file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) 14:25:20 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) 14:25:20 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0x9b00, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:20 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0x9c00, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:20 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0x9d00, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:20 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) 14:25:20 executing program 5: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) 14:25:21 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() 14:25:21 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() 14:25:21 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0x9e00, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) [ 959.118687][T24898] xt_check_match: 10 callbacks suppressed [ 959.118700][T24898] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:21 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) getpid() 14:25:21 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0x9f00, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) [ 959.411064][T25012] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:21 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xa000, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) [ 959.634926][T25123] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:21 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xa100, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:21 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) getpid() [ 959.824031][T25231] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:22 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) 14:25:22 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xa200, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:22 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) 14:25:22 executing program 5: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) [ 960.162454][T25342] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:22 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 14:25:22 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xa300, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) [ 960.446224][T25454] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:22 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xa400, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) [ 960.749834][T25567] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:22 executing program 2: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0xf3, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0x1, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:23 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) 14:25:23 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xa500, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:23 executing program 0: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xa400, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:23 executing program 5: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) 14:25:23 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) [ 961.101490][T25674] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 961.119299][T25677] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:23 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)) [ 961.219516][T25685] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:23 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) 14:25:23 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xa600, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:23 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xa700, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:23 executing program 5: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) 14:25:23 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) getpid() 14:25:24 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) 14:25:24 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) 14:25:24 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xa800, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:24 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xa900, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:24 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) 14:25:24 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xaa00, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:24 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) 14:25:24 executing program 5: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) socket$inet_udplite(0x2, 0x2, 0x88) 14:25:24 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xab00, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:25 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xac00, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:25 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) socket$inet_udplite(0x2, 0x2, 0x88) 14:25:25 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() 14:25:25 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() 14:25:25 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() 14:25:25 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xad00, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:25 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xae00, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:25 executing program 5: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) 14:25:25 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xaf00, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:26 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xb000, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:26 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)) [ 964.177857][T26905] xt_check_match: 10 callbacks suppressed [ 964.177869][T26905] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:26 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() 14:25:26 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xb100, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:26 executing program 4: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xb000, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) [ 964.521615][T27016] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:26 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xb200, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:26 executing program 5: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) getpid() [ 964.731034][T27124] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:27 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) 14:25:27 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xb300, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) [ 964.999298][T27234] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 965.032552][T27237] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:27 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) 14:25:27 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) getpid() 14:25:27 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) 14:25:27 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xb400, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) [ 965.362458][T27355] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:27 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xb500, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) [ 965.687420][T27466] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:27 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) 14:25:27 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xb600, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:28 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) 14:25:28 executing program 5: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) 14:25:28 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) [ 965.972800][T27572] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:28 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) 14:25:28 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xb700, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) [ 966.356420][T27692] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:28 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xb800, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) [ 966.633369][T27799] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:28 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) socket$inet_udplite(0x2, 0x2, 0x88) 14:25:28 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) 14:25:28 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xb900, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:28 executing program 1: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xb800, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:29 executing program 5: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) 14:25:29 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) 14:25:29 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xba00, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:29 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xbb00, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:29 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) 14:25:29 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)) 14:25:29 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xbc00, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:29 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)) 14:25:30 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xbd00, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:30 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) 14:25:30 executing program 5: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) socket$inet_udplite(0x2, 0x2, 0x88) 14:25:30 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xbe00, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:30 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() 14:25:30 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xbf00, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:31 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xc000, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:31 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xc100, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:31 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) 14:25:31 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) 14:25:31 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) 14:25:31 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) 14:25:31 executing program 5: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) socket(0x10, 0x3, 0x0) [ 969.400113][T28799] xt_check_match: 9 callbacks suppressed [ 969.400124][T28799] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:31 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xc200, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) [ 969.771927][T28915] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:32 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xc300, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:32 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) socket(0x10, 0x3, 0x0) 14:25:32 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) socket$inet_udplite(0x2, 0x2, 0x88) 14:25:32 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) socket$inet_udplite(0x2, 0x2, 0x88) 14:25:32 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) [ 970.043958][T29020] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:32 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xc400, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) [ 970.244117][T29128] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:32 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xc500, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:32 executing program 5: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) [ 970.563996][T29243] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:32 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xc600, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) [ 970.957760][T29356] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:33 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) 14:25:33 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) 14:25:33 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xc700, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:33 executing program 5: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)) 14:25:33 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) [ 971.328915][T29467] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:33 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) 14:25:33 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xc800, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) [ 971.727001][T29586] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:33 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) 14:25:34 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xc900, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) [ 972.007822][T29696] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:34 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xca00, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:34 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) 14:25:34 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) [ 972.209305][T29802] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:34 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xcb00, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:34 executing program 5: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) 14:25:34 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) 14:25:34 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xcc00, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:34 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) 14:25:35 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xcd00, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:35 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) socket$inet_udplite(0x2, 0x2, 0x88) 14:25:35 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) 14:25:35 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xce00, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:35 executing program 5: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) socket$inet_icmp_raw(0x2, 0x3, 0x1) 14:25:35 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) socket(0x10, 0x3, 0x0) 14:25:35 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xcf00, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:35 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) socket(0x10, 0x3, 0x0) 14:25:36 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xd000, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:36 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) socket$inet_icmp_raw(0x2, 0x3, 0x1) 14:25:36 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xd100, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:36 executing program 5: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)) 14:25:36 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xd200, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) [ 974.474797][T30684] xt_check_match: 7 callbacks suppressed [ 974.474810][T30684] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:36 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) socket(0x10, 0x3, 0x0) 14:25:37 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) 14:25:37 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)) 14:25:37 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xd300, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:37 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)) 14:25:37 executing program 5: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) [ 975.152515][T30804] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:37 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xd400, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:37 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)) [ 975.447515][T30918] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:37 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xd500, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:37 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) 14:25:37 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) [ 975.819939][T31027] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:38 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xd600, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:38 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) [ 976.176405][T31140] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:38 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xd700, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:38 executing program 5: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) [ 976.418565][T31249] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:38 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) 14:25:38 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) 14:25:38 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xd800, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) [ 976.696365][T31359] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:38 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xd801, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:38 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) [ 976.933110][T31470] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:39 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xd900, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) [ 977.332809][T31580] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:39 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) 14:25:39 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) 14:25:39 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xda00, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:39 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) 14:25:39 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) 14:25:39 executing program 5: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)) [ 977.571008][T31687] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:39 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xdb00, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:40 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xdc00, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:40 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xdd00, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:40 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) socket(0x10, 0x3, 0x0) 14:25:40 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xde00, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:40 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) 14:25:40 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) r35 = socket(0x10, 0x3, 0x0) close(r35) 14:25:40 executing program 5: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) r35 = socket(0x10, 0x3, 0x0) close(r35) socket$inet_icmp_raw(0x2, 0x3, 0x1) 14:25:40 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) r35 = socket(0x10, 0x3, 0x0) close(r35) r36 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r36) 14:25:41 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xdf00, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:41 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xe000, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:41 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xe100, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:41 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) r35 = socket(0x10, 0x3, 0x0) close(r35) r36 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r36) 14:25:41 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) r35 = socket(0x10, 0x3, 0x0) close(r35) r36 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r36) [ 979.693787][T32464] xt_check_match: 6 callbacks suppressed [ 979.693800][T32464] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:42 executing program 5: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) r35 = socket(0x10, 0x3, 0x0) close(r35) r36 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r36) tee(r35, r36, 0x5, 0x0) 14:25:42 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xe200, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:42 executing program 2: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xe100, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:42 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) r35 = socket(0x10, 0x3, 0x0) close(r35) r36 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r36) tee(r35, r36, 0x5, 0x0) [ 980.172711][T32576] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:42 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) r35 = socket(0x10, 0x3, 0x0) close(r35) r36 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r36) tee(r35, r36, 0x5, 0x0) 14:25:42 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) [ 980.366086][T32687] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:42 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xe300, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) [ 980.707727][T32700] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:42 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) 14:25:42 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xe400, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) [ 980.978727][ T338] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:43 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xe500, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:43 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) r35 = socket(0x10, 0x3, 0x0) close(r35) r36 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r36) tee(r35, r36, 0x5, 0x0) pipe(&(0x7f0000000200)) [ 981.257769][ T447] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:43 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xe600, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) [ 981.453650][ T553] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:43 executing program 5: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) 14:25:43 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) r35 = socket(0x10, 0x3, 0x0) close(r35) r36 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r36) 14:25:43 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xe700, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:43 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) r35 = socket(0x10, 0x3, 0x0) close(r35) r36 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r36) 14:25:43 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) [ 981.882121][ T669] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:44 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xe800, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:44 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) r35 = socket(0x10, 0x3, 0x0) close(r35) r36 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r36) tee(r35, r36, 0x5, 0x0) pipe(&(0x7f0000000200)) [ 982.150185][ T779] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:44 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xe900, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:44 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) r35 = socket(0x10, 0x3, 0x0) close(r35) r36 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r36) tee(r35, r36, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r37, &(0x7f0000000100)={0x14}, 0x14) [ 982.345608][ T884] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:44 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) r35 = socket(0x10, 0x3, 0x0) close(r35) r36 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r36) tee(r35, r36, 0x5, 0x0) 14:25:44 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xea00, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:44 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xeb00, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:44 executing program 5: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) socket(0x10, 0x3, 0x0) 14:25:45 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) socket(0x10, 0x3, 0x0) 14:25:45 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xec00, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:45 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) r35 = socket(0x10, 0x3, 0x0) close(r35) r36 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r36) 14:25:45 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xed00, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:45 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) r35 = socket(0x10, 0x3, 0x0) close(r35) r36 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r36) tee(r35, r36, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r37, &(0x7f0000000100)={0x14}, 0x14) r38 = socket$inet_udplite(0x2, 0x2, 0x88) close(r38) 14:25:45 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) r35 = socket(0x10, 0x3, 0x0) close(r35) r36 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r36) tee(r35, r36, 0x5, 0x0) 14:25:45 executing program 5: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) r35 = socket(0x10, 0x3, 0x0) close(r35) r36 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r36) tee(r35, r36, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r37, &(0x7f0000000100)={0x14}, 0x14) socket$inet_udplite(0x2, 0x2, 0x88) 14:25:45 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xee00, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:46 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xef00, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:46 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) r35 = socket(0x10, 0x3, 0x0) close(r35) r36 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r36) tee(r35, r36, 0x5, 0x0) pipe(&(0x7f0000000200)) 14:25:46 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) r35 = socket(0x10, 0x3, 0x0) close(r35) r36 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r36) tee(r35, r36, 0x5, 0x0) pipe(&(0x7f0000000200)) 14:25:46 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xf000, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:46 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) r35 = socket(0x10, 0x3, 0x0) close(r35) r36 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r36) tee(r35, r36, 0x5, 0x0) pipe(&(0x7f0000000200)) 14:25:46 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xf100, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:46 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) r35 = socket(0x10, 0x3, 0x0) close(r35) r36 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r36) tee(r35, r36, 0x5, 0x0) pipe(&(0x7f0000000200)) 14:25:46 executing program 5: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) r35 = socket(0x10, 0x3, 0x0) close(r35) r36 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r36) tee(r35, r36, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r37, &(0x7f0000000100)={0x14}, 0x14) [ 984.801039][ T1810] xt_check_match: 7 callbacks suppressed [ 984.801049][ T1810] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:47 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xf200, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) [ 985.212647][ T1927] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:47 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xf300, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:47 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) r35 = socket(0x10, 0x3, 0x0) close(r35) r36 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r36) tee(r35, r36, 0x5, 0x0) 14:25:47 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) r35 = socket(0x10, 0x3, 0x0) close(r35) r36 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r36) tee(r35, r36, 0x5, 0x0) 14:25:47 executing program 5: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) r35 = socket(0x10, 0x3, 0x0) close(r35) r36 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r36) tee(r35, r36, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r37, &(0x7f0000000100)={0x14}, 0x14) r38 = socket$inet_udplite(0x2, 0x2, 0x88) close(r38) [ 985.552935][ T2034] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:47 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) r35 = socket(0x10, 0x3, 0x0) close(r35) r36 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r36) tee(r35, r36, 0x5, 0x0) pipe(&(0x7f0000000200)) 14:25:47 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xf400, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) [ 985.782079][ T2144] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:48 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) r35 = socket(0x10, 0x3, 0x0) close(r35) r36 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r36) tee(r35, r36, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r37, &(0x7f0000000100)={0x14}, 0x14) r38 = socket$inet_udplite(0x2, 0x2, 0x88) close(r38) openat$dir(0xffffffffffffff9c, &(0x7f0000001640)='./bus/file1\x00', 0x2d80c1, 0x198) 14:25:48 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xf500, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) [ 986.145460][ T2259] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:48 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) r35 = socket(0x10, 0x3, 0x0) close(r35) r36 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r36) tee(r35, r36, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r37, &(0x7f0000000100)={0x14}, 0x14) r38 = socket$inet_udplite(0x2, 0x2, 0x88) close(r38) openat$dir(0xffffffffffffff9c, &(0x7f0000001640)='./bus/file1\x00', 0x2d80c1, 0x198) 14:25:48 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xf600, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:48 executing program 5: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) r35 = socket(0x10, 0x3, 0x0) close(r35) r36 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r36) tee(r35, r36, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r37, &(0x7f0000000100)={0x14}, 0x14) r38 = socket$inet_udplite(0x2, 0x2, 0x88) close(r38) openat$dir(0xffffffffffffff9c, &(0x7f0000001640)='./bus/file1\x00', 0x2d80c1, 0x198) 14:25:48 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) r35 = socket(0x10, 0x3, 0x0) close(r35) r36 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r36) tee(r35, r36, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r37, &(0x7f0000000100)={0x14}, 0x14) r38 = socket$inet_udplite(0x2, 0x2, 0x88) close(r38) openat$dir(0xffffffffffffff9c, &(0x7f0000001640)='./bus/file1\x00', 0x2d80c1, 0x198) [ 986.485623][ T2368] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:48 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xf700, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:48 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) r35 = socket(0x10, 0x3, 0x0) close(r35) r36 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r36) tee(r35, r36, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r37, &(0x7f0000000100)={0x14}, 0x14) r38 = socket$inet_udplite(0x2, 0x2, 0x88) close(r38) openat$dir(0xffffffffffffff9c, &(0x7f0000001640)='./bus/file1\x00', 0x2d80c1, 0x198) [ 986.821283][ T2484] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:49 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) r35 = socket(0x10, 0x3, 0x0) close(r35) r36 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r36) tee(r35, r36, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r37, &(0x7f0000000100)={0x14}, 0x14) r38 = socket$inet_udplite(0x2, 0x2, 0x88) close(r38) 14:25:49 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xf800, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) [ 987.107389][ T2600] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:49 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) r35 = socket(0x10, 0x3, 0x0) close(r35) r36 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r36) tee(r35, r36, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r37, &(0x7f0000000100)={0x14}, 0x14) r38 = socket$inet_udplite(0x2, 0x2, 0x88) close(r38) openat$dir(0xffffffffffffff9c, &(0x7f0000001640)='./bus/file1\x00', 0x2d80c1, 0x198) 14:25:49 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xf900, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) [ 987.425569][ T2716] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:49 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) r35 = socket(0x10, 0x3, 0x0) close(r35) r36 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r36) tee(r35, r36, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r37, &(0x7f0000000100)={0x14}, 0x14) r38 = socket$inet_udplite(0x2, 0x2, 0x88) close(r38) openat$dir(0xffffffffffffff9c, &(0x7f0000001640)='./bus/file1\x00', 0x2d80c1, 0x198) r39 = socket$inet_udplite(0x2, 0x2, 0x88) close(r39) 14:25:49 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xfa00, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) [ 987.747784][ T2831] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:49 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) r35 = socket(0x10, 0x3, 0x0) close(r35) r36 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r36) tee(r35, r36, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r37, &(0x7f0000000100)={0x14}, 0x14) r38 = socket$inet_udplite(0x2, 0x2, 0x88) close(r38) openat$dir(0xffffffffffffff9c, &(0x7f0000001640)='./bus/file1\x00', 0x2d80c1, 0x198) r39 = socket$inet_udplite(0x2, 0x2, 0x88) close(r39) 14:25:49 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xfb00, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:50 executing program 5: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) r35 = socket(0x10, 0x3, 0x0) close(r35) r36 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r36) tee(r35, r36, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r37, &(0x7f0000000100)={0x14}, 0x14) r38 = socket$inet_udplite(0x2, 0x2, 0x88) close(r38) openat$dir(0xffffffffffffff9c, &(0x7f0000001640)='./bus/file1\x00', 0x2d80c1, 0x198) socket$inet_udplite(0x2, 0x2, 0x88) 14:25:50 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) r35 = socket(0x10, 0x3, 0x0) close(r35) r36 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r36) tee(r35, r36, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r37, &(0x7f0000000100)={0x14}, 0x14) r38 = socket$inet_udplite(0x2, 0x2, 0x88) close(r38) openat$dir(0xffffffffffffff9c, &(0x7f0000001640)='./bus/file1\x00', 0x2d80c1, 0x198) r39 = socket$inet_udplite(0x2, 0x2, 0x88) close(r39) 14:25:50 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) r35 = socket(0x10, 0x3, 0x0) close(r35) r36 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r36) tee(r35, r36, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r37, &(0x7f0000000100)={0x14}, 0x14) r38 = socket$inet_udplite(0x2, 0x2, 0x88) close(r38) openat$dir(0xffffffffffffff9c, &(0x7f0000001640)='./bus/file1\x00', 0x2d80c1, 0x198) socket$inet_udplite(0x2, 0x2, 0x88) 14:25:50 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xfc00, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:50 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) r35 = socket(0x10, 0x3, 0x0) close(r35) r36 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r36) tee(r35, r36, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r37, &(0x7f0000000100)={0x14}, 0x14) r38 = socket$inet_udplite(0x2, 0x2, 0x88) close(r38) openat$dir(0xffffffffffffff9c, &(0x7f0000001640)='./bus/file1\x00', 0x2d80c1, 0x198) socket$inet_udplite(0x2, 0x2, 0x88) 14:25:50 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xfd00, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:50 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) r35 = socket(0x10, 0x3, 0x0) close(r35) r36 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r36) tee(r35, r36, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r37, &(0x7f0000000100)={0x14}, 0x14) r38 = socket$inet_udplite(0x2, 0x2, 0x88) close(r38) 14:25:50 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xfe00, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:51 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0xff00, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:51 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) r35 = socket(0x10, 0x3, 0x0) close(r35) r36 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r36) tee(r35, r36, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r37, &(0x7f0000000100)={0x14}, 0x14) r38 = socket$inet_udplite(0x2, 0x2, 0x88) close(r38) 14:25:51 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) r35 = socket(0x10, 0x3, 0x0) close(r35) r36 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r36) tee(r35, r36, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r37, &(0x7f0000000100)={0x14}, 0x14) r38 = socket$inet_udplite(0x2, 0x2, 0x88) close(r38) openat$dir(0xffffffffffffff9c, &(0x7f0000001640)='./bus/file1\x00', 0x2d80c1, 0x198) r39 = socket$inet_udplite(0x2, 0x2, 0x88) close(r39) getpid() 14:25:51 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0x1, 0x0, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:51 executing program 5: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) r35 = socket(0x10, 0x3, 0x0) close(r35) r36 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r36) tee(r35, r36, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r37, &(0x7f0000000100)={0x14}, 0x14) r38 = socket$inet_udplite(0x2, 0x2, 0x88) close(r38) openat$dir(0xffffffffffffff9c, &(0x7f0000001640)='./bus/file1\x00', 0x2d80c1, 0x198) r39 = socket$inet_udplite(0x2, 0x2, 0x88) close(r39) getpid() 14:25:51 executing program 0: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) r35 = socket(0x10, 0x3, 0x0) close(r35) r36 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r36) tee(r35, r36, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r37, &(0x7f0000000100)={0x14}, 0x14) r38 = socket$inet_udplite(0x2, 0x2, 0x88) close(r38) openat$dir(0xffffffffffffff9c, &(0x7f0000001640)='./bus/file1\x00', 0x2d80c1, 0x198) r39 = socket$inet_udplite(0x2, 0x2, 0x88) close(r39) getpid() 14:25:51 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0x1, 0x2, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) [ 989.889700][ T3673] xt_check_match: 6 callbacks suppressed [ 989.889712][ T3673] x_tables: ip_tables: icmp match: only valid for protocol 1 14:25:52 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) r35 = socket(0x10, 0x3, 0x0) close(r35) r36 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r36) tee(r35, r36, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r37, &(0x7f0000000100)={0x14}, 0x14) r38 = socket$inet_udplite(0x2, 0x2, 0x88) close(r38) openat$dir(0xffffffffffffff9c, &(0x7f0000001640)='./bus/file1\x00', 0x2d80c1, 0x198) r39 = socket$inet_udplite(0x2, 0x2, 0x88) close(r39) [ 990.020240][ T7939] ================================================================== [ 990.028406][ T7939] BUG: KCSAN: data-race in rq_depth_calc_max_depth / wbt_inflight_cb [ 990.036465][ T7939] [ 990.038850][ T7939] write to 0xffff88812917f9e0 of 4 bytes by interrupt on cpu 0: [ 990.046493][ T7939] rq_depth_calc_max_depth+0xa5/0x160 [ 990.051890][ T7939] rq_depth_scale_up+0x71/0xa0 [ 990.056978][ T7939] scale_up+0x40/0x250 [ 990.061061][ T7939] wb_timer_fn+0x2cd/0xad0 [ 990.065490][ T7939] blk_stat_timer_fn+0x3b0/0x3d0 [ 990.070441][ T7939] call_timer_fn+0x5f/0x2f0 [ 990.075490][ T7939] run_timer_softirq+0xbe3/0xcb0 [ 990.080552][ T7939] __do_softirq+0x115/0x33f [ 990.085084][ T7939] irq_exit+0xbb/0xe0 [ 990.089121][ T7939] smp_apic_timer_interrupt+0xe6/0x280 [ 990.094627][ T7939] apic_timer_interrupt+0xf/0x20 [ 990.099585][ T7939] __sanitizer_cov_trace_pc+0x48/0x50 [ 990.105004][ T7939] iov_iter_init+0x36/0x120 [ 990.111254][ T7939] new_sync_write+0x364/0x4a0 [ 990.115953][ T7939] __vfs_write+0xb1/0xc0 [ 990.120273][ T7939] vfs_write+0x18a/0x390 [ 990.124554][ T7939] ksys_write+0x17b/0x1b0 [ 990.128919][ T7939] __x64_sys_write+0x4c/0x60 [ 990.133529][ T7939] do_syscall_64+0xcc/0x3a0 [ 990.138090][ T7939] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 990.144093][ T7939] [ 990.146434][ T7939] read to 0xffff88812917f9e0 of 4 bytes by task 7939 on cpu 1: [ 990.154081][ T7939] wbt_inflight_cb+0xc0/0x230 [ 990.158810][ T7939] rq_qos_wait+0x283/0x320 [ 990.163238][ T7939] wbt_wait+0x161/0x250 [ 990.167447][ T7939] __rq_qos_throttle+0x47/0x70 [ 990.172259][ T7939] blk_mq_make_request+0x29c/0xf60 [ 990.177394][ T7939] generic_make_request+0x196/0x700 [ 990.182610][ T7939] submit_bio+0x96/0x3c0 [ 990.186918][ T7939] submit_bh_wbc+0x40f/0x460 [ 990.191580][ T7939] __block_write_full_page+0x4e9/0x870 [ 990.197157][ T7939] block_write_full_page+0x1c0/0x1e0 [ 990.202472][ T7939] blkdev_writepage+0x2e/0x40 [ 990.207159][ T7939] __writepage+0x40/0xb0 [ 990.211428][ T7939] write_cache_pages+0x47a/0xb40 [ 990.216402][ T7939] generic_writepages+0x79/0xc0 [ 990.221272][ T7939] blkdev_writepages+0x27/0x40 [ 990.226067][ T7939] do_writepages+0x6b/0x170 [ 990.230677][ T7939] __filemap_fdatawrite_range+0x1c5/0x230 [ 990.236412][ T7939] filemap_flush+0x2d/0x40 [ 990.240847][ T7939] __sync_blockdev+0x81/0x90 [ 990.245743][ T7939] sync_filesystem+0x116/0x1a0 [ 990.250522][ T7939] ovl_sync_fs+0x92/0xa0 [ 990.254791][ T7939] sync_filesystem+0x168/0x1a0 [ 990.259572][ T7939] generic_shutdown_super+0x6b/0x270 [ 990.264953][ T7939] kill_anon_super+0x2f/0x50 [ 990.269819][ T7939] deactivate_locked_super+0x64/0xb0 [ 990.275110][ T7939] deactivate_super+0xca/0xe0 [ 990.279814][ T7939] cleanup_mnt+0x291/0x340 [ 990.284256][ T7939] __cleanup_mnt+0x1f/0x30 [ 990.288777][ T7939] task_work_run+0xf6/0x130 [ 990.293282][ T7939] exit_to_usermode_loop+0x2b4/0x2c0 [ 990.298610][ T7939] do_syscall_64+0x384/0x3a0 [ 990.303207][ T7939] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 990.309116][ T7939] [ 990.311440][ T7939] Reported by Kernel Concurrency Sanitizer on: [ 990.317600][ T7939] CPU: 1 PID: 7939 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 990.326186][ T7939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 990.336252][ T7939] ================================================================== [ 990.344344][ T7939] Kernel panic - not syncing: panic_on_warn set ... [ 990.350938][ T7939] CPU: 1 PID: 7939 Comm: syz-executor.4 Not tainted 5.5.0-rc1-syzkaller #0 [ 990.359973][ T7939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 990.370028][ T7939] Call Trace: [ 990.373418][ T7939] dump_stack+0x11d/0x181 [ 990.377780][ T7939] panic+0x210/0x640 [ 990.381692][ T7939] ? btrfs_balance+0x753/0x25f0 [ 990.386556][ T7939] ? vprintk_func+0x8d/0x140 [ 990.391163][ T7939] kcsan_report.cold+0xc/0x15 [ 990.395870][ T7939] kcsan_setup_watchpoint+0x2e2/0x380 [ 990.401265][ T7939] __tsan_read4+0xc6/0x100 [ 990.405847][ T7939] wbt_inflight_cb+0xc0/0x230 [ 990.410532][ T7939] ? wbt_cleanup_cb+0x50/0x50 [ 990.415217][ T7939] rq_qos_wait+0x283/0x320 14:25:52 executing program 2: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) r35 = socket(0x10, 0x3, 0x0) close(r35) r36 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r36) tee(r35, r36, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r37, &(0x7f0000000100)={0x14}, 0x14) r38 = socket$inet_udplite(0x2, 0x2, 0x88) close(r38) openat$dir(0xffffffffffffff9c, &(0x7f0000001640)='./bus/file1\x00', 0x2d80c1, 0x198) r39 = socket$inet_udplite(0x2, 0x2, 0x88) close(r39) 14:25:52 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0x1, 0x3, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) 14:25:52 executing program 1: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='lowerdir=./bus,workdir=./file1,upperdir=./file0']) chdir(&(0x7f00000002c0)='./bus\x00') mkdir(&(0x7f0000000180)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./bus/file1\x00', 0x0) rename(&(0x7f00000000c0)='./bus/file1\x00', &(0x7f0000000140)='./file1\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r0, &(0x7f0000000100)={0x14}, 0x14) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r2, 0x4, 0x42000) r3 = getuid() fchown(r2, r3, 0x0) fsetxattr$security_capability(r1, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r3}, 0x18, 0x3) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r5, r7) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r8, &(0x7f0000000100)={0x14}, 0x14) r9 = perf_event_open(&(0x7f0000000180)={0x6, 0x70}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000003c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0xd52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0x2, 0x5, 0x2}, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x7}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000fc0)={0x0, r9, 0x0, 0x16, &(0x7f0000000f80)='self\x05<\x8b+K-\x00', r10}, 0xfffffffffffffe09) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)={r10}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0x0, r8, 0x0, 0xe, &(0x7f00000008c0)='.{eth0-cgroup\x00', r10}, 0x30) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000940)={{{@in6=@remote, @in6=@empty}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000000a40)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r11, &(0x7f0000000100)={0x14}, 0x14) getsockopt$sock_cred(r11, 0x1, 0x11, &(0x7f0000000a80), &(0x7f0000000ac0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r12, &(0x7f0000000100)={0x14}, 0x14) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r13, &(0x7f0000000100)={0x14}, 0x14) r14 = socket$inet_udplite(0x2, 0x2, 0x88) close(r14) openat$nvram(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/nvram\x00', 0x200800, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/cuse\x00', 0x2, 0x0) r15 = getpid() sched_setscheduler(r15, 0x5, &(0x7f00000002c0)) r16 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r16, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000f80)={0x48, 0x2, 0x6, 0x1, 0x0, 0x0, {}, [@IPSET_ATTR_TYPENAME={0x10, 0x3, 'hash:ip,mac\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}}, 0x0) r17 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r17, 0x4, 0x42000) r18 = getuid() fchown(r17, r18, 0x0) fsetxattr$security_capability(r16, &(0x7f0000000080)='security.capability\x00', &(0x7f00000000c0)=@v3={0x3000000, [{0x800, 0x81}, {0x80, 0x5}], r18}, 0x18, 0x3) lstat(&(0x7f0000000b80)='./file1\x00', &(0x7f0000000bc0)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000c40)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r19, &(0x7f0000000100)={0x14}, 0x14) ioctl$NS_GET_OWNER_UID(r19, 0xb704, &(0x7f0000000cc0)) r20 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r20, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) r22 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r22, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) keyctl$chown(0x4, 0x0, r21, r23) syz_init_net_socket$x25(0x9, 0x5, 0x0) r24 = socket$inet_udplite(0x2, 0x2, 0x88) close(r24) r25 = getpid() sched_setscheduler(r25, 0x5, &(0x7f00000002c0)) r26 = getpid() sched_setscheduler(r26, 0x5, &(0x7f00000002c0)) r27 = getpid() sched_setscheduler(r27, 0x5, &(0x7f00000002c0)) r28 = getpid() sched_setscheduler(r28, 0x5, &(0x7f00000002c0)) clone3(&(0x7f0000000f80)={0x11000, &(0x7f0000000d00), &(0x7f0000000d40), &(0x7f0000000d80), {0x37}, &(0x7f0000000dc0)=""/88, 0x58, &(0x7f0000000e40)=""/211, &(0x7f0000000f40)=[r25, r26, 0xffffffffffffffff, r27, r28, 0x0], 0x6}, 0x50) geteuid() stat(&(0x7f0000001000)='./file0\x00', &(0x7f0000001040)) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r29, &(0x7f0000000100)={0x14}, 0x14) r30 = socket$inet_udplite(0x2, 0x2, 0x88) close(r30) syz_open_dev$mice(&(0x7f00000010c0)='/dev/input/mice\x00', 0x0, 0x600000) openat$ppp(0xffffffffffffff9c, &(0x7f0000001100)='/dev/ppp\x00', 0x4358c2, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000001140)='syz1\x00', 0x200002, 0x0) r31 = socket(0x10, 0x3, 0x0) close(r31) r32 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r32) tee(r31, r32, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r33, &(0x7f0000000100)={0x14}, 0x14) socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r34, &(0x7f0000000100)={0x14}, 0x14) ioctl$TIOCGPTPEER(r34, 0x5441, 0x1) r35 = socket(0x10, 0x3, 0x0) close(r35) r36 = socket$inet_icmp_raw(0x2, 0x3, 0x1) close(r36) tee(r35, r36, 0x5, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RAUTH(r37, &(0x7f0000000100)={0x14}, 0x14) r38 = socket$inet_udplite(0x2, 0x2, 0x88) close(r38) openat$dir(0xffffffffffffff9c, &(0x7f0000001640)='./bus/file1\x00', 0x2d80c1, 0x198) r39 = socket$inet_udplite(0x2, 0x2, 0x88) close(r39) [ 990.419643][ T7939] ? __wbt_done+0xc0/0xc0 [ 990.423990][ T7939] ? elv_merge+0xfe/0x210 [ 990.424653][ T3781] x_tables: ip_tables: icmp match: only valid for protocol 1 [ 990.428345][ T7939] ? __write_once_size.constprop.0+0x20/0x20 [ 990.428360][ T7939] ? wbt_cleanup_cb+0x50/0x50 [ 990.428376][ T7939] wbt_wait+0x161/0x250 [ 990.428407][ T7939] ? wbt_cleanup+0x80/0x80 [ 990.455276][ T7939] __rq_qos_throttle+0x47/0x70 [ 990.460069][ T7939] blk_mq_make_request+0x29c/0xf60 [ 990.465204][ T7939] ? blk_queue_enter+0x532/0x570 14:25:52 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0x1, 0x4, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) [ 990.470162][ T7939] generic_make_request+0x196/0x700 [ 990.475400][ T7939] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 990.481349][ T7939] ? __rcu_read_unlock+0x77/0x390 [ 990.486411][ T7939] submit_bio+0x96/0x3c0 [ 990.490787][ T7939] ? __rcu_read_unlock+0x77/0x390 [ 990.495849][ T7939] ? mem_cgroup_css_from_page+0x2f/0x60 [ 990.501412][ T7939] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 990.507148][ T7939] ? wbc_account_cgroup_owner+0x6d/0x1f0 [ 990.512795][ T7939] submit_bh_wbc+0x40f/0x460 [ 990.517406][ T7939] __block_write_full_page+0x4e9/0x870 [ 990.522878][ T7939] ? constant_test_bit.constprop.0+0x20/0x20 [ 990.530176][ T7939] ? block_invalidatepage+0x320/0x320 [ 990.535599][ T7939] block_write_full_page+0x1c0/0x1e0 [ 990.540910][ T7939] ? constant_test_bit.constprop.0+0x20/0x20 [ 990.546911][ T7939] blkdev_writepage+0x2e/0x40 [ 990.551600][ T7939] __writepage+0x40/0xb0 [ 990.555876][ T7939] write_cache_pages+0x47a/0xb40 [ 990.560851][ T7939] ? writeout_period+0xf0/0xf0 [ 990.565691][ T7939] ? blkdev_readpages+0x50/0x50 14:25:52 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0x1, 0x5, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) [ 990.570758][ T7939] generic_writepages+0x79/0xc0 [ 990.575626][ T7939] blkdev_writepages+0x27/0x40 [ 990.580409][ T7939] do_writepages+0x6b/0x170 [ 990.585632][ T7939] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 990.591895][ T7939] ? wbc_attach_and_unlock_inode+0xdd/0x3b0 [ 990.597928][ T7939] __filemap_fdatawrite_range+0x1c5/0x230 [ 990.603672][ T7939] filemap_flush+0x2d/0x40 [ 990.608100][ T7939] __sync_blockdev+0x81/0x90 [ 990.613362][ T7939] ? ext4_statfs+0x6e0/0x6e0 [ 990.617973][ T7939] sync_filesystem+0x116/0x1a0 [ 990.622762][ T7939] ovl_sync_fs+0x92/0xa0 [ 990.627017][ T7939] ? ovl_statfs+0xf0/0xf0 [ 990.631371][ T7939] sync_filesystem+0x168/0x1a0 [ 990.636153][ T7939] generic_shutdown_super+0x6b/0x270 [ 990.641547][ T7939] kill_anon_super+0x2f/0x50 [ 990.646152][ T7939] deactivate_locked_super+0x64/0xb0 [ 990.651460][ T7939] deactivate_super+0xca/0xe0 [ 990.656154][ T7939] cleanup_mnt+0x291/0x340 [ 990.660606][ T7939] __cleanup_mnt+0x1f/0x30 [ 990.665145][ T7939] task_work_run+0xf6/0x130 [ 990.669756][ T7939] exit_to_usermode_loop+0x2b4/0x2c0 [ 990.675354][ T7939] do_syscall_64+0x384/0x3a0 [ 990.680010][ T7939] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 990.686025][ T7939] RIP: 0033:0x45dde7 [ 990.689973][ T7939] Code: 64 89 04 25 d0 02 00 00 58 5f ff d0 48 89 c7 e8 2f be ff ff 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 4d 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 990.709601][ T7939] RSP: 002b:00007ffd824e9118 EFLAGS: 00000202 ORIG_RAX: 00000000000000a6 14:25:52 executing program 3: clone(0x26100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000440)=@raw={'raw\x00', 0x2, 0x3, 0x270, 0x100, 0x100, 0x100, 0x100, 0x0, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x1d8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'veth0_to_team\x00', '\x00', {}, {}, 0x1, 0x6, 0x50}, 0x0, 0xd8, 0x100, 0x0, {}, [@common=@icmp={{0x28, 'icmp\x00'}, {0x0, "a7a9"}}, @common=@unspec=@connlimit={{0x40, 'connlimit\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00'}}, {{@uncond, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz1\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x2d0) [ 990.718027][ T7939] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 000000000045dde7 [ 990.726049][ T7939] RDX: 0000000000403720 RSI: 0000000000000002 RDI: 00007ffd824e91c0 [ 990.734026][ T7939] RBP: 000000000000097b R08: 0000000000000000 R09: 0000000000000009 [ 990.742116][ T7939] R10: 0000000000000003 R11: 0000000000000202 R12: 00007ffd824ea250 [ 990.751410][ T7939] R13: 0000000000d71940 R14: 0000000000000000 R15: 00007ffd824ea250 [ 990.761078][ T7939] Kernel Offset: disabled [ 990.765439][ T7939] Rebooting in 86400 seconds..