 0x0) [ 238.291177][T12825] FAT-fs (loop2): invalid media value (0x00) [ 238.307655][T12825] FAT-fs (loop2): Can't find a valid FAT filesystem 05:27:49 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270", 0x14}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000100)='./file0\x00', 0x0) creat(&(0x7f0000000280)='./bus\x00', 0x4000000000002) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000140), 0xffffff35) 05:27:49 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x802) r1 = dup(r0) write$FUSE_ATTR(r1, &(0x7f0000000080)={0x78}, 0x78) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x227d, &(0x7f0000000040)) 05:27:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dc3f0512a611547bf070") syz_emit_ethernet(0x76, &(0x7f0000000100)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x70}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x6, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x689, 0x0, @local, @dev, {[@timestamp={0x44, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 05:27:49 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000740)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, 0x0) 05:27:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x3c, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0x4}}}]}, 0x3c}}, 0x0) [ 238.671138][T12848] FAT-fs (loop2): invalid media value (0x00) [ 238.679871][T12848] FAT-fs (loop2): Can't find a valid FAT filesystem 05:27:49 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:27:49 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x802) r1 = dup(r0) write$FUSE_ATTR(r1, &(0x7f0000000080)={0x78}, 0x78) ioctl$SG_GET_NUM_WAITING(r1, 0x227d, 0x0) 05:27:49 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x3c, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0x4}}}]}, 0x3c}}, 0x0) 05:27:49 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000740)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, 0x0) 05:27:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dc3f0512a611547bf070") syz_emit_ethernet(0x76, &(0x7f0000000100)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x70}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x6, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x689, 0x0, @local, @dev, {[@timestamp={0x44, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 05:27:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x3c, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0x4}}}]}, 0x3c}}, 0x0) 05:27:50 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x802) r1 = dup(r0) write$FUSE_ATTR(r1, &(0x7f0000000080)={0x78}, 0x78) ioctl$SG_GET_NUM_WAITING(r1, 0x227d, 0x0) 05:27:50 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000100)='./file0\x00', 0x0) creat(&(0x7f0000000280)='./bus\x00', 0x4000000000002) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000140), 0xffffff35) 05:27:50 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000740)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000300)) 05:27:50 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:27:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dc3f0512a611547bf070") syz_emit_ethernet(0x7a, &(0x7f0000000100)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x70}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x6, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x689, 0x0, @local, @dev, {[@timestamp={0x44, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 05:27:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x3c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0x4}}}]}, 0x3c}}, 0x0) 05:27:50 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x0, 0x802) r1 = dup(r0) write$FUSE_ATTR(r1, &(0x7f0000000080)={0x78}, 0x78) ioctl$SG_GET_NUM_WAITING(r1, 0x227d, 0x0) 05:27:50 executing program 4: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) memfd_create(0x0, 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(0xffffffffffffffff, 0x40485404, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) dup(0xffffffffffffffff) write$evdev(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r2) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x132224) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000002900)=[{&(0x7f0000001800)="af25b72eeb4f466a7258755dfcd7f514f48e1880efec2f6a0cd9c0324ec930178b0f905c91a46b2b5c43f162f8721f504c42427627e6d65c3d05d5391eead3e646d4cb9d45738e463490a1f17647dd171c2f5b78eb0ef7f561c13222ddfd341061650b958076855bf9e597599968d80b5b26a285f87263505e7756e4111b76d6f0f1d93fd13c3dbb9161175b193a84335ea90d21ceb184469df3aea2dec5768ed8754816cb079ad0b6df2b845e1e1920cc4c88bd77df1fe2789fe22d9288da3a71ce2762c579ccb6263d4c619f55d7642e0d57b853fc51145a16b26ea8f59508fc0afeb512dc8a9d4bb3936c3d8093c4a16cd30c9f5ab64b8bf219e72dec7ee78ac275ac08bbe401a5b6f57f9db9dbf0221ca76eb3fa0af9efad80860fe9c6138938c63ddfb1f9a7d2056db51f363d8a61a1045f2545cf7f3b5c9118b1c52ce720d0da973de60e5f82544ba93134787933bfba957b362f72b58ac056ff5ab728fcc1791b3f72b73aa99b5266a7a70c4e35de2c70fb98a21a4030a46567ee9df6a5a66ac1039f1a722384be184ac1b2a4fa27076f3f22007f6d63f057d526a230fe78b8c3dfe4c6fe13ee0c4965dc5e28f614ac05b8b501e006da67940165a5fda7ffa5e912b3595254c8118cf4cad25fab6aa36e0f0c3902ad00bbec8119a08de192445c7aa9c2e03aaae024ce87a51c4de99076569939dda1c4be0fa82f3a0e6ddf1727f78ad8861d19e40d82570e0dd739dab98d9275ffb834736c16608e537324ccee87f90ce4ae68673c59382287bcc3dec3a70a3862227894fd355d6e1d69a3dfb48001b3bee5af069bc87d14f44ed5d37518a6e3d2a7b4c0cd1d1440289eebeea5e4c2a0a1cb2be8bd2df46facb7144168076eddc41469cea02fd8bf985dc63abe1467c3ff5e32939dd7873eea38e71d92a8d9fc5877f8bedc021da7f878c6c54de3cd6835100e55669fb23dbf5f59f1a3d2d7da28bf4511e9469aedbf8d01a92d7c3e11fac59e3400fdda7100244a859e5b7604b7caabad22a76ba0c25085aa74ab4dc7ca64c55cd526064cfe37eeb4120dffef5fd3e84dbfea45167e9295005b7ef16aefbccd491c2dc250065bf69c8e06166c5125004776955d9180dbff9ba03359499b3d059613c1eec5bd60cbdc1febd90d66fb61d61032ee411e92bb79f19f32a78315b6e5d17dc9210f8a3cb07f0f364d3fb0fe96338846649eb6c381dc31fda788889c345d87f90562444659a1a0eebb904f4bb1f8a6f408f8e47d52211a0115afca821fedd76d63203a62256004e4e6fe5bef4a4463046f5eba137e5b78b7387eacc2a1ef117b96dbb8325b408413401dc0d16554c157db3980d8743115891183c411abb99153e8239eba72a5c51f59522b6a049cee9bd016a78e0c893d76e8283c88c3f7e3590f9bea58f5e996accd352e541c31fbc8364b77efb193f7d3fd024de032b39c486d0c923f9bb8107fd170ca23614b82d3c0f70600dfaf426069c119368c3c4167bc3dea7f6dabac6c5cf69bf8f1182c617ba64fa52757c9aeb94811dc85a598d70b8e082232d08bd90f4948d4c58e00b8d78fefa163a70ae8bd6a59940c198a96543cd7917c0f6ea6fc5fbcfc094abe164c79871135e09bacd369f8b7880b30c87bc4bcc341fa2b526338285e80544a468accc31a16a561b7a2cbae618b12c177f9be338d8997015b89e0336d90bf0452a335c6a6d7400324b40b48a88e92493003924ec2417c9ff34e26ed92b2db9151ec46e9d879860c891eb784be08dc242d8509fec420b4623ace5f21fa64c6148b528761afa5d8b6ffe1dd4383bbbce4388796a46992836ad1fcbc485ec9794d8a08fb0e3b6c18f62279970ffe245f26f4d3e4428c9e3b254618336cc75833a7e22a0dc294f319f87437c1bbf8cd171e7960b29503b83556b90d8c315f9b6feaae569e24087db0c1f5c8cc1692f1f35051bf32858b306abe7639e26aa00ba1761c16303b7332b068b7413965530fcb3883d3ad44633120b9a913cecbcfc7bbfa71e70d8035b4e02cd3d579ef0e30fe1e6c551409739926dcaef653ca449513592616b081b56aba94a8e4127c67ca17b809b5e87c1f47782fbeb50457faa035865129e810a1e35b7eb5a218a80c808a48f47126a80e397d6af2887aa6cf026be0948b3f1c7d1f996c9bb97b22c2ea7541ab660ab9bdf029ebf61da2afa8d87c13bf72086f199aa80d7c55c0cef4175bcc35ada6b680e132375074a501139b13faf70b7a734e15dcb10d6e54bc30be3c8db77d1465b77d8ac5c5a96515d829c9e055c4d8a24697b00953bc5b6c631237b757bbe8ddbfc08e2f926693f077de74c61048c633653b72ca28385318f7dd4c09325901afa91edf1cc5aedd32566b3c2db32a23526cbbface73f125aa50745f930500ef30b2053fb93c1c1e4db49c31b6f5fb44b56d1ba30e99194fe8d65e20aaae62ed41fec4d9609108a00e86b1882d05823cf9b100e3240228aebbdf05d1fd0216e5ab519b0eade1eecb762861cbd0d3c13540bfb39b350dbe36db31e2c4e3d952bfcda61421f5f67cece8b282efc7e5e12db091fdf34ea001664a3e3b22ad1651c1cab0953a9b5ba2425281cfa9acb87c977f2f07eebc5507f8630aefc0407f00093f930378167f6d904f20f6d3c7df3edfc40b90338aa7a3ede9d0940d0167eb694134ca0281051005b936dc5fc2bf53ca244ad8b7b1a929759215d704689af58b52d2a060b9e25ba51a712a852f343f1c95a3c2175353866ad5006d89b68e66bf270ba111b4dcff228445c05f0ee9a324f7ad62c634820932b03ea8ec82752881d0e5d7d91a477b84f0f378d43cc1de9e6174ae2d90a2cb6df31e51e90c01b3c79f2ad2ba8c38d1f37e839bff42e410961a5f32c8e2835bddd9a6267f3725e7cba9dae5904a2c61887b71443beaf989d4743760a9c9d908f954b2ca3bf97ccd5d4df80a2db104a55860eb73c274d6ff6162ad0c13f03e734b4fd20b189e1edf24a5b8ad71e044cfadc86676d054ccbf1d875f2d7014cffa90523a96387e2ee9f89db4347c2aa7495396c24da8cc746f5b82dcddd87ed7c5def9d192a9956f66094a057d0f07254e2b882d28d1fb741468d968ae526e273717d5d8adb83cad49a5d3122e88dcfdb99c42ffc94edf7a660806bebbaa6570376c86977d77b7c9d181e4b73c91599a15f9aa8eb26efdca3c5ce60c58a201539b947bce40810796c28d478053cbf33f80fdc35f5a7f9d372406335b25a02d7d5d7b44f3e22e0542d44049209feb05ffa1a89276d7dd75336a9d38c47ef429637c495ed991eee94ce7cbd23910c13ad27a177f063bf7417cb9c70e4ddb2f2fdab2613866bc71c58abcaab3febcbaf5de0aea74b09ddbeb5f5420e45953e37f9e7babdfaa2a59a9a78b8cc39c80226690bce342d5295e1d5f5c9a8a9ba7831d2c0d9491d2e4fbbf1e35390b18167933211a1760c97a3f621206e53951f339650e1eb23578ed6951fb7e54fbdde1c5d1dcb88638ccac75977b8c0db06346b82f80eaa36cd70ccbb5cbe4a83dd1c03daf7575f1a362f73f370a93f5cbbc6fed3b8310a70e81921b08f2568f2e876d11845df8b505a6536fb647b257310a97a71f79a956fe31e8100d04f64b11d56cda7d2da0e2c10452f117a966cbeeabe7d46e0e3152e73a635a539eb43b83109e983ca5e86d3dd6aecdb0c8eb483f8166a164063f6e35d1f048f8f44359f2e008676701cd30e4d365ff56d521d70ae5c69e3e51bce4919a30d501d22afdfacae99d0fe027f61c24e51553337b00c424454afb6e8911960c1022dbebbda99294c85887c2846d80059558d2be8097e7182c06b8a76c69ea6be1185e4136ac9de6c3d47e35bce618ac484235101905b3294df595cc6c0ac1cf042ba481732ac1e4e0705f79d38165ba7fd93f25", 0xade}], 0x1}}], 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="6d656e675e6500000000000000000000ff071b526bb5957004f38e0000000000000000000000000000001f00000006000000a005000058024fdf80a3306e074fd9ab0d8dd0d93c7d71c54c000000000000004000b004000000e8056ffad87bb297a2cf0000e8070000e805000100000033f322dccca70cd04c87bb1af8499debd3b9c789e348a8f45d230d1cfa0975e390a2209482e0bcae8f3c9c04c3ddcebe3b02000000e1771fcd499897408f4e48e9caca560200010035e9843216ec6983eb7a6a3e8f804b7cce39af42546e613d08c02307d9000f2dd1ba0da8f26f2a513ec35207000000ddfac73301bb1db5bd"], 0x1) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xc05eb68) keyctl$update(0x2, 0x0, &(0x7f00000005c0)="12e925b7f28de354a095ffe3240f59e809c28848dfc7a18309e2f271a01337f5fd66a257a560ee700c03bb4342068561697c3f6c1b0cfe6fde05153dd81e95f0c5abff80de4ec7cc7d02e880386e66647477ae7a551de475547d9d6f41f8f19eefe5bb201b6076", 0x67) 05:27:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x3c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0x4}}}]}, 0x3c}}, 0x0) 05:27:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dc3f0512a611547bf070") syz_emit_ethernet(0x7a, &(0x7f0000000100)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x70}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x6, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x689, 0x0, @local, @dev, {[@timestamp={0x44, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 05:27:50 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000740)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000300)) 05:27:50 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") 05:27:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x3c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0x4}}}]}, 0x3c}}, 0x0) [ 239.437005][T12911] FAT-fs (loop2): invalid media value (0x00) [ 239.449964][T12911] FAT-fs (loop2): Can't find a valid FAT filesystem 05:27:50 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000100)='./file0\x00', 0x0) creat(&(0x7f0000000280)='./bus\x00', 0x4000000000002) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000140), 0xffffff35) 05:27:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dc3f0512a611547bf070") syz_emit_ethernet(0x7a, &(0x7f0000000100)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x70}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x6, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x689, 0x0, @local, @dev, {[@timestamp={0x44, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 05:27:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00'}) sendmsg$nl_route(r0, 0x0, 0x0) 05:27:50 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") 05:27:50 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000740)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000300)) 05:27:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dc3f0512a611547bf070") syz_emit_ethernet(0x76, &(0x7f0000000100)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x70}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x6, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x689, 0x0, @local, @dev, {[@timestamp={0x44, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 05:27:51 executing program 4: 05:27:51 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000016c0)='fdinfo\x00') getdents64(r0, &(0x7f0000000040)=""/136, 0x88) 05:27:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00'}) sendmsg$nl_route(r0, 0x0, 0x0) 05:27:51 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") 05:27:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dc3f0512a611547bf070") syz_emit_ethernet(0x76, &(0x7f0000000100)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x70}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x6, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x689, 0x0, @local, @dev, {[@timestamp={0x44, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 05:27:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00'}) sendmsg$nl_route(r0, 0x0, 0x0) [ 240.062232][T12946] FAT-fs (loop2): invalid media value (0x00) [ 240.135665][T12946] FAT-fs (loop2): Can't find a valid FAT filesystem 05:27:51 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000100)='./file0\x00', 0x0) creat(&(0x7f0000000280)='./bus\x00', 0x4000000000002) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000140), 0xffffff35) 05:27:51 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:27:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dc3f0512a611547bf070") syz_emit_ethernet(0x76, &(0x7f0000000100)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x70}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x6, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x689, 0x0, @local, @dev, {[@timestamp={0x44, 0x38, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 05:27:51 executing program 0: 05:27:51 executing program 4: 05:27:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00'}) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 05:27:51 executing program 0: 05:27:51 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:27:51 executing program 4: 05:27:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dc3f0512a611547bf070") syz_emit_ethernet(0x7a, &(0x7f0000000100)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x70}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x6, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x689, 0x0, @local, @dev, {[@timestamp={0x44, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 05:27:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00'}) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 05:27:51 executing program 4: [ 240.660649][T12988] FAT-fs (loop2): invalid media value (0x00) [ 240.670703][T12988] FAT-fs (loop2): Can't find a valid FAT filesystem 05:27:52 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000100)='./file0\x00', 0x0) creat(&(0x7f0000000280)='./bus\x00', 0x4000000000002) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000140), 0xffffff35) 05:27:52 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:27:52 executing program 0: 05:27:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dc3f0512a611547bf070") syz_emit_ethernet(0x7a, &(0x7f0000000100)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x70}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x6, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x689, 0x0, @local, @dev, {[@timestamp={0x44, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 05:27:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00'}) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 05:27:52 executing program 4: 05:27:52 executing program 4: 05:27:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dc3f0512a611547bf070") syz_emit_ethernet(0x7a, &(0x7f0000000100)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x70}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x6, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x689, 0x0, @local, @dev, {[@timestamp={0x44, 0x3c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 05:27:52 executing program 0: 05:27:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00'}) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 05:27:52 executing program 4: 05:27:52 executing program 0: 05:27:52 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000100)='./file0\x00', 0x0) creat(&(0x7f0000000280)='./bus\x00', 0x4000000000002) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000140), 0xffffff35) 05:27:52 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:27:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dc3f0512a611547bf070") syz_emit_ethernet(0x76, &(0x7f0000000100)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x70}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x6, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x689, 0x0, @local, @dev, {[@timestamp={0x44, 0x38, 0x0, 0x0, 0x0, [{[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 05:27:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00'}) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 05:27:52 executing program 0: 05:27:52 executing program 4: 05:27:52 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000100)='./file0\x00', 0x0) creat(&(0x7f0000000280)='./bus\x00', 0x4000000000002) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000140), 0xffffff35) 05:27:52 executing program 0: 05:27:52 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00'}) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) 05:27:53 executing program 4: 05:27:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dc3f0512a611547bf070") syz_emit_ethernet(0x76, &(0x7f0000000100)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x70}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x6, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x689, 0x0, @local, @dev, {[@timestamp={0x44, 0x38, 0x0, 0x0, 0x0, [{[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 05:27:53 executing program 0: 05:27:53 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:27:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0x4}}}]}, 0x3c}}, 0x0) 05:27:53 executing program 4: 05:27:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dc3f0512a611547bf070") syz_emit_ethernet(0x76, &(0x7f0000000100)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x70}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x6, {0x13, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x689, 0x0, @local, @dev, {[@timestamp={0x44, 0x38, 0x0, 0x0, 0x0, [{[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 05:27:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0x4}}}]}, 0x3c}}, 0x0) 05:27:53 executing program 0: 05:27:53 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) creat(&(0x7f0000000100)='./file0\x00', 0x0) creat(&(0x7f0000000280)='./bus\x00', 0x4000000000002) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000140), 0xffffff35) 05:27:53 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:27:53 executing program 4: 05:27:53 executing program 0: 05:27:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x3c, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0x4}}}]}, 0x3c}}, 0x0) 05:27:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dc3f0512a611547bf070") syz_emit_ethernet(0x7a, &(0x7f0000000100)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x70}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x6, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x689, 0x0, @local, @dev, {[@timestamp={0x44, 0x3c, 0x0, 0x0, 0x0, [{}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 05:27:53 executing program 0: 05:27:53 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:27:53 executing program 4: 05:27:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00'}) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x3c, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0x4}}}]}, 0x3c}}, 0x0) 05:27:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dc3f0512a611547bf070") syz_emit_ethernet(0x7a, &(0x7f0000000100)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x70}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x6, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x689, 0x0, @local, @dev, {[@timestamp={0x44, 0x3c, 0x0, 0x0, 0x0, [{}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 05:27:53 executing program 4: 05:27:53 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) creat(&(0x7f0000000100)='./file0\x00', 0x0) creat(&(0x7f0000000280)='./bus\x00', 0x4000000000002) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000140), 0xffffff35) 05:27:53 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00'}) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x3c, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0x4}}}]}, 0x3c}}, 0x0) 05:27:53 executing program 0: 05:27:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dc3f0512a611547bf070") syz_emit_ethernet(0x7a, &(0x7f0000000100)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x70}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x6, {0x14, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x689, 0x0, @local, @dev, {[@timestamp={0x44, 0x3c, 0x0, 0x0, 0x0, [{}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 05:27:53 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:27:53 executing program 4: 05:27:54 executing program 0: 05:27:54 executing program 4: 05:27:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00'}) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x3c, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bridge_slave={{0x14, 0x1, 'bridge_slave\x00'}, {0x4}}}]}, 0x3c}}, 0x0) 05:27:54 executing program 5: 05:27:54 executing program 0: 05:27:54 executing program 4: 05:27:54 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) creat(&(0x7f0000000100)='./file0\x00', 0x0) creat(&(0x7f0000000280)='./bus\x00', 0x4000000000002) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000140), 0xffffff35) 05:27:54 executing program 5: 05:27:54 executing program 0: 05:27:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x20, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}}, 0x20}}, 0x0) 05:27:54 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:27:54 executing program 4: 05:27:54 executing program 5: 05:27:54 executing program 0: 05:27:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x20, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}}, 0x20}}, 0x0) 05:27:54 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(0x0, 0x0) creat(&(0x7f0000000280)='./bus\x00', 0x4000000000002) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000140), 0xffffff35) 05:27:54 executing program 4: 05:27:54 executing program 5: 05:27:54 executing program 0: 05:27:54 executing program 4: 05:27:54 executing program 5: 05:27:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newlink={0x20, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}}, 0x20}}, 0x0) 05:27:54 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:27:55 executing program 4: 05:27:55 executing program 5: 05:27:55 executing program 0: 05:27:55 executing program 1: 05:27:55 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(0x0, 0x0) creat(&(0x7f0000000280)='./bus\x00', 0x4000000000002) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000140), 0xffffff35) 05:27:55 executing program 4: 05:27:55 executing program 5: 05:27:55 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:27:55 executing program 0: 05:27:55 executing program 1: 05:27:55 executing program 1: 05:27:55 executing program 0: 05:27:55 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:27:55 executing program 5: 05:27:55 executing program 4: 05:27:55 executing program 4: 05:27:55 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(0x0, 0x0) creat(&(0x7f0000000280)='./bus\x00', 0x4000000000002) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000140), 0xffffff35) 05:27:55 executing program 0: 05:27:55 executing program 5: 05:27:55 executing program 1: 05:27:55 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:27:55 executing program 4: 05:27:55 executing program 1: 05:27:55 executing program 5: 05:27:55 executing program 4: 05:27:55 executing program 0: 05:27:55 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:27:55 executing program 1: 05:27:56 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000100)='./file0\x00', 0x0) creat(0x0, 0x4000000000002) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000140), 0xffffff35) 05:27:56 executing program 4: 05:27:56 executing program 5: 05:27:56 executing program 0: 05:27:56 executing program 1: 05:27:56 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:27:56 executing program 4: 05:27:56 executing program 1: 05:27:56 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0) r2 = dup2(r0, r1) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000180)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f00000000c0)='hfsp,us\x00', 0x0, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, 0x0) 05:27:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:27:56 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r1 = inotify_init() bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:27:56 executing program 4: clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet6(0xa, 0x8000000000001, 0x80000000004) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) 05:27:56 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000100)='./file0\x00', 0x0) creat(0x0, 0x4000000000002) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000140), 0xffffff35) 05:27:56 executing program 1: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) creat(&(0x7f00000001c0)='./file1\x00', 0x21) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000002c0)=""/11, 0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000300)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x4000000000000003) dup2(r0, r1) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, 0x0) 05:27:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:27:56 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r1 = inotify_init() bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:27:56 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r1 = inotify_init() bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:27:56 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:27:56 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r1 = inotify_init() bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:27:56 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r1 = inotify_init() bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:27:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:27:56 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:27:56 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r1 = inotify_init() bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:27:56 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:27:57 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000100)='./file0\x00', 0x0) creat(0x0, 0x4000000000002) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000140), 0xffffff35) 05:27:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:27:57 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:27:57 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:27:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) close(r1) 05:27:57 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:27:57 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:27:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) close(r1) 05:27:57 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000100)='./file0\x00', 0x0) creat(&(0x7f0000000280)='./bus\x00', 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000140), 0xffffff35) 05:27:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) close(r1) 05:27:57 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r1 = inotify_init() bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:27:57 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:27:57 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000100)='./file0\x00', 0x0) creat(&(0x7f0000000280)='./bus\x00', 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000140), 0xffffff35) 05:27:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:27:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:27:58 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") 05:27:58 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:27:58 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:27:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) close(r1) 05:27:58 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") 05:27:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:27:58 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:27:58 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000100)='./file0\x00', 0x0) creat(&(0x7f0000000280)='./bus\x00', 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000140), 0xffffff35) 05:27:58 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") 05:27:58 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") 05:27:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:27:58 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000100)='./file0\x00', 0x0) creat(&(0x7f0000000280)='./bus\x00', 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000140), 0xffffff35) 05:27:58 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:27:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:27:58 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") 05:27:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:27:58 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:27:58 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000100)='./file0\x00', 0x0) creat(&(0x7f0000000280)='./bus\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000140), 0xffffff35) 05:27:59 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:27:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:27:59 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:27:59 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:27:59 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000100)='./file0\x00', 0x0) creat(&(0x7f0000000280)='./bus\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000140), 0xffffff35) 05:27:59 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:27:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:27:59 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:27:59 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:27:59 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:27:59 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:27:59 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000100)='./file0\x00', 0x0) creat(&(0x7f0000000280)='./bus\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000140), 0xffffff35) 05:27:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) [ 248.068524][T13496] cgroup: fork rejected by pids controller in /syz3 05:27:59 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:27:59 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:27:59 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:27:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:27:59 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:27:59 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000100)='./file0\x00', 0x0) creat(&(0x7f0000000280)='./bus\x00', 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) write$cgroup_int(r1, 0x0, 0x0) 05:27:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:27:59 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:27:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000100)='./file0\x00', 0x0) creat(&(0x7f0000000280)='./bus\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000140), 0xffffff35) 05:27:59 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000100)='./file0\x00', 0x0) creat(&(0x7f0000000280)='./bus\x00', 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) write$cgroup_int(r1, 0x0, 0x0) 05:27:59 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:27:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:27:59 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:00 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:00 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:00 executing program 2: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) creat(&(0x7f0000000100)='./file0\x00', 0x0) creat(&(0x7f0000000280)='./bus\x00', 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) write$cgroup_int(r1, 0x0, 0x0) 05:28:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r1 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(0xffffffffffffffff) 05:28:00 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r1 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(0xffffffffffffffff) 05:28:00 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:00 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:00 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r1 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(0xffffffffffffffff) 05:28:00 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:00 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:00 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r2 = inotify_init() tee(0xffffffffffffffff, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r2, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:00 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r1 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r0) 05:28:00 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:00 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:01 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:01 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r1 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r0) 05:28:01 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r2 = inotify_init() tee(0xffffffffffffffff, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r2, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:01 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r1 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r0) 05:28:01 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:01 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") 05:28:01 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r1 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r0) 05:28:01 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:01 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r2 = inotify_init() tee(0xffffffffffffffff, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r2, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:01 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r0 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r1 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r0) 05:28:01 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") 05:28:01 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:01 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:01 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r0 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r1 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r0) 05:28:01 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r2 = inotify_init() tee(r1, 0xffffffffffffffff, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r2, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:01 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") 05:28:02 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:02 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:02 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r0 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r1 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r0) 05:28:02 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:02 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:02 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r2 = inotify_init() tee(r1, 0xffffffffffffffff, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r2, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:02 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r0 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r1 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r0) 05:28:02 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r0 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r1 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r0) 05:28:02 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:02 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r2 = inotify_init() tee(r1, 0xffffffffffffffff, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r2, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:02 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r0 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r1 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r0) 05:28:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:02 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:03 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:03 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:03 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:03 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") 05:28:03 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:03 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:03 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") 05:28:03 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:03 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") 05:28:03 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:03 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:03 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:03 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") 05:28:04 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:04 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:04 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)) r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:04 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)) r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:04 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:04 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:04 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)) r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:04 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") 05:28:04 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:04 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:04 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") 05:28:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:05 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r1 = inotify_init() bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:05 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:05 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47b") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:05 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r1 = inotify_init() bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:05 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:05 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:05 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r1 = inotify_init() bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:05 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:05 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r1 = inotify_init() bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47b") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:05 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:05 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:05 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47b") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:05 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:05 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf0") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf0") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf0") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:06 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:06 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:06 executing program 3: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r2 = inotify_init() tee(r1, r0, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r2, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(0xffffffffffffffff, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:06 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x0, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:06 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:06 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x0, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:06 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r1 = inotify_init() bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:06 executing program 3: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r2 = inotify_init() tee(r1, r0, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r2, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(0xffffffffffffffff, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:06 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x0, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:06 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:07 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:07 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:07 executing program 3: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r2 = inotify_init() tee(r1, r0, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r2, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(0xffffffffffffffff, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:07 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:07 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:07 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:07 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:07 executing program 3: r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:07 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:07 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:07 executing program 3: r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:07 executing program 2: r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:08 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:08 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:08 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:08 executing program 3: r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:08 executing program 2: r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:08 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:08 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x0, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:08 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:08 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:08 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:08 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x0, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:08 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:08 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:09 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x0, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:09 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:09 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:09 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:09 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:09 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r1 = inotify_init() execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:09 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r2 = inotify_init() tee(0xffffffffffffffff, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r2, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:09 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:09 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r1 = inotify_init() execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:10 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r2 = inotify_init() tee(0xffffffffffffffff, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r2, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:10 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:10 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r1 = inotify_init() execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:10 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:10 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:10 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:10 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:10 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r1 = inotify_init() execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:10 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:11 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r2 = inotify_init() tee(0xffffffffffffffff, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r2, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:11 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:11 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = inotify_init() execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:11 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = inotify_init() execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, 0x0, 0x0) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:11 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = inotify_init() execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, 0x0, 0x0) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:11 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r1 = inotify_init() execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:11 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:11 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, 0x0, 0x0) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:11 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r2 = inotify_init() tee(r1, 0xffffffffffffffff, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r2, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:11 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = inotify_init() execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:11 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:11 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:11 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r1 = inotify_init() execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:11 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r1 = inotify_init() execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:11 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r2 = inotify_init() tee(r1, 0xffffffffffffffff, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r2, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:12 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r1 = inotify_init() execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:12 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r2 = inotify_init() tee(r1, 0xffffffffffffffff, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r2, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:12 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:12 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:12 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) [ 261.036272][T17538] cgroup: fork rejected by pids controller in /syz5 05:28:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:12 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:12 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r1 = inotify_init() execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:12 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r1 = inotify_init() execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:12 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x0, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:13 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r1 = inotify_init() execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x0, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:13 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r1 = inotify_init() execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:13 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:13 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r1 = inotify_init() execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x0, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:13 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) [ 262.007057][T17891] cgroup: fork rejected by pids controller in /syz1 05:28:13 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r1 = inotify_init() execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:13 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:13 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:13 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:13 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:13 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:14 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r1 = inotify_init() execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:14 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(r1) 05:28:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, 0x0, 0x0) close(r1) 05:28:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, 0x0, 0x0) close(r1) 05:28:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, 0x0, 0x0) close(r1) 05:28:14 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") 05:28:14 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(0xffffffffffffffff) 05:28:14 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:14 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r1 = inotify_init() execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:14 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(0xffffffffffffffff) 05:28:14 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:14 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:15 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") 05:28:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000001340)="11dca50d5e01cfe47bf070") r1 = socket$inet(0x2, 0x3, 0x2) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r2 = socket$inet(0x2, 0x3, 0x19) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local, 0x1, 0x1, [@local]}, 0x5f5) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) close(0xffffffffffffffff) 05:28:15 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:15 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:15 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:15 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:15 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:15 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r1 = inotify_init() execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:15 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") 05:28:15 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:15 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:15 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) syz_emit_ethernet(0xbe, &(0x7f0000000100)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x70}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x3, 0x2, 0x0, 0x0, 0x0, 0x6, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x689, 0x0, @local, @dev, {[@timestamp={0x44, 0x40, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {[@broadcast]}, {[@multicast1]}, {[@dev]}]}]}}}}}}}, 0x0) 05:28:15 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:16 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) fchdir(0xffffffffffffffff) creat(&(0x7f0000000100)='./file0\x00', 0x0) creat(&(0x7f0000000280)='./bus\x00', 0x4000000000002) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000140), 0xffffff35) 05:28:16 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000280)='./bus\x00', 0x4000000000002) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000140), 0xffffff35) 05:28:16 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:16 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:16 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:16 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:16 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r1 = inotify_init() execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:16 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000140), 0xffffff35) 05:28:16 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:16 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) creat(&(0x7f0000000280)='./bus\x00', 0x4000000000002) add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000700)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000140), 0xffffff35) 05:28:16 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) creat(&(0x7f0000000280)='./bus\x00', 0x4000000000002) add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000700)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000140), 0xffffff35) 05:28:16 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:16 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:16 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000140), 0xffffff35) 05:28:16 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:17 executing program 4: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r2 = inotify_init() tee(r1, r0, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r2, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(0xffffffffffffffff, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:17 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) [ 266.031011][T19597] cgroup: fork rejected by pids controller in /syz4 05:28:17 executing program 4: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r2 = inotify_init() tee(r1, r0, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r2, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(0xffffffffffffffff, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:17 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r1 = inotify_init() execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:17 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:17 executing program 4: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r2 = inotify_init() tee(r1, r0, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r2, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(0xffffffffffffffff, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:17 executing program 0: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r2 = inotify_init() tee(r1, r0, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r2, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(0xffffffffffffffff, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:17 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) creat(&(0x7f0000000280)='./bus\x00', 0x4000000000002) add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000700)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000140), 0xffffff35) 05:28:17 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000140), 0xffffff35) 05:28:17 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:17 executing program 0: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r2 = inotify_init() tee(r1, r0, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r2, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(0xffffffffffffffff, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:17 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:17 executing program 0: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r2 = inotify_init() tee(r1, r0, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r2, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(0xffffffffffffffff, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:18 executing program 4: r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:18 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) 05:28:18 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r1 = inotify_init() execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:18 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:18 executing program 4: r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:18 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) 05:28:18 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) creat(&(0x7f0000000280)='./bus\x00', 0x4000000000002) add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000700)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000140), 0xffffff35) 05:28:18 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) 05:28:18 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:18 executing program 4: r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:18 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) 05:28:18 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:18 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:19 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:19 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r1 = inotify_init() execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:19 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:19 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) 05:28:19 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:19 executing program 2: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 05:28:19 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:19 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) creat(&(0x7f0000000280)='./bus\x00', 0x4000000000002) add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000700)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000140), 0xffffff35) syz_open_procfs(0x0, &(0x7f00000005c0)='task\x00') 05:28:19 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:19 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) 05:28:19 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) fchdir(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) 05:28:19 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:20 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) fchdir(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) 05:28:20 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r1 = inotify_init() execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RSTAT(0xffffffffffffffff, 0x0, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x40505412, 0x0) write$9p(r0, &(0x7f0000001400)="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", 0x600) sendfile(r0, r1, 0x0, 0x10000) 05:28:20 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:20 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:20 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) fchdir(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) 05:28:20 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)={[{@errors_continue='errors=continue'}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x4}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@errors_remount='errors=remount-ro'}, {@utf8='utf8'}, {@fmask={'fmask'}}, {@umask={'umask'}}]}) 05:28:20 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) creat(&(0x7f0000000280)='./bus\x00', 0x4000000000002) add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000700)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000140), 0xffffff35) syz_open_procfs(0x0, &(0x7f00000005c0)='task\x00') 05:28:20 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:20 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:20 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) [ 269.446044][T22085] ntfs: (device loop2): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 05:28:20 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) [ 269.508142][T22085] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. [ 269.600502][T22085] ntfs: (device loop2): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 05:28:20 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) [ 269.650781][T22085] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 05:28:21 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r1 = inotify_init() execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:21 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:21 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) 05:28:21 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)={[{@errors_continue='errors=continue'}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x4}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@errors_remount='errors=remount-ro'}, {@utf8='utf8'}, {@fmask={'fmask'}}, {@umask={'umask'}}]}) 05:28:21 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) [ 270.073435][T22424] ntfs: (device loop2): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 270.113332][T22424] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 05:28:21 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) 05:28:21 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) creat(&(0x7f0000000280)='./bus\x00', 0x4000000000002) add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000700)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000140), 0xffffff35) syz_open_procfs(0x0, &(0x7f00000005c0)='task\x00') 05:28:21 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:21 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:21 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)={[{@errors_continue='errors=continue'}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x4}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@errors_remount='errors=remount-ro'}, {@utf8='utf8'}, {@fmask={'fmask'}}, {@umask={'umask'}}]}) 05:28:21 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) [ 270.443836][T22647] ntfs: (device loop2): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 05:28:21 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) [ 270.509250][T22647] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 05:28:22 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r1 = inotify_init() execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:22 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:22 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:22 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)={[{@errors_continue='errors=continue'}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x4}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@errors_remount='errors=remount-ro'}, {@utf8='utf8'}, {@fmask={'fmask'}}, {@umask={'umask'}}]}) 05:28:22 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) [ 270.991450][T22975] ntfs: (device loop2): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 05:28:22 executing program 5: syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) [ 271.177244][T22975] ntfs: (device loop2): ntfs_fill_super(): Unable to determine device size. 05:28:22 executing program 0: clone(0xa0100000204, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000280)='./file0\x00', 0x1048, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x10a) close(r0) execve(0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200800000000013, &(0x7f0000000040)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) open$dir(&(0x7f0000000180)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='./file0/../file0\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, 0x0, &(0x7f0000000000)) 05:28:22 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:22 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:22 executing program 1: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r0 = inotify_init() execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r0, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:22 executing program 2: syz_mount_image$ntfs(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)={[{@errors_continue='errors=continue'}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x4}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@errors_remount='errors=remount-ro'}, {@utf8='utf8'}, {@fmask={'fmask'}}, {@umask={'umask'}}]}) 05:28:22 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) 05:28:22 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:22 executing program 2: syz_mount_image$ntfs(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)={[{@errors_continue='errors=continue'}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x4}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@errors_remount='errors=remount-ro'}, {@utf8='utf8'}, {@fmask={'fmask'}}, {@umask={'umask'}}]}) 05:28:22 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) 05:28:23 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:23 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:23 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$vfat(0x0, &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) 05:28:23 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) 05:28:23 executing program 2: syz_mount_image$ntfs(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)={[{@errors_continue='errors=continue'}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x4}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@errors_remount='errors=remount-ro'}, {@utf8='utf8'}, {@fmask={'fmask'}}, {@umask={'umask'}}]}) 05:28:23 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:23 executing program 1: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r0 = inotify_init() execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r0, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:23 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f00000006c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:23 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)={[{@errors_continue='errors=continue'}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x4}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@errors_remount='errors=remount-ro'}, {@utf8='utf8'}, {@fmask={'fmask'}}, {@umask={'umask'}}]}) 05:28:23 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) 05:28:23 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:23 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f0000000040)={0x0, {0x0, 0x1}}) 05:28:23 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)={[{@errors_continue='errors=continue'}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x4}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@errors_remount='errors=remount-ro'}, {@utf8='utf8'}, {@fmask={'fmask'}}, {@umask={'umask'}}]}) 05:28:23 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e001, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r1) open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mkdir(0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) open(0x0, 0x0, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) getpgid(0x0) 05:28:23 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) 05:28:23 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:23 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f00000006c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:23 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)={[{@errors_continue='errors=continue'}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x4}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@errors_remount='errors=remount-ro'}, {@utf8='utf8'}, {@fmask={'fmask'}}, {@umask={'umask'}}]}) 05:28:24 executing program 1: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r0 = inotify_init() execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r0, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:24 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/uinput\x00', 0x805, 0x0) write$uinput_user_dev(r1, &(0x7f0000000640)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) recvmsg$kcm(0xffffffffffffff9c, &(0x7f00000016c0)={&(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000200)=""/177, 0xb1}, {&(0x7f0000000300)=""/83, 0x53}, {&(0x7f0000000380)=""/226, 0xe2}, {&(0x7f0000000480)=""/132, 0x84}, {&(0x7f0000000540)=""/27, 0x1b}, {&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000001580)=""/117, 0x75}, {&(0x7f0000001600)=""/28, 0x1c}], 0x8}, 0x100) r3 = socket(0x11, 0x2, 0x0) setsockopt(r3, 0x2000000000000107, 0x1, &(0x7f00000000c0)="010000000000060000071a80000001cc", 0x10) socket$inet_udplite(0x2, 0x2, 0x88) close(r3) r4 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000080)="11dca5055e0bcfec7be070") r5 = socket$inet6(0xa, 0x2, 0x0) r6 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000180)={'veth0\x00', 0x0}) ioctl$sock_inet_SIOCGIFNETMASK(r6, 0x891b, &(0x7f00000000c0)={'lapb0\x00', {0x2, 0x4e21, @loopback}}) ioctl$FITRIM(r4, 0xc0185879, &(0x7f0000000100)={0x3, 0x200, 0x81}) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000040)={@remote, 0x33, r7}) getsockopt$bt_l2cap_L2CAP_CONNINFO(r2, 0x6, 0x2, &(0x7f0000001700), &(0x7f0000001880)=0x6) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r3, 0x10e, 0x4, &(0x7f00000017c0)=0x3ff, 0x4) setsockopt$inet6_mreq(r5, 0x29, 0x1b, &(0x7f0000000080)={@remote, r7}, 0x14) r8 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001740)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$KVM_GET_ONE_REG(r8, 0x4010aeab, &(0x7f0000001780)={0x6, 0xeda}) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x9, 0x18, 0x249e1e, 0x8000000001}, 0x2c) socket$rxrpc(0x21, 0x2, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000000)={r9, &(0x7f0000001700), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000002c0)={r9, &(0x7f00000003c0), 0x0}, 0x18) ioctl$UI_DEV_DESTROY(r1, 0x5502) 05:28:24 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:28:24 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', 0x0, 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) 05:28:24 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f00000006c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:24 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:24 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:28:24 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) 05:28:24 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:24 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) [ 273.503661][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 273.509841][ C0] protocol 88fb is buggy, dev hsr_slave_1 05:28:24 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 05:28:24 executing program 0: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x132224) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000002900)=[{&(0x7f0000001800)="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", 0xade}], 0x1}}], 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="6d656e675e6500000000000000000000ff071b526bb5957004f38e0000000000000000000000000000001f00000006000000a005000058024fdf80a3306e074fd9ab0d8dd0d93c7d71c54c000000000000004000b004000000e8056ffad87bb297a2cf0000e8070000e805000100000033f322dccca70cd04c87bb1af8499debd3b9c789e348a8f45d230d1cfa0975e390a2209482e0bcae8f3c9c04c3ddcebe3b02000000e1771fcd499897408f4e48e9caca560200010035e9843216ec6983eb7a6a3e8f804b7cce39af42546e613d08c02307d9000f2dd1ba0da8f26f2a513ec35207000000ddfac73301bb1db5bd"], 0x1) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xc05eb68) [ 273.558222][T25465] FAT-fs (loop5): bogus number of reserved sectors [ 273.568533][T25465] FAT-fs (loop5): Can't find a valid FAT filesystem 05:28:25 executing program 1: r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r1 = inotify_init() execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:25 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) 05:28:25 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:25 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:25 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)={[{@errors_continue='errors=continue'}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x4}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@errors_remount='errors=remount-ro'}, {@utf8='utf8'}, {@fmask={'fmask'}}]}) 05:28:25 executing program 0: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x132224) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000002b80)=[{{0x0, 0x0, &(0x7f0000002900)=[{&(0x7f0000001800)="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", 0xade}], 0x1}}], 0x1, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000004c0)=ANY=[@ANYBLOB="6d656e675e6500000000000000000000ff071b526bb5957004f38e0000000000000000000000000000001f00000006000000a005000058024fdf80a3306e074fd9ab0d8dd0d93c7d71c54c000000000000004000b004000000e8056ffad87bb297a2cf0000e8070000e805000100000033f322dccca70cd04c87bb1af8499debd3b9c789e348a8f45d230d1cfa0975e390a2209482e0bcae8f3c9c04c3ddcebe3b02000000e1771fcd499897408f4e48e9caca560200010035e9843216ec6983eb7a6a3e8f804b7cce39af42546e613d08c02307d9000f2dd1ba0da8f26f2a513ec35207000000ddfac73301bb1db5bd"], 0x1) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xc05eb68) [ 274.162655][T25800] FAT-fs (loop5): bogus number of reserved sectors 05:28:25 executing program 0: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00\x00\x00v\x98\x91bS\xb3\x81\x99\x00', 0x800000000802}) ioctl$TUNSETCARRIER(r1, 0x400454e2, &(0x7f0000000080)) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r2) socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000840)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\xe0e \xd7\x92\xc0\xd0s\xa9\xe4\x18:') [ 274.214027][T25800] FAT-fs (loop5): Can't find a valid FAT filesystem 05:28:25 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:25 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)={[{@errors_continue='errors=continue'}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x4}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@errors_remount='errors=remount-ro'}, {@utf8='utf8'}, {@fmask={'fmask'}}]}) 05:28:25 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) 05:28:25 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) [ 274.431758][T26130] FAT-fs (loop5): bogus number of reserved sectors [ 274.441766][T26130] FAT-fs (loop5): Can't find a valid FAT filesystem 05:28:25 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:26 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)={[{@errors_continue='errors=continue'}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x4}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@errors_remount='errors=remount-ro'}, {@utf8='utf8'}, {@fmask={'fmask'}}]}) 05:28:26 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) 05:28:26 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x7, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:26 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:26 executing program 1: r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r1 = inotify_init() execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:26 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='bpf\x00', 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x9, 0x7, 0x8, 0x5, 0x0, 0x1}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f0000000180)='./file0/file0\x00', r0}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f00000003c0)={&(0x7f0000000380)='./file0/file0\x00'}, 0x10) [ 275.066699][T26552] FAT-fs (loop5): bogus number of reserved sectors [ 275.076840][T26556] __ntfs_warning: 7 callbacks suppressed [ 275.076859][T26556] ntfs: (device loop2): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 05:28:26 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) [ 275.144145][T26552] FAT-fs (loop5): Can't find a valid FAT filesystem 05:28:26 executing program 0: [ 275.189892][T26556] ntfs: (device loop2): parse_options(): Unrecognized mount option . 05:28:26 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x7, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:26 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) 05:28:26 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)={[{@errors_continue='errors=continue'}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x4}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@errors_remount='errors=remount-ro'}, {@utf8='utf8'}, {@umask={'umask'}}]}) 05:28:26 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x38}}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") sendmmsg(r0, &(0x7f0000000180), 0x40000000000003f, 0x0) 05:28:26 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) [ 275.405322][T26880] ntfs: (device loop2): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 275.426555][T26880] ntfs: (device loop2): parse_options(): Unrecognized mount option . 05:28:26 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)={[{@errors_continue='errors=continue'}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x4}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@errors_remount='errors=remount-ro'}, {@utf8='utf8'}, {@umask={'umask'}}]}) [ 275.530388][T26975] FAT-fs (loop5): bogus number of reserved sectors [ 275.555892][T26975] FAT-fs (loop5): Can't find a valid FAT filesystem 05:28:26 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x7, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:26 executing program 0: creat(&(0x7f0000000140)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101008, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x8002, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x79fd, 0x0) [ 275.714067][T27205] ntfs: (device loop2): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 275.755531][T27205] ntfs: (device loop2): parse_options(): Unrecognized mount option . 05:28:27 executing program 1: r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r1 = inotify_init() execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:27 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:27 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) 05:28:27 executing program 0: clone(0x3102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod(&(0x7f00000003c0)='./file0\x00', 0x440, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) io_setup(0x7ff, &(0x7f0000000400)=0x0) io_destroy(r0) 05:28:27 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)={[{@errors_continue='errors=continue'}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x4}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@errors_remount='errors=remount-ro'}, {@utf8='utf8'}, {@umask={'umask'}}]}) [ 275.975806][T27318] FAT-fs (loop5): bogus number of reserved sectors [ 276.001892][T27318] FAT-fs (loop5): Can't find a valid FAT filesystem [ 276.016934][T27327] ntfs: (device loop2): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 05:28:27 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xa, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe0000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:27 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r1 = inotify_init() execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:27 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:27 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) [ 276.172593][T27327] ntfs: (device loop2): parse_options(): Unrecognized mount option . 05:28:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8907, 0x0) 05:28:27 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)={[{@errors_continue='errors=continue'}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x4}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@errors_remount='errors=remount-ro'}, {@fmask={'fmask'}}, {@umask={'umask'}}]}) 05:28:27 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xa, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe0000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:27 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) [ 276.406386][T27805] FAT-fs (loop5): bogus number of reserved sectors [ 276.426067][T27805] FAT-fs (loop5): Can't find a valid FAT filesystem [ 276.436713][T27814] ntfs: (device loop2): parse_options(): Unrecognized mount option . 05:28:27 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) 05:28:27 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r1 = inotify_init() execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:27 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)={[{@errors_continue='errors=continue'}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x4}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@errors_remount='errors=remount-ro'}, {@fmask={'fmask'}}, {@umask={'umask'}}]}) 05:28:27 executing program 0: socketpair$unix(0x1, 0x800000000000005, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x4, &(0x7f0000000400)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x10, 0x1a001000000}, [@ldst={0x5}]}, &(0x7f0000000080)='GPL\x00', 0x4, 0x40d, &(0x7f000000cf3d)=""/195}, 0x48) 05:28:27 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xa, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe0000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:28 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) bind$bt_rfcomm(r2, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff, 0x4}}, 0xa) recvmmsg(r2, &(0x7f0000001700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 276.748048][T28269] ntfs: (device loop2): parse_options(): Unrecognized mount option . 05:28:28 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) [ 276.851450][T28310] FAT-fs (loop5): bogus number of reserved sectors 05:28:28 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000001940)='/dev/dmmidi#\x00', 0x1, 0x408081) accept$packet(0xffffffffffffff9c, &(0x7f0000003400)={0x11, 0x0, 0x0}, &(0x7f0000003440)=0x14) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000003480)={@dev={0xfe, 0x80, [], 0x23}, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @dev={0xfe, 0x80, [], 0x28}, 0x0, 0x1, 0x8, 0x100, 0x3, 0xc7470100, r1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000900)}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r0, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4020}, 0xc, 0x0}, 0x4000000) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000000)) lsetxattr$security_smack_entry(&(0x7f0000000140)='./file0\x00', 0x0, &(0x7f0000000240)='!\x00', 0x2, 0x2) 05:28:28 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)={[{@errors_continue='errors=continue'}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x4}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@errors_remount='errors=remount-ro'}, {@fmask={'fmask'}}, {@umask={'umask'}}]}) [ 276.940180][T28310] FAT-fs (loop5): Can't find a valid FAT filesystem 05:28:28 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r1 = inotify_init() execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:28 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:28 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x0, &(0x7f0000000140), 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) 05:28:28 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)={[{@errors_continue='errors=continue'}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x4}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@utf8='utf8'}, {@fmask={'fmask'}}, {@umask={'umask'}}]}) [ 277.295251][T28731] FAT-fs (loop5): bogus number of reserved sectors [ 277.318764][T28731] FAT-fs (loop5): Can't find a valid FAT filesystem 05:28:28 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b7000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:28 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:28 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)={[{@errors_continue='errors=continue'}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x4}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@utf8='utf8'}, {@fmask={'fmask'}}, {@umask={'umask'}}]}) 05:28:28 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) 05:28:28 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)={[{@errors_continue='errors=continue'}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x4}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@utf8='utf8'}, {@fmask={'fmask'}}, {@umask={'umask'}}]}) 05:28:28 executing program 0: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000004600), 0xc) [ 277.600273][T28953] FAT-fs (loop5): bogus number of reserved sectors [ 277.638632][T28953] FAT-fs (loop5): Can't find a valid FAT filesystem 05:28:28 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:28 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b7000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:29 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r1 = inotify_init() execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:29 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)={[{@errors_continue='errors=continue'}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x4}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@errors_remount='errors=remount-ro'}, {@utf8='utf8'}, {@fmask={'fmask'}}, {@umask={'umask'}}]}) 05:28:29 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) 05:28:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) syslog(0x2, &(0x7f0000000000)=""/156, 0x9c) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x59, 0x0, 0xffffffffffffffff, 0x0) socket$rds(0x15, 0x5, 0x0) 05:28:29 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) [ 278.029529][T29482] FAT-fs (loop5): bogus number of reserved sectors 05:28:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0x2, &(0x7f000079bffc), &(0x7f0000350ffc)=0x4) 05:28:29 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b7000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) [ 278.098248][T29482] FAT-fs (loop5): Can't find a valid FAT filesystem 05:28:29 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)={[{@errors_continue='errors=continue'}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x4}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@errors_remount='errors=remount-ro'}, {@utf8='utf8'}, {@fmask={'fmask'}}, {@umask={'umask'}}]}) 05:28:29 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:29 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r1 = inotify_init() execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:29 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{0x0}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) 05:28:29 executing program 0: syslog(0x3, &(0x7f0000000300)=""/156, 0xfe50) 05:28:29 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) [ 278.400059][T29815] FAT-fs (loop5): bogus number of reserved sectors 05:28:29 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xd, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b700000000000000950000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:29 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)={[{@errors_continue='errors=continue'}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x4}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@errors_remount='errors=remount-ro'}, {@utf8='utf8'}, {@fmask={'fmask'}}, {@umask={'umask'}}]}) [ 278.445233][T29815] FAT-fs (loop5): Can't find a valid FAT filesystem 05:28:29 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) 05:28:29 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xd, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b700000000000000950000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:29 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)={[{@errors_continue='errors=continue'}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x4}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@errors_remount='errors=remount-ro'}, {@utf8='utf8'}, {@fmask={'fmask'}}, {@umask={'umask'}}]}) [ 278.691330][T30275] FAT-fs (loop5): bogus number of reserved sectors [ 278.709844][T30275] FAT-fs (loop5): Can't find a valid FAT filesystem 05:28:29 executing program 0: clone(0x200, 0x0, 0x0, 0x0, 0x0) symlink(&(0x7f0000000400)='./file1\x00', &(0x7f0000000440)='./file1\x00') mknod(&(0x7f0000000000)='./file0\x00', 0x1050, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x10a) close(r0) execve(&(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 05:28:30 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:30 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) [ 279.011631][T30576] FAT-fs (loop5): bogus number of reserved sectors [ 279.044433][T30576] FAT-fs (loop5): Can't find a valid FAT filesystem 05:28:30 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r1 = inotify_init() execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:30 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xd, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b700000000000000950000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:30 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)={[{@errors_continue='errors=continue'}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x4}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@errors_remount='errors=remount-ro'}, {@utf8='utf8'}, {@fmask={'fmask'}}, {@umask={'umask'}}]}) 05:28:30 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:30 executing program 0: getpeername$llc(0xffffffffffffffff, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f00000000c0)=0x10) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ubi_ctrl\x00', 0x18080, 0x0) ioctl$SIOCX25GDTEFACILITIES(0xffffffffffffffff, 0x89ea, &(0x7f0000000200)) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 05:28:30 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) 05:28:30 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)={[{@errors_continue='errors=continue'}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x4}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@errors_remount='errors=remount-ro'}, {@utf8='utf8'}, {@fmask={'fmask'}}, {@umask={'umask'}}]}) [ 279.273271][T30788] FAT-fs (loop5): bogus number of reserved sectors [ 279.328511][T30788] FAT-fs (loop5): Can't find a valid FAT filesystem 05:28:30 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:30 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xd, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:30 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) 05:28:30 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)={[{@errors_continue='errors=continue'}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x4}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@errors_remount='errors=remount-ro'}, {@utf8='utf8'}, {@fmask={'fmask'}}, {@umask={'umask'}}]}) 05:28:30 executing program 0: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000002c0)=""/11, 0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000300)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x4000000000000003) dup2(r0, r1) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, 0x0) [ 279.617867][T31177] FAT-fs (loop5): bogus number of reserved sectors [ 279.642323][T31177] FAT-fs (loop5): Can't find a valid FAT filesystem 05:28:31 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r1 = inotify_init() execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:31 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xd, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:31 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:31 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)={[{@errors_continue='errors=continue'}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x4}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@errors_remount='errors=remount-ro'}, {@utf8='utf8'}, {@fmask={'fmask'}}, {@umask={'umask'}}]}) 05:28:31 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) 05:28:31 executing program 0: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000002c0)=""/11, 0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000300)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x4000000000000003) dup2(r0, r1) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, 0x0) 05:28:31 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)={[{@errors_continue='errors=continue'}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x4}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@errors_remount='errors=remount-ro'}, {@utf8='utf8'}, {@fmask={'fmask'}}, {@umask={'umask'}}]}) 05:28:31 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) [ 280.125141][T31449] FAT-fs (loop5): bogus number of reserved sectors [ 280.148296][T31449] FAT-fs (loop5): Can't find a valid FAT filesystem 05:28:31 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xd, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:31 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174", 0xb}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) [ 280.308794][T31769] __ntfs_warning: 23 callbacks suppressed [ 280.308809][T31769] ntfs: (device loop2): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. 05:28:31 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:31 executing program 0: dup2(0xffffffffffffffff, 0xffffffffffffffff) pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) write$binfmt_script(r1, &(0x7f0000000380)=ANY=[], 0xfffffed5) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r4, 0x0, 0x1ffffd, 0x0) [ 280.392322][T31769] ntfs: (device loop2): parse_options(): Unrecognized mount option . [ 280.418340][T31847] FAT-fs (loop5): bogus number of reserved sectors [ 280.427757][T31847] FAT-fs (loop5): Can't find a valid FAT filesystem 05:28:32 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r1 = inotify_init() execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:32 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)={[{@errors_continue='errors=continue'}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@errors_remount='errors=remount-ro'}, {@utf8='utf8'}, {@fmask={'fmask'}}, {@umask={'umask'}}]}) 05:28:32 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:32 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01", 0x11}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) 05:28:32 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) [ 280.944925][T32205] FAT-fs (loop5): invalid media value (0x00) [ 280.956070][T32205] FAT-fs (loop5): Can't find a valid FAT filesystem 05:28:32 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:32 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01", 0x11}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) [ 280.978014][T32209] ntfs: (device loop2): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 281.013447][T32209] ntfs: (device loop2): parse_options(): Unrecognized mount option . 05:28:32 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)={[{@errors_continue='errors=continue'}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@errors_remount='errors=remount-ro'}, {@utf8='utf8'}, {@fmask={'fmask'}}, {@umask={'umask'}}]}) 05:28:32 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f00000006c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) [ 281.186040][T32517] FAT-fs (loop5): invalid media value (0x00) [ 281.196361][T32517] FAT-fs (loop5): Can't find a valid FAT filesystem 05:28:32 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01", 0x11}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) 05:28:32 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:32 executing program 0: r0 = open(0x0, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x4000, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) accept4$inet6(r0, 0x0, 0x0, 0x800) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000081, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r1) syz_mount_image$vfat(&(0x7f0000000200)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000140)="eb3c902d6b66732e666174000204010002000270f7f8", 0x16}], 0x0, 0x0) umount2(&(0x7f0000000400)='./file0\x00', 0x4) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r0, 0xc008551c, &(0x7f0000000380)={0xfffffffffffffffb, 0x14, [0x969, 0x1f, 0x1ebf8e7c, 0x3441, 0x94e]}) [ 281.308393][T32730] ntfs: (device loop2): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 281.335892][T32730] ntfs: (device loop2): parse_options(): Unrecognized mount option . [ 281.453455][ T338] FAT-fs (loop5): invalid media value (0x00) [ 281.530318][ T338] FAT-fs (loop5): Can't find a valid FAT filesystem 05:28:32 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r1 = inotify_init() execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:32 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)={[{@errors_continue='errors=continue'}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@errors_remount='errors=remount-ro'}, {@utf8='utf8'}, {@fmask={'fmask'}}, {@umask={'umask'}}]}) 05:28:32 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f00000006c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:32 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:32 executing program 0: r0 = socket$kcm(0x10, 0x10000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)="23000000420081aee405e9a4000000000000151dc8f51ea5d24700000000b187000000", 0x23}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000001740)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f000000e980)={0x0, 0x0, 0x0}, 0x0) 05:28:33 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270", 0x14}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) [ 281.830157][ T590] FAT-fs (loop5): invalid media value (0x00) 05:28:33 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$RTC_EPOCH_SET(r0, 0xc0984124, 0xffffffffffff0000) [ 281.860828][ T588] ntfs: (device loop2): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 281.875848][ T590] FAT-fs (loop5): Can't find a valid FAT filesystem 05:28:33 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$RTC_EPOCH_SET(r0, 0xc0984124, 0xffffffffffff0000) 05:28:33 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:33 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270", 0x14}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) 05:28:33 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f00000006c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:33 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r1 = inotify_init() execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) [ 282.025114][ T588] ntfs: (device loop2): parse_options(): Unrecognized mount option . 05:28:33 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)={[{@errors_continue='errors=continue'}, {@mft_zone_multiplier={'mft_zone_multiplier'}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@errors_remount='errors=remount-ro'}, {@utf8='utf8'}, {@fmask={'fmask'}}, {@umask={'umask'}}]}) 05:28:33 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$RTC_EPOCH_SET(r0, 0xc0984124, 0xffffffffffff0000) 05:28:33 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:33 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) [ 282.202216][ T1022] FAT-fs (loop5): invalid media value (0x00) [ 282.243360][ T1022] FAT-fs (loop5): Can't find a valid FAT filesystem 05:28:33 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270", 0x14}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) 05:28:33 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$RTC_EPOCH_SET(r0, 0xc0984124, 0xffffffffffff0000) [ 282.329901][ T1242] ntfs: (device loop2): parse_options(): Option utf8 is no longer supported, using option nls=utf8. Please use option nls=utf8 in the future and make sure utf8 is compiled either as a module or into the kernel. [ 282.363395][ T1242] ntfs: (device loop2): parse_options(): Invalid mft_zone_multiplier. Using default value, i.e. 1. 05:28:33 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:33 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:33 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@errors_remount='errors=remount-ro'}, {@utf8='utf8'}, {@fmask={'fmask'}}, {@umask={'umask'}}]}) 05:28:33 executing program 0: ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0xc0984124, 0xffffffffffff0000) [ 282.535867][ T1572] FAT-fs (loop5): invalid media value (0x00) [ 282.568499][ T1572] FAT-fs (loop5): Can't find a valid FAT filesystem 05:28:33 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@errors_remount='errors=remount-ro'}, {@utf8='utf8'}, {@fmask={'fmask'}}, {@umask={'umask'}}]}) 05:28:34 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r1 = inotify_init() execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:34 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:34 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) 05:28:34 executing program 0: ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0xc0984124, 0xffffffffffff0000) 05:28:34 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:34 executing program 2: syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001600)={[{@mft_zone_multiplier={'mft_zone_multiplier'}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@dmask={'dmask'}}, {@errors_remount='errors=remount-ro'}, {@utf8='utf8'}, {@fmask={'fmask'}}, {@umask={'umask'}}]}) 05:28:34 executing program 0: ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0xc0984124, 0xffffffffffff0000) [ 282.994160][ T1924] FAT-fs (loop5): invalid media value (0x00) [ 283.012887][ T1924] FAT-fs (loop5): Can't find a valid FAT filesystem 05:28:34 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) 05:28:34 executing program 2: syslog(0x3, &(0x7f0000000000)=""/156, 0x9c) 05:28:34 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x7, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:34 executing program 0: r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) ioctl$RTC_EPOCH_SET(r0, 0xc0984124, 0xffffffffffff0000) 05:28:34 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) [ 283.358741][ T2249] FAT-fs (loop5): invalid media value (0x00) [ 283.367594][ T2249] FAT-fs (loop5): Can't find a valid FAT filesystem 05:28:35 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, 0x0) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r1 = inotify_init() execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:35 executing program 0: r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) ioctl$RTC_EPOCH_SET(r0, 0xc0984124, 0xffffffffffff0000) 05:28:35 executing program 2: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x0, 0x0) ioctl$BLKFLSBUF(r0, 0x1261, 0x0) 05:28:35 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270ff", 0x15}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) 05:28:35 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x7, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:35 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:35 executing program 0: r0 = syz_open_dev$sndpcmc(0x0, 0x0, 0x0) ioctl$RTC_EPOCH_SET(r0, 0xc0984124, 0xffffffffffff0000) 05:28:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syslog(0x2, &(0x7f0000000000)=""/156, 0x9c) [ 283.901488][ T2578] FAT-fs (loop5): invalid media value (0x00) [ 283.918692][ T2578] FAT-fs (loop5): Can't find a valid FAT filesystem 05:28:35 executing program 0: syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0xc0984124, 0xffffffffffff0000) 05:28:35 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:35 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) 05:28:35 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0x7, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:35 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r1 = inotify_init() execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:35 executing program 0: syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0xc0984124, 0xffffffffffff0000) 05:28:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) r1 = syz_open_dev$midi(0x0, 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x82004, 0x0) ioctl$SIOCX25GDTEFACILITIES(0xffffffffffffffff, 0x89ea, &(0x7f0000000200)) write$capi20_data(r1, &(0x7f0000000240)={{0x10, 0x6, 0x84, 0x82, 0x3, 0x9}, 0xd9, "9243d2eddb940b4552b04b728d394976ae410562d7f1ceee6932930349f1693eb8df31598c9701203af2641add5a4d8a11d7910a25519e63612cfd69c0c7d22a8d5f6c0e5564d7f48ebf4c1755a56513de9ee98ff304255b15493a89418eb1cffa74cb4200b2bf5cce1db49a3f66ed53533c659cfd975fa68de3d90f77e367ade90b32ebd7082961f449cd8f08f934cb9258aff003771b2ec96f7186c00490ee8f6aa88848e96deeba79b7eb3a70f2c9268a76b2e4754b9250b6b30da65b4cd9018e57ead6cc2ffc3765026c94b2b9d1ef88092ee1c9c83cd7"}, 0xeb) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 05:28:35 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:35 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) 05:28:35 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xa, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe0000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:36 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) 05:28:36 executing program 0: syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0xc0984124, 0xffffffffffff0000) 05:28:36 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xa, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe0000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:36 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:36 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$RTC_EPOCH_SET(r0, 0xc0984124, 0x0) 05:28:36 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) 05:28:36 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r1 = inotify_init() execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) r1 = syz_open_dev$midi(0x0, 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x82004, 0x0) ioctl$SIOCX25GDTEFACILITIES(0xffffffffffffffff, 0x89ea, &(0x7f0000000200)) write$capi20_data(r1, &(0x7f0000000240)={{0x10, 0x6, 0x84, 0x82, 0x3, 0x9}, 0xd9, "9243d2eddb940b4552b04b728d394976ae410562d7f1ceee6932930349f1693eb8df31598c9701203af2641add5a4d8a11d7910a25519e63612cfd69c0c7d22a8d5f6c0e5564d7f48ebf4c1755a56513de9ee98ff304255b15493a89418eb1cffa74cb4200b2bf5cce1db49a3f66ed53533c659cfd975fa68de3d90f77e367ade90b32ebd7082961f449cd8f08f934cb9258aff003771b2ec96f7186c00490ee8f6aa88848e96deeba79b7eb3a70f2c9268a76b2e4754b9250b6b30da65b4cd9018e57ead6cc2ffc3765026c94b2b9d1ef88092ee1c9c83cd7"}, 0xeb) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 05:28:36 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xa, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe0000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:36 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:36 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$RTC_EPOCH_SET(r0, 0xc0984124, 0x0) 05:28:36 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) 05:28:36 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$RTC_EPOCH_SET(r0, 0xc0984124, 0x0) 05:28:36 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b7000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:37 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) 05:28:37 executing program 0: clone(0x800081102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000140)='threaded\x00', 0x31428f95) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) socketpair(0x0, 0x0, 0x0, 0x0) 05:28:37 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:37 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b7000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:37 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r1 = inotify_init() execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x801, 0x0) r1 = syz_open_dev$midi(0x0, 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x82004, 0x0) ioctl$SIOCX25GDTEFACILITIES(0xffffffffffffffff, 0x89ea, &(0x7f0000000200)) write$capi20_data(r1, &(0x7f0000000240)={{0x10, 0x6, 0x84, 0x82, 0x3, 0x9}, 0xd9, "9243d2eddb940b4552b04b728d394976ae410562d7f1ceee6932930349f1693eb8df31598c9701203af2641add5a4d8a11d7910a25519e63612cfd69c0c7d22a8d5f6c0e5564d7f48ebf4c1755a56513de9ee98ff304255b15493a89418eb1cffa74cb4200b2bf5cce1db49a3f66ed53533c659cfd975fa68de3d90f77e367ade90b32ebd7082961f449cd8f08f934cb9258aff003771b2ec96f7186c00490ee8f6aa88848e96deeba79b7eb3a70f2c9268a76b2e4754b9250b6b30da65b4cd9018e57ead6cc2ffc3765026c94b2b9d1ef88092ee1c9c83cd7"}, 0xeb) ioctl$BLKZEROOUT(r0, 0x127f, &(0x7f0000000080)={0x0, 0x4004400}) 05:28:37 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 05:28:37 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:37 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xc, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b7000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:37 executing program 0: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000100)="1f00000001020104fd4354c007f37fff0a0501000800020004000300ffdf00", 0x1f) 05:28:37 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) [ 286.476892][ T4310] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.0'. [ 286.503100][ T4310] netlink: 'syz-executor.0': attribute type 3 has an invalid length. 05:28:37 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$RTC_EPOCH_SET(r0, 0xc0884123, 0xffffffffffff0000) 05:28:37 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xd, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b700000000000000950000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:37 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:37 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$RTC_EPOCH_SET(r0, 0xc0884123, 0xffffffffffff0000) 05:28:38 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020401ed01000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) 05:28:38 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r1 = inotify_init() execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) 05:28:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0) close(r1) socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000b04000)={0x0, 0x0, 0x0, &(0x7f0000034000)=""/95, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001400)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000d7c000)={0x0, r1}) syz_emit_ethernet(0x32, &(0x7f0000000140)={@random="33e6dcf3c67a", @random="02f126e91642", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast1, @broadcast}, @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "ffb4ee", 0x0, "915b66"}}}}}}, 0x0) 05:28:38 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$RTC_EPOCH_SET(r0, 0xc0884123, 0xffffffffffff0000) 05:28:38 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xd, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b700000000000000950000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:38 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000000, &(0x7f0000000340)={0x2, 0x4e23, @loopback}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x14f) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000001c0)={'ip6erspan0\x00', 0x2}) sendto$inet(r0, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0x652b, 0xc, 0x0, 0x27) 05:28:38 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:38 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$RTC_EPOCH_SET(r0, 0xc0884123, 0xffffffffffff0000) [ 287.582988][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 287.588780][ C0] protocol 88fb is buggy, dev hsr_slave_1 05:28:38 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x0, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:38 executing program 0: ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0xc0884123, 0xffffffffffff0000) 05:28:38 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xd, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b700000000000000950000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000680)=0x10, 0x4) r3 = inotify_init() tee(r2, r1, 0x8, 0x6) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x18}, 0x10) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r3, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) ioctl(r0, 0x5, &(0x7f0000000880)="03a91c55fd619382b5e5c2f33fde5ba8e43fcbf5fe30e36ca4314eafc341d19292828b6f2e4a7dd9636f71b1eb0739ae00493fc42fb70fcbfc56a8a1e1dd2f06b26d95ab09c6abf771ecfeb30565564a5d78f079fb91106c372078e7cdb5ac61410c5d60216a256d0ad1facf5ec1b87167ba19b7a876818da0f062e2191d7686324121f17b1c135f53a3412139588c0d265a74617ff0624dd898470f12ebaa33ad1e86fc") getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x6f, &(0x7f0000000000), &(0x7f0000000080)=0x4) 05:28:38 executing program 5: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x200010c) close(r0) execve(&(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) creat(&(0x7f0000000000)='./file1\x00', 0xffffffffffffffff) setsockopt$inet6_tcp_int(r1, 0x6, 0x200800000000013, &(0x7f0000000280)=0x400100000001, 0xc6) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3103101ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, 0x0, 0x0) [ 287.662988][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 287.668787][ C0] protocol 88fb is buggy, dev hsr_slave_1 05:28:38 executing program 0: ioctl$RTC_EPOCH_SET(0xffffffffffffffff, 0xc0884123, 0xffffffffffff0000) [ 288.063009][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 288.069615][ C0] protocol 88fb is buggy, dev hsr_slave_1 05:28:39 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/null\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in, @in6=@remote}}, {{}, 0x0, @in6=@loopback}}, 0x0) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000840)=0x7fff) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001000000b7050000000000006a0a00fe000000008500000012000000b70000000000000095000000000000004e62"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000280)={0x1f, {0x8, 0xffffffffffff8000, 0xfffffffffffffffe, 0x101, 0x0, 0x200}}) r1 = inotify_init() execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)='syzkaller\x00'], &(0x7f0000000480)=[&(0x7f0000000440)='proc+(-!usereth0trusted([bdevvmnet1bdevem0wlan1\x00']) setxattr$trusted_overlay_origin(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='trusted.overlay.origin\x00', &(0x7f00000005c0)='y\x00', 0x2, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f00000002c0)=0x4, 0x4) readv(r1, &(0x7f0000000040)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1) [ 288.943041][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 288.948813][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 289.102977][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 289.108750][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 293.103029][ C0] net_ratelimit: 18 callbacks suppressed [ 293.103036][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 293.114435][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 293.423015][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 293.428798][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 293.822997][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 293.828777][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 293.903023][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 293.908799][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 294.303029][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 294.308817][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 298.462992][ C0] net_ratelimit: 18 callbacks suppressed [ 298.462999][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 298.474399][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 392.462915][ C1] rcu: INFO: rcu_preempt self-detected stall on CPU [ 392.469555][ C1] rcu: 1-...!: (10499 ticks this GP) idle=412/1/0x4000000000000002 softirq=27549/27549 fqs=537 [ 392.480023][ C1] (t=10501 jiffies g=32285 q=2895) [ 392.485201][ C1] rcu: rcu_preempt kthread starved for 9427 jiffies! g32285 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0 [ 392.496278][ C1] rcu: RCU grace-period kthread stack dump: [ 392.502143][ C1] rcu_preempt R running task 29392 10 2 0x80004000 [ 392.510017][ C1] Call Trace: [ 392.513403][ C1] __schedule+0x755/0x1580 [ 392.517803][ C1] ? __sched_text_start+0x8/0x8 [ 392.522636][ C1] schedule+0xa8/0x270 [ 392.526691][ C1] schedule_timeout+0x486/0xc50 [ 392.531521][ C1] ? rwlock_bug.part.0+0x90/0x90 [ 392.536440][ C1] ? usleep_range+0x170/0x170 [ 392.541095][ C1] ? trace_hardirqs_on+0x67/0x240 [ 392.546097][ C1] ? __kasan_check_read+0x11/0x20 [ 392.551100][ C1] ? __next_timer_interrupt+0x1a0/0x1a0 [ 392.556626][ C1] ? swake_up_one+0x60/0x60 [ 392.561113][ C1] rcu_gp_kthread+0x9b2/0x18c0 [ 392.565869][ C1] ? rcu_barrier+0x310/0x310 [ 392.570437][ C1] ? trace_hardirqs_on+0x67/0x240 [ 392.575458][ C1] ? __kasan_check_read+0x11/0x20 [ 392.580463][ C1] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 392.586679][ C1] ? __kthread_parkme+0x108/0x1c0 [ 392.591686][ C1] ? __kasan_check_read+0x11/0x20 [ 392.596689][ C1] kthread+0x361/0x430 [ 392.600824][ C1] ? rcu_barrier+0x310/0x310 [ 392.605389][ C1] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 392.611605][ C1] ret_from_fork+0x24/0x30 [ 392.616013][ C1] NMI backtrace for cpu 1 [ 392.620323][ C1] CPU: 1 PID: 4961 Comm: vhost-4952 Not tainted 5.3.0-rc1-next-20190725 #52 [ 392.628968][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 392.638998][ C1] Call Trace: [ 392.642256][ C1] [ 392.645150][ C1] dump_stack+0x172/0x1f0 [ 392.649460][ C1] nmi_cpu_backtrace.cold+0x70/0xb2 [ 392.654648][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 392.660870][ C1] ? lapic_can_unplug_cpu.cold+0x45/0x45 [ 392.666479][ C1] nmi_trigger_cpumask_backtrace+0x23b/0x28b [ 392.672443][ C1] arch_trigger_cpumask_backtrace+0x14/0x20 [ 392.678319][ C1] rcu_dump_cpu_stacks+0x183/0x1cf [ 392.683416][ C1] rcu_sched_clock_irq.cold+0x4dd/0xc13 [ 392.688954][ C1] ? raise_softirq+0x138/0x340 [ 392.693717][ C1] update_process_times+0x32/0x80 [ 392.698739][ C1] tick_sched_handle+0xa2/0x190 [ 392.703565][ C1] tick_sched_timer+0x53/0x140 [ 392.708306][ C1] __hrtimer_run_queues+0x364/0xe40 [ 392.713484][ C1] ? tick_sched_do_timer+0x1b0/0x1b0 [ 392.718751][ C1] ? hrtimer_start_range_ns+0xcb0/0xcb0 [ 392.724276][ C1] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 392.729971][ C1] ? ktime_get_update_offsets_now+0x2d3/0x440 [ 392.736034][ C1] hrtimer_interrupt+0x314/0x770 [ 392.740956][ C1] smp_apic_timer_interrupt+0x160/0x610 [ 392.746586][ C1] apic_timer_interrupt+0xf/0x20 [ 392.751498][ C1] [ 392.754416][ C1] RIP: 0010:native_queued_spin_lock_slowpath+0x132/0x9f0 [ 392.761427][ C1] Code: 00 00 00 48 8b 45 d0 65 48 33 04 25 28 00 00 00 0f 85 37 07 00 00 48 81 c4 98 00 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 f3 90 73 ff ff ff 8b 45 98 4c 8d 65 d8 3d 00 01 00 00 0f 84 e5 00 00 [ 392.781007][ C1] RSP: 0018:ffff888059d07968 EFLAGS: 00000202 ORIG_RAX: ffffffffffffff13 [ 392.789397][ C1] RAX: 0000000000000000 RBX: ffff888051da51e0 RCX: ffffffff81599777 [ 392.797345][ C1] RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffff888051da51e0 [ 392.805290][ C1] RBP: ffff888059d07a28 R08: 1ffff1100a3b4a3c R09: ffffed100a3b4a3d [ 392.813254][ C1] R10: ffffed100a3b4a3c R11: ffff888051da51e3 R12: 0000000000000001 [ 392.821202][ C1] R13: 0000000000000003 R14: ffffed100a3b4a3c R15: 0000000000000001 [ 392.829160][ C1] ? native_queued_spin_lock_slowpath+0xb7/0x9f0 [ 392.835479][ C1] ? native_queued_spin_lock_slowpath+0xb7/0x9f0 [ 392.841837][ C1] ? handle_rx+0x109/0x1890 [ 392.846319][ C1] ? __pv_queued_spin_lock_slowpath+0xd10/0xd10 [ 392.852643][ C1] ? mark_held_locks+0xf0/0xf0 [ 392.857389][ C1] do_raw_spin_lock+0x20e/0x2e0 [ 392.862220][ C1] ? rwlock_bug.part.0+0x90/0x90 [ 392.867134][ C1] ? lock_acquire+0x190/0x410 [ 392.871819][ C1] ? vq_meta_prefetch+0x2a0/0xcb0 [ 392.876825][ C1] _raw_spin_lock+0x37/0x40 [ 392.881306][ C1] ? vq_meta_prefetch+0x2a0/0xcb0 [ 392.886923][ C1] vq_meta_prefetch+0x2a0/0xcb0 [ 392.891756][ C1] ? x2apic_send_IPI+0xb6/0x110 [ 392.896589][ C1] handle_rx+0x145/0x1890 [ 392.900904][ C1] ? finish_task_switch+0x147/0x720 [ 392.906081][ C1] ? __kasan_check_read+0x11/0x20 [ 392.911085][ C1] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 392.917301][ C1] ? __perf_event_task_sched_in+0x1cb/0x820 [ 392.923172][ C1] ? __perf_event_task_sched_out+0x1ff/0x1810 [ 392.929229][ C1] ? lock_downgrade+0x920/0x920 [ 392.934060][ C1] ? vhost_net_busy_poll+0x6a0/0x6a0 [ 392.939324][ C1] ? trace_hardirqs_off+0x1e0/0x240 [ 392.944497][ C1] ? __kasan_check_read+0x11/0x20 [ 392.949517][ C1] ? _raw_spin_unlock_irq+0x5e/0x90 [ 392.954691][ C1] ? smpboot_thread_fn+0x670/0xa40 [ 392.959876][ C1] ? finish_task_switch+0x119/0x720 [ 392.965056][ C1] ? __schedule+0x75d/0x1580 [ 392.969650][ C1] handle_rx_net+0x19/0x20 [ 392.974045][ C1] vhost_worker+0x2af/0x4d0 [ 392.978537][ C1] ? vhost_dev_init+0x930/0x930 [ 392.983364][ C1] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 392.989594][ C1] ? __kthread_parkme+0x108/0x1c0 [ 392.994597][ C1] ? __kasan_check_read+0x11/0x20 [ 392.999600][ C1] kthread+0x361/0x430 [ 393.003659][ C1] ? vhost_dev_init+0x930/0x930 [ 393.008486][ C1] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 393.014705][ C1] ret_from_fork+0x24/0x30