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"], &(0x7f0000000140)='GPL\x00'}, 0x48) r3 = socket$kcm(0x2, 0x1, 0x0) sendmsg$inet(r3, &(0x7f0000000fc0)={&(0x7f0000000000)={0x2, 0x4001, @remote}, 0x10, 0x0}, 0x20000811) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000040)={r3, r2}) close(r1) [ 462.757735][T24108] netlink: 'syz-executor.4': attribute type 62 has an invalid length. [ 462.788627][T24108] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 05:50:58 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x28}}, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={0x0, 0x49c}}, 0x0) [ 462.834064][T24108] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.4'. [ 462.966844][T24108] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 463.018619][T24108] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 05:50:59 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x28}}, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB="9c0400001200030325bd7000fbdbdf251f0608074e214e240100000040000000010000000200000009000000040000000400000002000000", @ANYRES32=0x0], 0x49c}}, 0x0) 05:50:59 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sysvipc/sem\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000140)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}}) 05:50:59 executing program 2: perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 463.572663][T24133] 9pnet: Insufficient options for proto=fd 05:50:59 executing program 1: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000018c40)={0xffffffffffffffff}, 0x4) 05:50:59 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d7e24fc6010003e4025090a00053582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 05:50:59 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(0x0) chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, &(0x7f0000000480), {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x2, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4=@rand_addr=0x64010102, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:50:59 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x28}}, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB="9c0400001200030325bd7000fbdbdf251f0608074e214e240100000040000000010000000200000009000000040000000400000002000000", @ANYRES32=0x0], 0x49c}}, 0x0) 05:50:59 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sysvipc/sem\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000140)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}}) 05:50:59 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f000000fc80)={0x18, 0x3, &(0x7f0000000180)=@raw=[@btf_id, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffe}], &(0x7f00000001c0)='GPL\x00', 0x7, 0x1000, &(0x7f0000002d00)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:50:59 executing program 2: perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1004000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 05:50:59 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sysvipc/sem\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000140)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}}) [ 463.865311][T24151] netlink: 'syz-executor.4': attribute type 62 has an invalid length. [ 463.894960][T24151] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 05:50:59 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x28}}, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB="9c0400001200030325bd7000fbdbdf251f0608074e214e240100000040000000010000000200000009000000040000000400000002000000", @ANYRES32=0x0], 0x49c}}, 0x0) [ 463.917367][T24151] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.4'. [ 463.939725][T24151] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 463.984338][T24151] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 05:51:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d7e24fc6010003e4025090a00053582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 05:51:00 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x28}}, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB="9c0400001200030325bd7000fbdbdf251f0608074e214e240100000040000000010000000200000009000000040000000400000002000000", @ANYRES32=0x0, @ANYBLOB], 0x49c}}, 0x0) [ 464.240598][T24165] 9pnet: Insufficient options for proto=fd 05:51:00 executing program 2: socketpair(0x26, 0x5, 0x4, &(0x7f0000000000)) 05:51:00 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000001fc0)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000280)="5ebe98a7f3565beee48a6269ce4f6735001ac2fe2e99d1fde844520025c2ffda0af7572124e27cff0bc6596dc561bebb64", 0x31}, {&(0x7f0000000e40)="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", 0xe8f}, {&(0x7f0000001e40)=';', 0x1}], 0x3}, 0x0) 05:51:00 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sysvipc/sem\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}}) [ 464.500477][T24174] netlink: 'syz-executor.4': attribute type 62 has an invalid length. [ 464.540439][T24174] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 05:51:00 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, &(0x7f0000000480), {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x2, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4=@rand_addr=0x64010102, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) [ 464.568557][T24174] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.4'. [ 464.579173][T24174] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 464.589270][T24174] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 05:51:00 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002bc0)={0x0, 0x3, &(0x7f0000002a40)=@framed, &(0x7f0000002ac0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:51:00 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x28}}, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB="9c0400001200030325bd7000fbdbdf251f0608074e214e240100000040000000010000000200000009000000040000000400000002000000", @ANYRES32=0x0, @ANYBLOB], 0x49c}}, 0x0) 05:51:00 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d7e24fc6010003e4025090a00053582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 05:51:00 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sysvipc/sem\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}}) [ 464.718255][T24183] 9pnet: Insufficient options for proto=fd 05:51:00 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x28}}, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB="9c0400001200030325bd7000fbdbdf251f0608074e214e240100000040000000010000000200000009000000040000000400000002000000", @ANYRES32=0x0, @ANYBLOB], 0x49c}}, 0x0) 05:51:00 executing program 2: mount$bpf(0x0, 0x0, &(0x7f0000001740), 0x0, &(0x7f0000005240)) [ 464.852584][T24193] netlink: 'syz-executor.4': attribute type 62 has an invalid length. [ 464.914157][T24193] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 05:51:00 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x28}}, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB="9c0400001200030325bd7000fbdbdf251f0608074e214e240100000040000000010000000200000009000000040000000400000002000000", @ANYRES32=0x0, @ANYBLOB="060000000000000017"], 0x49c}}, 0x0) [ 464.990890][T24193] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.4'. [ 464.992298][T24200] 9pnet: Insufficient options for proto=fd 05:51:01 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) clone(0x40000000007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sysvipc/sem\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f0000000040), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}}) [ 465.095246][T24193] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 05:51:01 executing program 2: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001300)={@cgroup, 0xffffffffffffffff, 0x7}, 0x10) [ 465.174313][T24193] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db [ 465.336528][T24209] 9pnet: Insufficient options for proto=fd 05:51:01 executing program 1: bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f000000e080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f000000e040)}, 0x48) 05:51:01 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x28}}, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB="9c0400001200030325bd7000fbdbdf251f0608074e214e240100000040000000010000000200000009000000040000000400000002000000", @ANYRES32=0x0, @ANYBLOB="060000000000000017"], 0x49c}}, 0x0) 05:51:01 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, &(0x7f0000000480), {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x2, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4=@rand_addr=0x64010102, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:01 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d7e24fc6010003e4025090a00053582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 05:51:01 executing program 0: perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 05:51:01 executing program 2: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x80000, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:51:01 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002bc0)={0x18, 0x3, &(0x7f0000002a40)=@framed, &(0x7f0000002ac0)='GPL\x00', 0xff, 0x0, &(0x7f0000002b00), 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000002b40)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000002b80)={0x0, 0xf}, 0x10}, 0x78) 05:51:01 executing program 0: fsopen(&(0x7f0000000000)='efs\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$ndb(&(0x7f0000000080), 0x0, 0x24840) ioctl$NBD_SET_SOCK(r0, 0xab00, 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000100), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wpan3\x00'}) sendmsg$IEEE802154_LLSEC_GETPARAMS(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x14, r2, 0x0, 0x0, 0x25dfdbff}, 0x14}}, 0x4010) fsopen(&(0x7f0000000280)='incremental-fs\x00', 0x1) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 05:51:01 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d7e24fc6010003e4025090a00053582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 05:51:01 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x28}}, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB="9c0400001200030325bd7000fbdbdf251f0608074e214e240100000040000000010000000200000009000000040000000400000002000000", @ANYRES32=0x0, @ANYBLOB="060000000000000017"], 0x49c}}, 0x0) 05:51:01 executing program 2: ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000280)) socket$kcm(0x29, 0x5, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x8, 0x3, 0x8000, 0x90}, 0x40) 05:51:02 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, &(0x7f0000000480), {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x2, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4=@rand_addr=0x64010102, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:02 executing program 1: sendmsg(0xffffffffffffffff, 0x0, 0x8040) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000038000511d25a80648c63940d0124fc6010003540090002000200000037153e370a0001802e001d00d1bd", 0x2e}], 0x1}, 0x0) 05:51:02 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x28}}, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB="9c0400001200030325bd7000fbdbdf251f0608074e214e240100000040000000010000000200000009000000040000000400000002000000", @ANYRES32=0x0, @ANYBLOB="060000000000000017df000000"], 0x49c}}, 0x0) 05:51:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001140)={&(0x7f0000001180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x2}]}}, &(0x7f0000000140)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 05:51:02 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d7e24fc6010003e4025090a00053582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 05:51:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001140)={&(0x7f0000001180)={{0xeb9f, 0x1, 0x0, 0x18, 0x7, 0xc, 0xc, 0x2, [@union]}}, &(0x7f0000000140)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 05:51:02 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(0x0, 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, &(0x7f0000000480), {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x2, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4=@rand_addr=0x64010102, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:02 executing program 4: r0 = socket$kcm(0x10, 0x0, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d7e24fc6010003e4025090a00053582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 05:51:02 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x28}}, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB="9c0400001200030325bd7000fbdbdf251f0608074e214e240100000040000000010000000200000009000000040000000400000002000000", @ANYRES32=0x0, @ANYBLOB="060000000000000017df000000"], 0x49c}}, 0x0) 05:51:02 executing program 2: r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x1}, 0x10) mkdirat$cgroup(r0, &(0x7f00000000c0)='syz0\x00', 0x1ff) r1 = openat$cgroup(r0, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f0000000140)='devices.allow\x00', 0x2, 0x0) perf_event_open$cgroup(&(0x7f00000001c0)={0x4, 0x80, 0x2, 0x6, 0x1, 0x2, 0x0, 0x8000, 0xa500, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x33, 0x4, @perf_bp={&(0x7f0000000180), 0xe}, 0x29, 0x0, 0x8c3, 0x7, 0x3, 0x79, 0x10e, 0x0, 0x1, 0x0, 0x6}, r0, 0x9, 0xffffffffffffffff, 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0xcd, 0x6, 0x7, 0x15, 0x0, 0x4, 0x50500, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x2, @perf_config_ext={0x3f, 0x100}, 0x130, 0x4, 0x2, 0x6, 0x5, 0x7, 0x3, 0x0, 0x1, 0x0, 0x1}, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000300)={0x3, 0x0, [0x0, 0x0, 0x0]}) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000340), 0x8) sendmsg$unix(r3, &(0x7f0000000840)={0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000380)="5a6abdff25415111a2f66f3a60da39af58eaa91954410c28601b10a5da28d8df7accae6a9daf167c18ba3580c8562f85fbd1f521c438036f87df65c45cc98f430549ee4e1a6f0e7cb8e2587da5279a290ab3d7cab1b47394ca9b162c57c4bb71c5511526525d2e2a4b71730aef2fa6403e817d0886227df807a77040a96c4354f2289f0a30f7e8cb94efaab59d505139183cd64a317111f863af011f829d43c3e9d481afb8927c8b17319a1bef2f99ccf1f33f61e803a6c10816fac9c90b24ae3b0071fb7114faed29864d1ff29dace71c8fe41f09", 0xd5}, {&(0x7f0000000480)="a1c0587f262b", 0x6}, {&(0x7f00000004c0)="7e418938b22c71e0a8d88785407b5334e6034802135ed5ad3e33070af88798903cb448a4d219af915dc48d2803d1a6386756b334cdef8addc19b20fed019e496794a165aeb6ef7e975cc1e3f8eccabe5d939176731fb28b25f814f323ce54d542d0284642278a63a8e9bc3e952e094a8ec4c6e157dc5d88bf15dac198b", 0x7d}, {&(0x7f0000000540)="27c42193eb4c0d4b8fff4e31d5fa2f32888ad254caec07e230a920c97b4132bdffbffe04a0860fb5b57a819b5ea75aa9505d325eaf0a22e8296c9988abed507c1e00d93f592b90d5a11bb2b7205ea12f4034d06d3e4c800d0a36c190134d8891566a86d88adb01a591e38789866fa237d9d0022ebb06126aff9095a26bc806de2c1b76521d84bb60c3fb29af070fc5eda6eb482e4d5e40715c75ea59aa869e", 0x9f}, {&(0x7f0000000600)="fde5673350d9e8e0660a0dc1964395d2823296cfec7b00eab71c5e3d28bd5b9668e5706c0ea40537c3daa064e25f249c399fb966ce9feb3a1db74ce3", 0x3c}, {&(0x7f0000000640)="70bb0d7cf273dc7d3c341c8858d995402dc7d8facda0ff384744c123273afe66ec72", 0x22}, {&(0x7f0000000680)}, {&(0x7f00000006c0)="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", 0xfb}], 0x8, 0x0, 0x0, 0x48000}, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000880)='cpuset.mems\x00', 0x2, 0x0) recvmsg$unix(r3, &(0x7f0000000d80)={&(0x7f00000008c0), 0x6e, &(0x7f0000000cc0)=[{&(0x7f0000000940)=""/116, 0x74}, {&(0x7f00000009c0)=""/181, 0xb5}, {&(0x7f0000000a80)=""/53, 0x35}, {&(0x7f0000000ac0)=""/89, 0x59}, {&(0x7f0000000b40)=""/249, 0xf9}, {&(0x7f0000000c40)=""/103, 0x67}], 0x6, &(0x7f0000000d40)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x40010000) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000e00)={&(0x7f0000000dc0)='mm_page_alloc_extfrag\x00', r4}, 0x10) r6 = bpf$ITER_CREATE(0x21, &(0x7f0000000e40)={r3}, 0x8) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) recvmsg$unix(r6, &(0x7f0000001040)={&(0x7f0000000e80), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000f00)=""/200, 0xc8}], 0x1}, 0x60) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000015c0), 0x0, 0x0) ioctl$TUNSETVNETLE(r7, 0x400454dc, &(0x7f0000001600)=0x1) 05:51:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001140)={&(0x7f0000001180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0xa, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}]}}, &(0x7f0000000140)=""/4096, 0x32, 0x1000, 0x1}, 0x20) 05:51:02 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(0x0, 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, &(0x7f0000000480), {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x2, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4=@rand_addr=0x64010102, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:03 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x28}}, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB="9c0400001200030325bd7000fbdbdf251f0608074e214e240100000040000000010000000200000009000000040000000400000002000000", @ANYRES32=0x0, @ANYBLOB="060000000000000017df000000"], 0x49c}}, 0x0) [ 467.336821][T24292] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 467.358744][T24292] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 05:51:03 executing program 1: sendmsg(0xffffffffffffffff, 0x0, 0x8040) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000038000511d25a80648c63940d0124fc6010003540090002000200000037153e370a0001802e001d00d1bd", 0x2e}], 0x1}, 0x0) 05:51:03 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000140)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xf0}, 0x78) 05:51:03 executing program 4: r0 = socket$kcm(0x10, 0x0, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d7e24fc6010003e4025090a00053582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 05:51:03 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:03 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x28}}, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB="9c0400001200030325bd7000fbdbdf251f0608074e214e240100000040000000010000000200000009000000040000000400000002000000", @ANYRES32=0x0, @ANYBLOB="060000000000000017df0000000000"], 0x49c}}, 0x0) 05:51:03 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(0x0, 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, &(0x7f0000000480), {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x2, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4=@rand_addr=0x64010102, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:03 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, &(0x7f0000000480), {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x2, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4=@rand_addr=0x64010102, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:03 executing program 4: r0 = socket$kcm(0x10, 0x0, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d7e24fc6010003e4025090a00053582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 05:51:03 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x28}}, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB="9c0400001200030325bd7000fbdbdf251f0608074e214e240100000040000000010000000200000009000000040000000400000002000000", @ANYRES32=0x0, @ANYBLOB="060000000000000017df0000000000"], 0x49c}}, 0x0) 05:51:03 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) 05:51:03 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:03 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x28}}, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB="9c0400001200030325bd7000fbdbdf251f0608074e214e240100000040000000010000000200000009000000040000000400000002000000", @ANYRES32=0x0, @ANYBLOB="060000000000000017df0000000000"], 0x49c}}, 0x0) [ 468.043829][T24327] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 468.056247][T24327] netlink: 'syz-executor.1': attribute type 1 has an invalid length. 05:51:04 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000001fc0)={0x0, 0x0, &(0x7f0000000880)=[{0x0}, {&(0x7f0000000280)="5ebe98a7f3565beee48a6269ce4f6735001ac2fe2e99d1fde844520025c2ffda0af7572124e27cff0bc6596dc561bebb64f5", 0x32}, {&(0x7f0000000e40)="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", 0xe8f}], 0x3}, 0x0) 05:51:04 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000080), 0x4) 05:51:04 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(0x0, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d7e24fc6010003e4025090a00053582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 05:51:04 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:04 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x28}}, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB="9c0400001200030325bd7000fbdbdf251f0608074e214e240100000040000000010000000200000009000000040000000400000002000000", @ANYRES32=0x0, @ANYBLOB="060000000000000017df000000000000"], 0x49c}}, 0x0) 05:51:04 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, &(0x7f0000000480), {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x2, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4=@rand_addr=0x64010102, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:04 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x28}}, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB="9c0400001200030325bd7000fbdbdf251f0608074e214e240100000040000000010000000200000009000000040000000400000002000000", @ANYRES32=0x0, @ANYBLOB="060000000000000017df000000000000"], 0x49c}}, 0x0) [ 468.179397][T24336] netlink: 'syz-executor.4': attribute type 62 has an invalid length. [ 468.215338][T24336] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 05:51:04 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, &(0x7f0000000480), {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x2, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4=@rand_addr=0x64010102, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) [ 468.255113][T24336] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.4'. 05:51:04 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000016c0)={0x9, 0x2, &(0x7f00000011c0)=@raw=[@exit, @exit], &(0x7f0000001200)='GPL\x00', 0x0, 0xbd, &(0x7f0000001240)=""/189, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 468.298398][T24336] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 05:51:04 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) [ 468.345101][T24336] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 05:51:04 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x28}}, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB="9c0400001200030325bd7000fbdbdf251f0608074e214e240100000040000000010000000200000009000000040000000400000002000000", @ANYRES32=0x0, @ANYBLOB="060000000000000017df000000000000"], 0x49c}}, 0x0) 05:51:04 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(0x0, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d7e24fc6010003e4025090a00053582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 468.559838][T24360] netlink: 'syz-executor.4': attribute type 62 has an invalid length. [ 468.588685][T24360] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 468.597013][T24360] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.4'. [ 468.619700][T24360] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 468.645881][T24360] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 05:51:04 executing program 1: bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000001380)={&(0x7f0000001340)='./file0\x00'}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f00000013c0), 0xc) openat$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002380)) 05:51:04 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000004b80)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000004f80)={0x0, 0x0, &(0x7f0000004f40)=[{&(0x7f0000004cc0)}], 0x1}, 0x0) 05:51:04 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x28}}, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB="9c0400001200030325bd7000fbdbdf251f0608074e214e240100000040000000010000000200000009000000040000000400000002000000", @ANYBLOB="060000000000000017df00000000000093"], 0x49c}}, 0x0) 05:51:04 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:04 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:04 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(0x0, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d7e24fc6010003e4025090a00053582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 05:51:04 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x28}}, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB="9c0400001200030325bd7000fbdbdf251f0608074e214e240100000040000000010000000200000009000000040000000400000002000000", @ANYBLOB="060000000000000017df00000000000093"], 0x49c}}, 0x0) 05:51:04 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000016c0)={0x9, 0x2, &(0x7f00000011c0)=@raw=[@exit, @exit], &(0x7f0000001200)='GPL\x00', 0x20, 0xbd, &(0x7f0000001240)=""/189, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 468.863075][T24377] netlink: 'syz-executor.4': attribute type 62 has an invalid length. 05:51:04 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) [ 468.913878][T24377] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 468.945606][T24377] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.4'. 05:51:04 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x28}}, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB="9c0400001200030325bd7000fbdbdf251f0608074e214e240100000040000000010000000200000009000000040000000400000002000000", @ANYBLOB="060000000000000017df00000000000093"], 0x49c}}, 0x0) [ 469.022700][T24377] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 05:51:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001180)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x1}]}]}}, &(0x7f0000000140)=""/4096, 0x32, 0x1000, 0x1}, 0x20) [ 469.126036][T24377] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 05:51:05 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x28}}, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYRES32=0x0, @ANYBLOB="060000000000000017df00000000000093"], 0x49c}}, 0x0) 05:51:05 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x4, 0x3, &(0x7f0000000040)=@framed, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000200), 0x8) 05:51:05 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001140)={&(0x7f0000001180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0xa}]}}, &(0x7f0000000140)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 05:51:05 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d7e24fc6010003e4025090a00053582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 05:51:05 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x28}}, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYRES32=0x0, @ANYBLOB="060000000000000017df00000000000093"], 0x49c}}, 0x0) 05:51:05 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) [ 469.666746][T24408] netlink: 'syz-executor.4': attribute type 62 has an invalid length. [ 469.694873][T24408] netlink: 'syz-executor.4': attribute type 3 has an invalid length. 05:51:05 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x28}}, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYRES32=0x0, @ANYBLOB="060000000000000017df00000000000093"], 0x49c}}, 0x0) [ 469.733423][T24408] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.4'. 05:51:05 executing program 2: r0 = getpid() perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) 05:51:05 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) [ 469.776784][T24408] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 469.846740][T24408] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 05:51:05 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)={0x1, 0x9, 0x7, 0x25, 0xc9, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x40) 05:51:05 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x28}}, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="060000000000000017df00000000000093"], 0x49c}}, 0x0) 05:51:06 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x28}}, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="060000000000000017df00000000000093"], 0x49c}}, 0x0) 05:51:06 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000010700)={0x11, 0x2, &(0x7f0000010500)=@raw=[@call, @func], &(0x7f0000010540)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:51:06 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:06 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d7e24fc6010003e4025090a00053582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 05:51:06 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:06 executing program 2: socketpair(0x25, 0x1, 0x0, &(0x7f0000000080)) 05:51:06 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x28}}, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="060000000000000017df00000000000093"], 0x49c}}, 0x0) [ 470.317608][T24443] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.4'. [ 470.353030][T24443] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 05:51:06 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:06 executing program 2: bpf$BPF_PROG_DETACH(0x9, &(0x7f0000005c80), 0x10) 05:51:06 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x28}}, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB="9c0400001200030325bd7000fbdbdf251f0608074e214e2401000000", @ANYRES32=0x0, @ANYBLOB="060000000000000017df00000000000093"], 0x49c}}, 0x0) [ 470.389149][T24443] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 05:51:06 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x28}}, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB="9c0400001200030325bd7000fbdbdf251f0608074e214e2401000000", @ANYRES32=0x0, @ANYBLOB="060000000000000017df00000000000093"], 0x49c}}, 0x0) 05:51:06 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r1}, 0x10) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) 05:51:06 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {0x3}, {0x6}]}]}}, &(0x7f0000000140)=""/4092, 0x3e, 0xffc, 0x1}, 0x20) 05:51:06 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x13, 0x8, 0x200, 0x0, 0x0, 0x1}, 0x40) 05:51:06 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d7e24fc6010003e4025090a00053582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 05:51:06 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r1}, 0x10) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) 05:51:06 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x28}}, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB="9c0400001200030325bd7000fbdbdf251f0608074e214e2401000000", @ANYRES32=0x0, @ANYBLOB="060000000000000017df00000000000093"], 0x49c}}, 0x0) 05:51:06 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x2, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4=@rand_addr=0x64010102, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:06 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001140)={&(0x7f0000001180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const={0x0, 0x0, 0x0, 0xa, 0x1}]}}, &(0x7f0000000140)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 05:51:07 executing program 2: bpf$OBJ_GET_PROG(0x7, &(0x7f0000001600)={0x0, 0x0, 0x8}, 0x10) [ 471.059064][T24479] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.4'. [ 471.092993][T24479] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 05:51:07 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x28}}, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB="9c0400001200030325bd7000fbdbdf251f0608074e214e24010000004000000001000000020000000900", @ANYRES32=0x0, @ANYBLOB="060000000000000017df00000000000093"], 0x49c}}, 0x0) 05:51:07 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r1}, 0x10) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) [ 471.131145][T24479] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 05:51:07 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000015c0)={&(0x7f0000001480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@typedef={0x2}]}}, &(0x7f0000001500)=""/137, 0x26, 0x89, 0x1}, 0x20) 05:51:07 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x28}}, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB="9c0400001200030325bd7000fbdbdf251f0608074e214e24010000004000000001000000020000000900", @ANYRES32=0x0, @ANYBLOB="060000000000000017df00000000000093"], 0x49c}}, 0x0) 05:51:07 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d7e24fc6010003e4025090a00053582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 471.520225][T24500] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.4'. [ 471.540775][T24500] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 471.584200][T24500] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 05:51:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000003380)={&(0x7f0000003200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x1}, {}]}, @union]}}, &(0x7f0000003280)=""/238, 0x42, 0xee, 0x1}, 0x20) 05:51:07 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) 05:51:07 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x2000}, 0x40) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000040)={0x0, 0x0}, 0x8) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={r0, 0x0, 0x10}, 0xc) 05:51:07 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x2, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4=@rand_addr=0x64010102, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x0, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:07 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x28}}, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB="9c0400001200030325bd7000fbdbdf251f0608074e214e24010000004000000001000000020000000900", @ANYRES32=0x0, @ANYBLOB="060000000000000017df00000000000093"], 0x49c}}, 0x0) 05:51:07 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d7e24fc6010003e4025090a00053582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 471.727054][T24515] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.4'. 05:51:07 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x28}}, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB="9c0400001200030325bd7000fbdbdf251f0608074e214e2401000000400000000100000002000000090000000400000004", @ANYRES32=0x0, @ANYBLOB="060000000000000017df00000000000093"], 0x49c}}, 0x0) [ 471.785761][T24515] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 05:51:07 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) 05:51:07 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x8, &(0x7f0000001740)=ANY=[@ANYBLOB="7e644887"], &(0x7f0000000180)='GPL\x00', 0x4, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 471.901972][T24515] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 05:51:08 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x28}}, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB="9c0400001200030325bd7000fbdbdf251f0608074e214e2401000000400000000100000002000000090000000400000004", @ANYRES32=0x0, @ANYBLOB="060000000000000017df00000000000093"], 0x49c}}, 0x0) 05:51:08 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000003380)={&(0x7f0000003200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x1}, {}, {}]}, @union]}}, &(0x7f0000003280)=""/238, 0x4a, 0xee, 0x1}, 0x20) 05:51:08 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x2, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4=@rand_addr=0x64010102, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x0, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:08 executing program 1: socketpair(0xa, 0x1, 0x7, &(0x7f00000006c0)) 05:51:08 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) 05:51:08 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x28}}, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB="9c0400001200030325bd7000fbdbdf251f0608074e214e2401000000400000000100000002000000090000000400000004", @ANYRES32=0x0, @ANYBLOB="060000000000000017df00000000000093"], 0x49c}}, 0x0) 05:51:08 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000003380)={&(0x7f0000003200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@func_proto, @union]}}, &(0x7f0000003280)=""/238, 0x32, 0xee, 0x1}, 0x20) 05:51:08 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d7e24fc6010003e4025090a00053582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) [ 472.536437][T24551] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.4'. 05:51:08 executing program 2: socketpair(0xa, 0x0, 0x401, &(0x7f0000000280)) [ 472.590222][T24551] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 05:51:08 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x28}}, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB="9c0400001200030325bd7000fbdbdf251f0608074e214e240100000040000000010000000200000009000000040000000400000002", @ANYRES32=0x0, @ANYBLOB="060000000000000017df00000000000093"], 0x49c}}, 0x0) 05:51:08 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) [ 472.667363][T24551] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 05:51:08 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x2, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4=@rand_addr=0x64010102, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x0, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:08 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003a80)={0x18, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000100)='GPL\x00', 0x1, 0x9a, &(0x7f0000000200)=""/154, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000180)={&(0x7f0000000140)='./file0\x00', r0}, 0x10) 05:51:08 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d7e24fc6010003e4025090a00053582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 05:51:08 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) [ 472.977604][T24573] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.4'. [ 473.098462][T24573] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 473.129105][T24573] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 05:51:09 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'ip6erspan0\x00', @broadcast}) 05:51:09 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x28}}, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB="9c0400001200030325bd7000fbdbdf251f0608074e214e240100000040000000010000000200000009000000040000000400000002", @ANYRES32=0x0, @ANYBLOB="060000000000000017df00000000000093"], 0x49c}}, 0x0) 05:51:09 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000300)) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) close(r0) 05:51:09 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) 05:51:09 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x2, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4=@rand_addr=0x64010102, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:09 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x28}}, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB="9c0400001200030325bd7000fbdbdf251f0608074e214e240100000040000000010000000200000009000000040000000400000002", @ANYRES32=0x0, @ANYBLOB="060000000000000017df00000000000093"], 0x49c}}, 0x0) 05:51:09 executing program 4: socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d7e24fc6010003e4025090a00053582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 05:51:09 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:09 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) close(r0) 05:51:09 executing program 4: socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d7e24fc6010003e4025090a00053582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 05:51:09 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x28}}, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB="9c0400001200030325bd7000fbdbdf251f0608074e214e2401000000400000000100000002000000090000000400000004000000020000", @ANYRES32=0x0, @ANYBLOB="060000000000000017df00000000000093"], 0x49c}}, 0x0) 05:51:09 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:09 executing program 1: socketpair(0x25, 0x1, 0xd2, &(0x7f0000000040)) 05:51:09 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003a80)={0x18, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000100)='GPL\x00', 0x7, 0x9a, &(0x7f0000000200)=""/154, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:51:09 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x2, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4=@rand_addr=0x64010102, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:09 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x28}}, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB="9c0400001200030325bd7000fbdbdf251f0608074e214e2401000000400000000100000002000000090000000400000004000000020000", @ANYRES32=0x0, @ANYBLOB="060000000000000017df00000000000093"], 0x49c}}, 0x0) 05:51:09 executing program 4: socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d7e24fc6010003e4025090a00053582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 05:51:09 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:10 executing program 5: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000400)={0x28, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x28}}, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000340)=ANY=[@ANYBLOB="9c0400001200030325bd7000fbdbdf251f0608074e214e2401000000400000000100000002000000090000000400000004000000020000", @ANYRES32=0x0, @ANYBLOB="060000000000000017df00000000000093"], 0x49c}}, 0x0) 05:51:10 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:10 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 05:51:10 executing program 2: socketpair(0x2b, 0x1, 0x25a, &(0x7f0000000000)) 05:51:10 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x80, 0xe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0xc004743e, &(0x7f0000000680)='&@[\xfe') close(r1) 05:51:10 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:10 executing program 1: socketpair(0x25, 0x0, 0x0, &(0x7f0000000200)) 05:51:10 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 05:51:10 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000140)) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) gettid() perf_event_open(&(0x7f0000000600)={0x0, 0x80, 0x0, 0x6, 0x2f, 0x0, 0x0, 0xffffffff, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x5, 0xcf, 0x1, @perf_config_ext={0xfffffffffffffffe, 0x4}, 0x40002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x0, 0x0, r1, 0x9) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x9, 0x9, 0x0, 0x0, 0x0, 0x0, 0x90970, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_config_ext={0x8, 0x3}, 0x40040, 0x0, 0x0, 0x0, 0x6, 0x3, 0x0, 0x0, 0x8, 0x0, 0xffff}, 0x0, 0x5, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_config_ext={0x0, 0x800}, 0x0, 0x0, 0x9, 0x0, 0x5, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x10001}, 0x0, 0x200000000000000, 0x710d, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x7, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) gettid() ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000000)='ip6gre0\x00') getpid() perf_event_open(0x0, 0x0, 0xd, r0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x2000000003, 0x0, &(0x7f00000005c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f2, &(0x7f0000000000)='ip6gre0\x00') perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x5, 0x3, 0x4, 0x72, 0x0, 0x4, 0x88242, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xfffffffb, 0x4, @perf_bp={&(0x7f0000000100), 0x1}, 0xc000, 0x1, 0x7ff, 0x5, 0x100000000, 0x8, 0x0, 0x0, 0x80000000, 0x0, 0xe2d}, 0x0, 0xc, 0xffffffffffffffff, 0x0) 05:51:10 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:10 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x2, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4=@rand_addr=0x64010102, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:10 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) 05:51:10 executing program 5: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x18445}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 05:51:10 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:10 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 05:51:10 executing program 5: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)=""/170, 0xaa}], 0x1}, 0x40000041) 05:51:11 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 05:51:11 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.cpus\x00', 0x2, 0x0) 05:51:11 executing program 1: socketpair(0x1d, 0x0, 0x9, &(0x7f0000000040)) 05:51:11 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:11 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000580)='ns/cgroup\x00') 05:51:11 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x2, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4=@rand_addr=0x64010102, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x6f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r0) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x32600) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) close(r1) 05:51:11 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 05:51:11 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 05:51:11 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000100)={&(0x7f00000001c0)=@nl=@proc, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000240)="81393a02a1a2bef0935d470b351c3426d3684e25cc3e5706bfd88d7671a47092b0f9fc823ad833835197ae95b6f152076ac1f8181913737f6988219ba106c570510ba3a82618c17be457b00aa5c7174e6c3042", 0x53}, {&(0x7f00000002c0)="40062c2660195c32de45999eb07e9c3aa4e894f0815a7a9156c181875808e900cbe98a2f8e5080a1e527b14468c74aa972c0db084e881f72a68c2cb2cc6c98e0f26b4bb24d27526702c55a3e4e3024b461ec66d4dcc81e", 0x57}, {&(0x7f0000000340)="74c756b0a8d2a11e886d9bca38b6426c8f8239192f985486c2a53a07403138b2c2cf2e7b397062a278ead1201bb2d851b4ab11153cd45f0afdcfaa9b1d900d174d844421680667bb123d4cf56b5f2ab4fde8aac55868e294b4ec56", 0x5b}, {&(0x7f00000003c0)="61a032a845a69e5250f8a1aec2fbef6ba0662881fd6dc11b19253884e045efadf27fede7dbd8ac24a2c2aad166f9303eb485179dfeb6e59153029836aa940d8857b99aaa12de6b30bf8ad25118049050bf93d039ff941611252e0d6f781e59dd7f4f83825fb20883eb9f80a539eed16b69e770219eb8d4e4459b480734a6be6c6e3cf4797f47f7a3c10fd5ba77568d91ec3d6f7f9f22f4d1a301d82a599da9f11540c344cf0748c53bf24c0000ec53dd4606", 0xb2}, {&(0x7f0000000480)="d7c1745e4d5d34fe2b84fd2dcb00596aee8a38ba07225b9b2423a833dd056ebd372e113654fc41eec0e8f58979d67bff5ab30d5ef109b8d0afc6e4b4a5c182249f08910cf849c673b2c42dd9ac331d1c4853ca211662f52efcd49139c5dabd7a25e5043bb73d9038d4b321b2f12ad6d4ef7b4b4adc6688147c03cc007f73ffafdcf7b3e23781dd348e", 0x89}, {&(0x7f0000000540)="f8f65e76f9186e298294dc8996d40ddbd9f2d5adb380292053e7195c4e20c57792fc1e5fcbd26e18e5079be6e9c2c96f304880049a8b3b063c362e3befdf2373d3a86939b8cc4864af2369a2d6ad83dcc0479821a55fb81fa56785c41c1ea4df586db22af57934d8d0273843b6d08736aedf73c26b42ecadcfe2cd5a", 0x7c}], 0x6, &(0x7f0000000640)=[{0x100, 0x0, 0x0, "7cec857fcc6a25df106921b598fdf9960f70e4ba96c9346090d2da5618207c81064a684028ebbae4b724ab240e14f9c4c5e580efb25f40286d1833cd72a9af9465e491ab69079a682e6c374be0a750e4bb9dfd6f2d0d44fc950838b49548a7b4a10fb054878b73669c3beb10c3db5547ac1124310d10e44e03b72018e35e6ff475cdd3a0eef9037ae0a123cf62fb02dd6feb36794836ae0e82377b4b05d122c201aa154cbac12ba014f98c20e7eb935069e7e1d597b5495c172359b1bf2efeb00d9d276b2d93a98b71a71f1e491f4afde5cefeb05e053d776b59778dd51f43f1f77f89556ddd38af92"}, {0x68, 0x0, 0x0, "9c9350d6b9313e26caee2d8c2d751bbb2ce5e8910fe82cea12571d27a6f0b19344eb3ba619588fb018585a0dce5186c7714c8306a4e02ff4ce28bc2155ab60e711323d2c7e29872cf4e94a0745c4c5d2d3cdf8651a5e"}, {0x20, 0x0, 0x0, "15a996d29bc2995bc2849bae724057c1"}, {0xb0, 0x0, 0x0, "a3f58fcf9949100449e29c959e1e22cc5fff7cc0ea16c1b5a5d0285728aaef56b8bbe87f98cec7a63798fcea7699841164d39de70b0a81fb88cbfd5d615041885f523a7ec86d6cb25576e8e8086c32c8fad87e63e4a29734bc5bc7005065a1657f8e422cf6baaa8ca0e9e7a1388c72a1deda6f65d2be3ade2f4c180df7b7f6732a0b54ceaa1be57034cef13919ae1f846a822688196602801f3a36d9b2"}, {0xe4, 0x0, 0x0, "cd4b0f938840c8c8fcedb2793510d17800745316a3e5162cdb74560a246e03008d498def16b89968eb0bf1ebf26ee09719e9131f3f517d6cc0f24c9d6ac8809fba74f94fe4dd7fce75e204e34ef4c07d32bee3241258e94cc17b1b45a95887424da4ed5ed0f78504f5bc6e8ec0a4b318e69245806b724956ea23bd03f5cad25a84bc9d4c93e89f6830d5a4d048ca1ee968cd02d10d15184e7d919003b1f3aaf7f5296e038e0554e1d34e9061f8ace3c179740bfcb070f487e538747b"}, {0x30, 0x0, 0x0, "f0be246c420db603348e5011ca10e8ad096c486067c76413c9d9"}], 0x338}, 0x6000000) 05:51:11 executing program 5: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) 05:51:11 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:11 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 05:51:11 executing program 2: socketpair(0xa, 0x1, 0x0, &(0x7f00000006c0)) 05:51:12 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$inet(r0, &(0x7f0000001c40)={0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000001680)='\\', 0x1}], 0x1}, 0x0) close(r0) 05:51:12 executing program 5: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000001500)={0x0, 0x0, 0x0}, 0x4048050) 05:51:12 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) 05:51:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 05:51:12 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x2, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4=@rand_addr=0x64010102, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:12 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000003380)={&(0x7f0000003200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000003280)=""/238, 0x26, 0xee, 0x1}, 0x20) 05:51:12 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003a80)={0x8, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000100)='GPL\x00', 0x5, 0x95, &(0x7f0000000140)=""/149, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:51:12 executing program 2: socketpair(0x2, 0x801, 0x0, &(0x7f00000000c0)) 05:51:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 05:51:12 executing program 5: perf_event_open$cgroup(&(0x7f0000000080)={0x0, 0x20000100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 05:51:12 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) 05:51:12 executing program 2: openat$tun(0xffffffffffffff9c, 0x0, 0x410000, 0x0) 05:51:12 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000003380)={&(0x7f0000003200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{0x0, 0x5}]}]}}, &(0x7f0000003280)=""/238, 0x32, 0xee, 0x1}, 0x20) 05:51:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 05:51:12 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)={&(0x7f0000000400)='./file0\x00'}, 0x10) 05:51:12 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) 05:51:12 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x2, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4=@rand_addr=0x64010102, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:12 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003a80)={0x18, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x1, 0x9b, &(0x7f0000000080)=""/155, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:51:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 05:51:12 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f00000036c0)='ns/time\x00') 05:51:12 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000004c0)={'wlan0\x00'}) 05:51:12 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) 05:51:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 05:51:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 05:51:13 executing program 1: r0 = gettid() perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) 05:51:13 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) 05:51:13 executing program 2: socketpair(0x11, 0x0, 0x0, &(0x7f00000000c0)) 05:51:13 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001ac0)={0x18, 0x5, &(0x7f0000001840)=@framed={{}, [@func, @func]}, &(0x7f00000018c0)='syzkaller\x00', 0x6, 0xd3, &(0x7f0000001900)=""/211, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:51:13 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x2, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 05:51:13 executing program 2: socketpair$tipc(0x1e, 0x0, 0x71, &(0x7f0000000180)) 05:51:13 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000007400)=[{{&(0x7f0000000000)={0x2, 0x4e21, @remote}, 0x10, 0x0}}, {{&(0x7f0000000180)={0x2, 0x4e21, @remote}, 0x10, 0x0, 0x0, &(0x7f0000001700)=[@ip_retopts={{0x3c, 0x0, 0x7, {[@rr={0x7, 0xf, 0xae, [@initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @local]}, @timestamp_prespec={0x44, 0x1c, 0x0, 0x3, 0x0, [{@initdev={0xac, 0x1e, 0x0, 0x0}}, {@loopback}, {}]}]}}}], 0x40}}], 0x2, 0x0) 05:51:13 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r1}, 0x10) write$cgroup_type(r0, &(0x7f0000000000), 0x248800) 05:51:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 05:51:13 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000003b00)=[{{&(0x7f0000000000)={0x2, 0x4e20, @remote}, 0x10, &(0x7f0000001280)=[{0x0}, {0x0, 0x11}, {&(0x7f00000010c0)='y', 0x1}], 0x3}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000002540)="fd", 0x1}], 0x1}}], 0x2, 0x0) 05:51:13 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000300)={'syz1'}, 0x4) 05:51:14 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x4085) 05:51:14 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x8, 0x0, 0x0) 05:51:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d7e24fc6010003e", 0x17}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 05:51:14 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:14 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_CONNECT(r0, &(0x7f0000002900)={&(0x7f0000002800)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000028c0)={0x0}}, 0x0) 05:51:14 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x2, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d7e24fc6010003e", 0x17}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 05:51:14 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) sendmmsg$inet(r0, &(0x7f0000004380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 05:51:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000240)={'sit0\x00', &(0x7f00000001c0)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @remote}}) 05:51:14 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d7e24fc6010003e", 0x17}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 05:51:14 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000080)={'ip6gre0\x00', 0x0}) 05:51:14 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000006c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000340)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r1, 0x1, 0x0, 0x0, {0x2}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}]}, 0x1c}}, 0x0) 05:51:14 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000040)=0xff, 0x4) 05:51:14 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:14 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x2, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d7e24fc6010003e4025090a00053582c137153e", 0x23}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 05:51:14 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000540)={@mcast1, @dev, @rand_addr=' \x01\x00', 0x0, 0x7, 0x0, 0xd29b05612a6a40dc, 0x0, 0x4000320}) 05:51:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000080)={'ip6gre0\x00', 0x0}) 05:51:14 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01fffffff00000000000020000000c00018008000100", @ANYRES32=r1], 0x20}}, 0x0) 05:51:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d7e24fc6010003e4025090a00053582c137153e", 0x23}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 05:51:15 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:15 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x5421, &(0x7f00000000c0)={@loopback}) 05:51:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01fffffff00000000000020000000c00018008000100", @ANYRES32=r1], 0x20}}, 0x0) 05:51:15 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000480)=@bpf_lsm={0x1d, 0xa, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000700000000000000020000004c4a3000ffffffff183300000200000000000000000000008510"], &(0x7f0000000300)='syzkaller\x00', 0x7, 0xb8, &(0x7f0000000340)=""/184, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:51:15 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x2, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d7e24fc6010003e4025090a00053582c137153e", 0x23}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 05:51:15 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01fffffff00000000000020000000c00018008000100", @ANYRES32=r1], 0x20}}, 0x0) 05:51:15 executing program 5: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0xf, 0x0, 0x0) 05:51:15 executing program 5: socket$inet6_udp(0xa, 0x2, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@local, 0x0, r1}) 05:51:15 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01fffffff00000000000020000000c00018008000100", @ANYRES32=r1], 0x20}}, 0x0) 05:51:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d7e24fc6010003e4025090a00053582c137153e370248038047", 0x29}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 05:51:15 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGSKNS(r0, 0x894c, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 05:51:15 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000003b00)=[{{&(0x7f0000000180)={0x2, 0x4e20, @remote}, 0x10, &(0x7f0000001280)=[{0x0}, {0x0}, {&(0x7f00000010c0)='y', 0x1}], 0x3}}, {{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000002540)="fd", 0x1}, {&(0x7f0000000040)="571cc53ff2c7c7cc03a85211779c00957d5681ff8ee9d8e0680fe2836d6637c9190e082dcbeb54c43ecb476e778390dcc431389d9e4b177bec44d65e2bf42d01ff37779f4b1b2b851bb45cc7e65e4b281c0af431ad94c43ea3ac435598eb9751de4ceb1517fd80e23ce750f61f0c37fb9112ccd273e839556cf0621a2fc3432aede82f57fd236a5e2d9a5cd8e081642254d5551dd5716ca432761f35c44666bdafd5074a6de75bab52876df4a4e1085b6634ff2aea31777eb876b581e0a54f47071c2c05faea09020d133d4e444dde5ae84f291a772c0d3dc5db5d13e0c4698536bb63231c09e9295c7ac3311e1a6d", 0xef}], 0x63}}], 0x2, 0x0) 05:51:16 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x1a, 0x0, 0x0) 05:51:16 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:16 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x2, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:16 executing program 2: socket$inet(0x2, 0x80803, 0xff) 05:51:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d7e24fc6010003e4025090a00053582c137153e370248038047", 0x29}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 05:51:16 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000003b00)=[{{&(0x7f0000000000)={0x2, 0x4e20, @remote}, 0x10, &(0x7f0000001280)=[{0x0}, {0x0}, {&(0x7f00000010c0)='y', 0x1}], 0x3}}, {{0x0, 0x0, &(0x7f0000002940)=[{&(0x7f0000002540)="fd", 0x1}], 0x1, 0x0, 0xfeffffff}}], 0x2, 0x0) 05:51:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d7e24fc6010003e4025090a00053582c137153e370248038047", 0x29}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 05:51:16 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@loopback={0xfec00000}, 0x0, r2}) 05:51:16 executing program 5: socket(0x1, 0x0, 0x8000) 05:51:16 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d7e24fc6010003e4025090a00053582c137153e370248038047000000", 0x2c}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 05:51:16 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000180), 0xc) 05:51:16 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$packet(0x11, 0x2, 0x300) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) sendmmsg$inet(r0, &(0x7f0000004380)=[{{&(0x7f0000000040)={0x2, 0x4e23, @private=0xe0000000}, 0x10, 0x0}}], 0x1, 0x0) 05:51:16 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000f00)={0xb, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 05:51:16 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:16 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x2, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:16 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000000900)=[{{&(0x7f0000000040)={0x2, 0x4e21, @empty}, 0x10, 0x0}}, {{&(0x7f0000000440)={0x2, 0x0, @empty}, 0x10, 0x0}}], 0x2, 0x0) 05:51:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d7e24fc6010003e4025090a00053582c137153e370248038047000000", 0x2c}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 05:51:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg(r0, &(0x7f0000001940)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=[{0x10, 0x1}], 0x10}}], 0x2, 0x0) 05:51:17 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@loopback={0x1502}, 0x0, r2}) 05:51:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d7e24fc6010003e4025090a00053582c137153e370248038047000000", 0x2c}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 05:51:17 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:17 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) sendmmsg$inet(r0, &(0x7f0000004380)=[{{&(0x7f0000000040)={0x2, 0x4e23, @private=0xe0000000}, 0x10, 0x0}}], 0x1, 0x0) 05:51:17 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000140)=0x16, 0x4) 05:51:17 executing program 1: socketpair(0x26, 0x5, 0x0, &(0x7f0000000540)) 05:51:17 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x2, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d7e24fc6010003e4025090a00053582c137153e370248038047000000d1", 0x2d}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 05:51:17 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000003b00)=[{{&(0x7f0000000000)={0x2, 0x4e20, @remote}, 0x10, 0x0}}], 0x1, 0x8080) sendmmsg$inet(r0, &(0x7f0000002680)=[{{&(0x7f00000003c0)={0x2, 0x4e22, @multicast2}, 0x10, 0x0, 0x0, &(0x7f00000004c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @loopback}}}, @ip_retopts={{0x14, 0x0, 0x7, {[@generic={0x9f1f20bfdde7e571, 0x2}]}}}], 0x38}}], 0x1, 0x20000000) 05:51:17 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:17 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000540)={@mcast1, @dev, @rand_addr=' \x01\x00', 0x0, 0x0, 0x0, 0x0, 0x7, 0x4000320}) 05:51:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d7e24fc6010003e4025090a00053582c137153e370248038047000000d1", 0x2d}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 05:51:17 executing program 2: r0 = epoll_create(0x5) ioctl$BTRFS_IOC_ADD_DEV(r0, 0x5000940a, 0x0) 05:51:17 executing program 5: r0 = socket$inet(0x2, 0x3, 0x7) ioctl$sock_SIOCOUTQNSD(r0, 0x541b, 0x0) 05:51:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d7e24fc6010003e4025090a00053582c137153e370248038047000000d1", 0x2d}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 05:51:17 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:18 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000000bc0)=[{{&(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10, 0x0}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0xa0}}], 0x2, 0x0) 05:51:18 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_buf(r0, 0x1, 0x1c, &(0x7f0000000100)=""/171, &(0x7f00000001c0)=0xab) 05:51:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{0x0}, {&(0x7f00000001c0)=""/20, 0x14}, {&(0x7f0000000200)=""/76, 0x4c}], 0x3}, 0x40004022) syz_genetlink_get_family_id$batadv(&(0x7f0000000440), r0) socket$nl_generic(0x10, 0x3, 0x10) 05:51:18 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000006c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000340)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000380)={0x24, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x4}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}]}, 0x24}}, 0x0) 05:51:18 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000000900)=[{{&(0x7f0000000040)={0x2, 0x4e21, @empty}, 0x10, 0x0}}, {{&(0x7f0000000440)={0x2, 0x4e20, @empty}, 0x10, 0x0, 0x0, &(0x7f00000008c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast1}}}], 0x20}}], 0x2, 0x0) 05:51:18 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:18 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:18 executing program 5: unshare(0x10000100) 05:51:18 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:18 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000000340)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0xe3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0xe25, 0x5, "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"}, @ETHTOOL_A_BITSET_BITS={0x8, 0x3, 0x0, 0x1, [{0x4}]}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0xec4}}, 0x0) 05:51:18 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000006c00)=[{{&(0x7f0000000100)={0x2, 0x4e24, @private}, 0x10, 0x0}}], 0x1, 0x4) 05:51:18 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000003b00)=[{{&(0x7f0000000000)={0x2, 0x4e20, @remote}, 0x10, 0x0}}], 0x1, 0x8080) sendmmsg$inet(r0, &(0x7f0000002680)=[{{&(0x7f00000003c0)={0x2, 0x4e22, @multicast2}, 0x10, 0x0, 0x0, &(0x7f00000004c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @loopback}}}], 0x20}}], 0x1, 0x20000000) 05:51:18 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000006c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000340)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x6}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x3c}}, 0x0) 05:51:19 executing program 1: recvmsg$unix(0xffffffffffffffff, 0x0, 0x80002040) 05:51:19 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:19 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) sendmmsg$inet(r0, &(0x7f0000004380)=[{{&(0x7f0000000040)={0x2, 0x4e23, @private=0x1000000}, 0x10, 0x0}}], 0x1, 0x0) 05:51:19 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@loopback={0x8}, 0x0, r2}) 05:51:19 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:19 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000006c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000340)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x6}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x3c}}, 0x0) 05:51:19 executing program 2: pipe(&(0x7f0000000040)) socketpair(0x26, 0x0, 0x0, &(0x7f0000000300)) 05:51:19 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000006c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000340)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x6}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x3c}}, 0x0) 05:51:19 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_LISTALL(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={0x0}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 05:51:19 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:19 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f00000006c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000340)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_SET_MESH(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000000)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r2}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x6}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}]}, 0x3c}}, 0x0) 05:51:19 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:19 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) sendmsg$NL80211_CMD_AUTHENTICATE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 05:51:19 executing program 2: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f0000000200)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f00000029c0)=""/4108, 0x100c}, {&(0x7f0000003a00)=""/4106, 0x100a}, {&(0x7f00000019c0)=""/4071, 0xfe7}], 0x3}, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0xfffffffc, @empty}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="900000002000", 0x6, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000010", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='%', 0x10a73, 0xd9ac, 0x0, 0x4b6ae4f95a5de35b) 05:51:19 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000000300)=[{{&(0x7f0000000080)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f00000001c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @dev, @private}}}], 0x20}}], 0x1, 0x0) 05:51:19 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:19 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NL80211_CMD_LEAVE_IBSS(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x7f, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @val={0xc}}}, ["", ""]}, 0x28}}, 0x0) [ 484.082402][T25095] netlink: 32097 bytes leftover after parsing attributes in process `syz-executor.2'. 05:51:20 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000080)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01"], 0x2c}}, 0x0) 05:51:20 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg(r0, &(0x7f0000002080)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000100)='t', 0x1}, {0x0}, {&(0x7f0000000180)='\t', 0x1}], 0x3}}], 0x1, 0x0) 05:51:20 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:20 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={@remote, @loopback, @empty, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1000000}) 05:51:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000000)={'tunl0\x00', @ifru_flags}) 05:51:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xf) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x440000}, 0xc, &(0x7f00000000c0)={0x0}}, 0x0) 05:51:20 executing program 1: bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x8}, 0xc) 05:51:20 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, 0x0) 05:51:20 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:20 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000004380)=[{{&(0x7f0000000040)={0x2, 0x4e23, @private}, 0x10, 0x0, 0x0, &(0x7f0000001300)=[@ip_retopts={{0x3c, 0x0, 0x7, {[@timestamp_addr={0x44, 0x2c, 0x0, 0x1, 0x0, [{@multicast1}, {@local}, {@empty}, {@private}, {@initdev={0xac, 0x1e, 0x0, 0x0}}]}]}}}], 0x40}}], 0x1, 0x0) 05:51:20 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:20 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000540)={@mcast1, @dev, @rand_addr=' \x01\x00', 0x0, 0x8, 0x0, 0x0, 0x7, 0x4000320}) 05:51:21 executing program 2: setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000180), 0xfffffffffffffe79) 05:51:21 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000007400)=[{{&(0x7f0000000000)={0x2, 0x4e21, @remote}, 0x10, 0x0}}, {{&(0x7f0000000180)={0x2, 0x0, @remote}, 0x10, 0x0}}], 0x2, 0x0) 05:51:21 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:21 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000003480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000003440)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01}}}], 0x20}, 0x0) 05:51:21 executing program 2: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000010c0)={'wlan1\x00'}) 05:51:21 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000000340)={0xec4, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0xe3c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0xe05, 0x5, "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"}, @ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x4}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0xec4}}, 0x0) 05:51:21 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:51:21 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$BATADV_CMD_TP_METER(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x0) 05:51:21 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:21 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000003b00)=[{{&(0x7f0000000000)={0x2, 0x4e20, @remote}, 0x10, 0x0}}], 0x1, 0x8080) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000480)={'batadv0\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000002680)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000003c0)={0x2, 0x4e22, @multicast2}, 0x10, 0x0, 0x0, &(0x7f00000004c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @remote, @loopback}}}, @ip_retopts={{0x3c, 0x0, 0x7, {[@generic={0x9f1f20bfdde7e571, 0x12, "ef2834be482c3d278dfd45bc70042a92"}, @lsrr={0x83, 0x17, 0x0, [@local, @dev, @empty, @local, @local]}]}}}], 0x60}}], 0x2, 0x0) 05:51:21 executing program 5: r0 = socket$inet(0x2, 0x3, 0x7) getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0) 05:51:21 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000003b00)=[{{&(0x7f0000000000)={0x2, 0x4e20, @remote}, 0x10, 0x0}}], 0x1, 0x8080) sendmmsg$inet(r0, &(0x7f0000002680)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000003c0)={0x2, 0x4e22, @multicast2}, 0x10, 0x0, 0x0, &(0x7f00000004c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @loopback}}}], 0x20}}], 0x2, 0x0) 05:51:21 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={@mcast2, 0x2000061}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000140)={@loopback={0x100000000000000}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x101}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendto(r2, &(0x7f0000000080)="4529d83fa315d17c34beed460278c6a166cfc976146d5c2eb06bb5ef20", 0x1d, 0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={@dev, 0x43, r3}) 05:51:21 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0x0, 0x0, &(0x7f0000000300)) 05:51:21 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000008000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:22 executing program 5: rt_sigaction(0x4, &(0x7f00000000c0)={0x0, 0x0, 0x0}, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x8, &(0x7f0000000200)) 05:51:22 executing program 4: r0 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000100)=""/62, 0x3e) 05:51:22 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000180)={0x10, 0x0, 0x0, 0x1}, 0xc) 05:51:22 executing program 2: syz_emit_ethernet(0x4e, &(0x7f0000000180)={@remote, @dev, @void, {@ipv4={0x800, @generic={{0x10, 0x4, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, @private, @empty, {[@ra={0x94, 0x4}, @rr={0x7, 0x1f, 0x0, [@multicast2, @remote, @loopback, @multicast1, @private, @multicast1, @remote]}, @ra={0x94, 0x4}, @ra={0x94, 0x4}]}}}}}}, 0x0) 05:51:22 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000008000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:22 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f0000003b00)=[{{&(0x7f0000000000)={0x2, 0x4e20, @remote}, 0x10, 0x0}}], 0x1, 0x8080) sendmmsg$inet(r0, &(0x7f0000002680)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000003c0)={0x2, 0x4e22, @multicast2}, 0x10, 0x0, 0x0, &(0x7f00000004c0)=[@ip_retopts={{0x3c, 0x0, 0x7, {[@generic={0x9f1f20bfdde7e571, 0x12, "ef2834be482c3d278dfd45bc70042a92"}, @lsrr={0x83, 0x17, 0x0, [@local, @dev, @empty, @local, @local]}]}}}], 0x40}}], 0x2, 0x0) 05:51:22 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000004c0)={'batadv_slave_1\x00'}) 05:51:22 executing program 2: msgget$private(0x0, 0x0) fork() socket$nl_xfrm(0x10, 0x3, 0x6) msgctl$MSG_STAT(0x0, 0xb, 0x0) 05:51:22 executing program 5: socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32, @ANYBLOB="139b0000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000001580)=ANY=[@ANYBLOB="8800000024000b0f0000001e00000000001f4b00", @ANYRES32, @ANYBLOB="00000000ffffffff000000000b0001006d717072696f00005800020001000000000000000000000000000000000010"], 0x88}}, 0x0) 05:51:22 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000008000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:22 executing program 4: r0 = inotify_init1(0x0) ioctl$FICLONE(r0, 0x40049409, r0) 05:51:22 executing program 2: madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/246, 0xf6}], 0x1, &(0x7f0000000180)=[{&(0x7f0000217f28)=""/231, 0xe7}], 0x1, 0x0) move_pages(0x0, 0x1, &(0x7f0000000200)=[&(0x7f0000336000/0x1000)=nil], &(0x7f000026bfec), 0x0, 0x0) [ 486.769984][T25215] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 486.876788][T25215] device bond1 entered promiscuous mode [ 486.886506][T25215] 8021q: adding VLAN 0 to HW filter on device bond1 [ 486.905387][T25215] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 486.921750][T25215] bond2 (uninitialized): Released all slaves 05:51:22 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:23 executing program 1: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$SHM_INFO(r0, 0xe, &(0x7f0000000000)=""/64) 05:51:23 executing program 4: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000140)=0xa0000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f0000000080)={@my=0x0}) ioctl$IOCTL_VMCI_QUEUEPAIR_ALLOC(r0, 0x7b0, &(0x7f0000000200)={{}, @host}) 05:51:23 executing program 5: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$IOCTL_VMCI_VERSION2(r0, 0x7a7, &(0x7f0000000140)=0xa0000) ioctl$IOCTL_VMCI_INIT_CONTEXT(r0, 0x7a0, &(0x7f0000000080)={@my=0x0}) ioctl$IOCTL_VMCI_NOTIFY_RESOURCE(r0, 0x7a5, &(0x7f0000000680)={{@my=0x1}}) 05:51:23 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000800000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:23 executing program 2: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, 0x0, 0x0) 05:51:23 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000027c0)='/sys/class/power_supply', 0x0, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r0, 0x8983, 0x0) 05:51:23 executing program 4: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cpu.stat\x00', 0x0, 0x0) 05:51:23 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000800000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:23 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/power_supply', 0xc000, 0x8) 05:51:23 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:23 executing program 5: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x2140, 0x0) ioctl$KDGKBMODE(r0, 0x5451, 0x0) 05:51:23 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x80, 0x0) 05:51:23 executing program 1: openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) 05:51:23 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001100)='/sys/devices/system', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f00000000c0)='freezer.state\x00', 0x0, 0x0) 05:51:23 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000800000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:23 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x84100, 0x0) 05:51:23 executing program 4: shmctl$IPC_INFO(0xffffffffffffffff, 0x3, &(0x7f0000000000)=""/34) 05:51:24 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f0000001100)='/sys/devices/system', 0x210200, 0x0) 05:51:24 executing program 4: keyctl$get_persistent(0x16, 0x0, 0xfffffffffffffff9) 05:51:24 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000008000000000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:24 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:24 executing program 5: setgroups(0x1, &(0x7f00000020c0)=[0xffffffffffffffff]) 05:51:24 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x600100, 0x0) 05:51:24 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) 05:51:24 executing program 1: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) 05:51:24 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000008000000000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:24 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000002080), 0x1, 0x0) 05:51:24 executing program 2: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x40080, 0x0) 05:51:24 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200), 0x101200, 0x0) 05:51:24 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000003280)=[{{0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f0000000b40)="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", 0x5d4}], 0x1}}], 0x1, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000001100)='/sys/devices/system', 0x0, 0x0) 05:51:24 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:24 executing program 4: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000000)=""/243) 05:51:24 executing program 2: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$SHM_LOCK(r0, 0xb) 05:51:24 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000008000000000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:25 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$NS_GET_USERNS(r0, 0xb701, 0x0) 05:51:25 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, 0x0, 0x0) 05:51:25 executing program 1: openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x7fe2c04ef767dd2d, 0x0) 05:51:25 executing program 2: openat$fuse(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) 05:51:25 executing program 5: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) shmctl$IPC_SET(r0, 0x1, &(0x7f00000001c0)={{0x0, 0x0, 0xee00, 0xee00, 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}) 05:51:25 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000800"/16], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:25 executing program 4: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(r0, 0x50009403, 0x0) 05:51:25 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0x0, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:25 executing program 2: memfd_create(&(0x7f00000000c0)='[\x00', 0x1) 05:51:25 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 05:51:25 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000800"/16], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:25 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='environ\x00') ioctl$F2FS_IOC_GARBAGE_COLLECT(r0, 0x4004f506, 0x0) 05:51:25 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, 0x0, 0x0) 05:51:25 executing program 5: epoll_create(0x7f) 05:51:26 executing program 1: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, 0x0, 0x0) 05:51:26 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000800"/16], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:26 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/devices/system', 0x8000, 0x0) 05:51:26 executing program 4: pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x1ff}, 0x0, 0x0) 05:51:26 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0x0, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:26 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, 0x0) 05:51:26 executing program 5: pipe(&(0x7f0000000180)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, 0x0) 05:51:26 executing program 4: signalfd4(0xffffffffffffffff, &(0x7f0000002380), 0x8, 0x80800) 05:51:26 executing program 2: recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x40000020, 0x0, 0x0) 05:51:26 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) fstatfs(r0, &(0x7f00000000c0)=""/72) 05:51:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$INCFS_IOC_CREATE_FILE(r0, 0xc058671e, 0x0) 05:51:26 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) 05:51:26 executing program 2: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) mmap$perf(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 05:51:26 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0x0, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:26 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:26 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, 0x0) 05:51:26 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r0, 0x40089413, 0x0) 05:51:27 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) openat$cgroup_subtree(r0, &(0x7f0000001040), 0x2, 0x0) 05:51:27 executing program 5: r0 = signalfd4(0xffffffffffffffff, &(0x7f00000021c0), 0x8, 0x0) fcntl$dupfd(r0, 0x406, r0) 05:51:27 executing program 4: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, 0x0) 05:51:27 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:27 executing program 4: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) ioctl$INCFS_IOC_FILL_BLOCKS(r0, 0x80106720, 0x0) 05:51:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) preadv(r0, 0x0, 0x0, 0x0, 0x0) 05:51:27 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0x17, 0x0, 0x80, 0x2cc, 0x13d0}, 0x40) 05:51:27 executing program 5: openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000002180)='cgroup.threads\x00', 0x2, 0x0) 05:51:27 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:27 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:27 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r0, 0x4008941a, 0x0) 05:51:27 executing program 2: openat$vsock(0xffffffffffffff9c, &(0x7f0000000000), 0x101802, 0x0) 05:51:27 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0x11, 0x0, 0x4) 05:51:27 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x22, 0x0, 0x0) 05:51:27 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/rcu_normal', 0x165400, 0x0) 05:51:27 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:28 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r0, 0x0, 0x0) 05:51:28 executing program 5: r0 = socket(0x10, 0x2, 0x0) bind$xdp(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x36310000}, 0x10) 05:51:28 executing program 1: mq_open(&(0x7f0000000040)='+)\x00', 0x0, 0x0, &(0x7f0000000080)) 05:51:28 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000180)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) 05:51:28 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={@mcast1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x404c0010}) 05:51:28 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:28 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:28 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x31, &(0x7f0000000140)=@nat={'nat\x00', 0x1b, 0x5, 0x478, 0x2a8, 0x560, 0xffffffff, 0x0, 0x2a8, 0x788, 0x788, 0xffffffff, 0x788, 0x788, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv6=@remote, @gre_key}}}, {{@ipv6={@local, @private0, [], [], 'bond_slave_0\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xd8}, @common=@unspec=@CONNMARK={0x30}}, {{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@empty, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4=@loopback, @ipv4=@broadcast, @icmp_id, @icmp_id}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4d8) 05:51:28 executing program 5: syz_io_uring_setup(0x6d9f, &(0x7f0000000040), &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0, 0x0) syz_io_uring_setup(0x4d3, &(0x7f0000000140), &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) 05:51:28 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000140)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000faff9400000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 05:51:28 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:28 executing program 2: r0 = socket(0x10, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000008c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000300)="3ae78f45e01f72b90a35632faabeaa7a3d8fa1bf8637d7ac1ca8acb03cf10ed20c9ed79dc5e24619584b3ec4998bb5d4a3563f802c2f06823be44242904dfca82f57f280872c699fa93499f48a42a1365ff1c1ce3cf766cf1f50bc22808e5de47a2e9c6983842286910b847c5d314d38ec795cb09d5182e2", 0x78}, {&(0x7f0000000380)="b4980f64b896920fb9ea9fa1093b847d9364500ad36c6305d461ea369d8e710eb97da189ae8ee4246ef810ed50684ec54a60a924c7154cabf0cbc6492c1b4f88a02b6e12394f074080f447d68b5968732a4022123dd2a02dc081193cb828add0d4a67c5e8da1b2d992a7eb", 0x6b}, {&(0x7f0000001400)="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", 0x1000}], 0x3, &(0x7f0000000740)=[@rthdrdstopts={{0x18}}, @tclass={{0x14}}], 0x30}}, {{&(0x7f0000000840)={0xa, 0x0, 0x0, @mcast2}, 0xb, 0x0}}], 0x2, 0x0) 05:51:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000000), 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000580)={0x5c, r1, 0xb478d7629f8069af, 0x0, 0x0, {}, [{{0x8, 0x1, r3}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}]}, 0x5c}}, 0x0) 05:51:28 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:29 executing program 1: r0 = fsmount(0xffffffffffffffff, 0x1, 0x70) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) sendmsg$AUDIT_TTY_SET(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfc, {0x0, 0x1}, ["", "", "", "", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x20000015}, 0x4000040) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000040)={@mcast2, 0x0, r7}) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000100)={@private1, 0x59, r7}) r8 = socket$inet6(0xa, 0x80000, 0x80000000) setsockopt$inet6_opts(r8, 0x29, 0x37, &(0x7f00000000c0)=ANY=[@ANYBLOB="1102027f00000000fe80000000060000000000000000002f"], 0x18) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000240)={'batadv0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000280)={@private1, 0x22, r9}) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={@private1={0xfc, 0x1, '\x00', 0x1}, @private0={0xfc, 0x0, '\x00', 0x1}, @local, 0x1, 0x9, 0x3, 0x0, 0xbb, 0x0, r4}) r10 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r10, 0x29, 0x1b, &(0x7f0000000000)=@srh={0x0, 0x2, 0x4, 0x1, 0x0, 0x0, 0x0, [@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}]}, 0x18) 05:51:29 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:29 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x5, &(0x7f0000000400)=@framed={{}, [@call, @jmp={0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}]}, &(0x7f0000000480)='GPL\x00', 0x7, 0x92, &(0x7f00000004c0)=""/146, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:51:29 executing program 5: syz_io_uring_setup(0x3977, &(0x7f0000000180)={0x0, 0x0, 0x44}, &(0x7f0000fa4000/0xc000)=nil, &(0x7f0000a6f000/0x4000)=nil, &(0x7f0000000200), &(0x7f0000000240)) 05:51:29 executing program 2: r0 = socket(0xa, 0x3, 0x3) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000100)={&(0x7f0000000000)={0xa}, 0x2000000c, &(0x7f00000000c0)={0x0}}, 0x4000000) 05:51:29 executing program 2: r0 = socket(0x10, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) bind$xdp(r0, &(0x7f0000000000)={0x10, 0x0, r2}, 0x10) 05:51:29 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000080)={@mcast1, 0x0, r2}) 05:51:29 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0x1, &(0x7f00000001c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}], &(0x7f0000000240)='syzkaller\x00', 0x5, 0xcc, &(0x7f0000000280)=""/204, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:51:29 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r2}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:29 executing program 4: r0 = socket(0x10, 0x2, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={0x14, r1, 0x1}, 0x14}}, 0x0) 05:51:29 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:29 executing program 2: openat$vsock(0xffffffffffffff9c, &(0x7f0000002fc0), 0x4000, 0x0) 05:51:29 executing program 1: io_setup(0xffffff80, &(0x7f0000000000)) 05:51:29 executing program 5: r0 = epoll_create(0x9) fsetxattr(r0, &(0x7f0000000040)=@random={'user.', '$\x00'}, &(0x7f0000000080)='$\\\x19\\(]%(@\x00', 0xa, 0x0) 05:51:29 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x0, 0x6, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:51:29 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:29 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x30, &(0x7f0000000140)=@nat={'nat\x00', 0x1b, 0x5, 0x478, 0x2a8, 0x560, 0xffffffff, 0x0, 0x2a8, 0x788, 0x788, 0xffffffff, 0x788, 0x788, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv6=@remote, @gre_key}}}, {{@ipv6={@local, @private0, [], [], 'bond_slave_0\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xd8}, @common=@unspec=@CONNMARK={0x30}}, {{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@empty, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4=@loopback, @ipv4=@broadcast, @icmp_id, @icmp_id}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4d8) 05:51:30 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000300)="a6d02a54d0d4e6cd45d8dbedb5897c4d", 0x10) 05:51:30 executing program 5: syz_io_uring_setup(0x1ca5, &(0x7f0000000240), &(0x7f0000b42000/0x1000)=nil, &(0x7f00009bb000/0x1000)=nil, 0x0, 0x0) syz_io_uring_setup(0x43b5, &(0x7f0000000040), &(0x7f00009ba000/0x4000)=nil, &(0x7f0000b40000/0x3000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) 05:51:30 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:30 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000580)={0x20, r1, 0xb478d7629f8069af, 0x0, 0x0, {}, [{{0x8, 0x4}, {0x4}}]}, 0x20}}, 0x0) 05:51:30 executing program 4: r0 = socket(0x10, 0x2, 0x9) bind$xdp(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0x10) 05:51:30 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) readv(r0, &(0x7f00000013c0)=[{0x0}, {0x0}, {&(0x7f0000000340)=""/4096, 0x1000}], 0x3) 05:51:30 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x2394, 0x0, 0x1}, 0x40) 05:51:30 executing program 2: syz_io_uring_setup(0x6d9f, &(0x7f0000000040), &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f00000000c0), 0x0) syz_io_uring_setup(0x4d3, &(0x7f0000000140), &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000200)) 05:51:30 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000300), 0x4) 05:51:30 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_DEL_SEC_DEV(r0, &(0x7f0000000d40)={0xfffffffffffffffe, 0x47, &(0x7f0000000d00)={&(0x7f0000000240)={0x14, 0x0, 0x0, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV]}, 0x14}}, 0x0) 05:51:30 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00'}, 0x10) write$cgroup_type(r1, &(0x7f0000000000), 0x248800) 05:51:30 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:31 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x12, &(0x7f0000000140)=@nat={'nat\x00', 0x1b, 0x5, 0x478, 0x2a8, 0x560, 0xffffffff, 0x0, 0x2a8, 0x788, 0x788, 0xffffffff, 0x788, 0x788, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv6=@remote, @gre_key}}}, {{@ipv6={@local, @private0, [], [], 'bond_slave_0\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xd8}, @common=@unspec=@CONNMARK={0x30}}, {{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@empty, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4=@loopback, @ipv4=@broadcast, @icmp_id, @icmp_id}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4d8) 05:51:31 executing program 4: clock_adjtime(0x0, &(0x7f0000000000)={0x700}) 05:51:31 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x3, &(0x7f0000000180)=@framed={{}, [], {0x95, 0x0, 0x0, 0x7a000000}}, &(0x7f0000000200)='GPL\x00', 0x7, 0xd8, &(0x7f0000000240)=""/216, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:51:31 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r1}, 0x10) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) 05:51:31 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000008c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000300)="3ae78f45e01f72b90a35632faabeaa7a3d8fa1bf8637d7ac1ca8acb03cf10ed20c9ed79dc5e24619584b3ec4998bb5d4a3563f802c2f06823be44242904dfca82f57f280872c699fa93499f48a42a1365ff1c1ce3cf766cf1f50bc22808e5de47a2e9c6983842286910b847c5d314d38ec795cb09d5182e2", 0x78}, {&(0x7f0000000380)="b4980f64b896920fb9ea9fa1093b847d9364500ad36c6305d461ea369d8e710eb97da189ae8ee4246ef810ed50684ec54a60a924c7154cabf0cbc6492c1b4f88a02b6e12394f074080f447d68b5968732a4022123dd2a02dc081193cb828add0d4a67c5e8da1b2d992a7eb", 0x6b}, {&(0x7f0000001400)="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", 0x1000}], 0x3, &(0x7f0000000740)=[@rthdrdstopts={{0x18}}, @tclass={{0x14}}], 0xf}}, {{&(0x7f0000000840)={0xa, 0x0, 0x0, @mcast2}, 0x1c, 0x0}}], 0x2, 0x0) 05:51:31 executing program 2: r0 = socket(0xa, 0x3, 0x3) socket$packet(0x11, 0x2, 0x300) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000100)={&(0x7f0000000000)={0xa}, 0x2000000c, &(0x7f00000000c0)={0x0}}, 0x0) 05:51:31 executing program 1: add_key(&(0x7f00000010c0)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) 05:51:31 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x13, 0x8, 0xef3e, 0x0, 0x408}, 0x40) 05:51:31 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r1}, 0x10) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) 05:51:31 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8929, &(0x7f0000000000)) 05:51:31 executing program 2: r0 = io_uring_setup(0x67df, &(0x7f0000000100)) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r0, 0xa, 0x0, 0x0) 05:51:31 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:31 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000002100)=@bpf_lsm={0x1d, 0x2, &(0x7f0000000040)=@raw=[@map], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:51:31 executing program 2: fork() openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 05:51:31 executing program 5: r0 = socket(0x10, 0x2, 0x0) bind$xdp(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x30}, 0x10) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={0x0}}, 0x0) 05:51:31 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r1}, 0x10) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x248800) 05:51:31 executing program 4: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x80001, 0x0) write(r0, &(0x7f0000000040)="2fe3d528e2f9b301", 0x8) 05:51:32 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x3c, 0x0, 0x0) 05:51:32 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x3, &(0x7f0000000180)=@framed={{0x18, 0xa}}, &(0x7f0000000200)='GPL\x00', 0x7, 0xd8, &(0x7f0000000240)=""/216, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:51:32 executing program 4: r0 = socket(0x10, 0x2, 0x0) connect$inet6(r0, 0x0, 0x7) 05:51:32 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x1c, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000200)='GPL\x00', 0x7, 0xd8, &(0x7f0000000240)=""/216, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:51:32 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x541b, 0x0) 05:51:32 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, 0x0, 0x0) 05:51:32 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:32 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup2(r1, r0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000100)={@empty}) 05:51:32 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@nat={'nat\x00', 0x1b, 0x5, 0x858, 0x2a8, 0x560, 0xffffffff, 0x0, 0x2a8, 0x788, 0x788, 0xffffffff, 0x788, 0x788, 0x5, 0x0, {[{{@uncond, 0x0, 0x118, 0x160, 0x0, {}, [@common=@dst={{0x48}}, @common=@eui64={{0x27}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv6=@remote, @gre_key}}}, {{@ipv6={@local, @private0, [], [], 'bond_slave_0\x00', 'hsr0\x00'}, 0x0, 0x118, 0x148, 0x0, {}, [@common=@ipv6header={{0x28}}, @common=@hbh={{0x48}}]}, @common=@unspec=@CONNMARK={0x30}}, {{@uncond, 0x0, 0x270, 0x2b8, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private0, @private2, @private2, @private2, @ipv4={'\x00', '\xff\xff', @dev}, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, @dev, @rand_addr=' \x01\x00', @mcast2, @dev, @private2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @remote, @private1]}}, @common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @empty, @private1}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@empty, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @port, @icmp_id}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @empty, @remote, @mcast2, @mcast2, @mcast2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, @remote, @empty, @private2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, @mcast2]}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4=@loopback, @ipv4=@broadcast, @icmp_id, @icmp_id}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x8b8) 05:51:32 executing program 5: syz_open_dev$loop(&(0x7f0000002640), 0x0, 0x101080) 05:51:32 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, 0x0, 0x0) 05:51:32 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f0000002740)='/sys/block/ram1', 0x62200, 0x0) 05:51:32 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x21, 0x0, 0x0) 05:51:33 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(r0, 0x29, 0x1b, &(0x7f0000000040)=ANY=[@ANYBLOB="9a7e02445cb88b000000007b71dda7"], 0x18) 05:51:33 executing program 0: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000080000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000002c0)='block_bio_queue\x00', r2}, 0x10) write$cgroup_type(r1, 0x0, 0x0) 05:51:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000003c0)={0x14, r1, 0x301}, 0x14}}, 0x0) 05:51:33 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x10, &(0x7f0000000140)=@nat={'nat\x00', 0x1b, 0x5, 0x478, 0x2a8, 0x560, 0xffffffff, 0x0, 0x2a8, 0x788, 0x788, 0xffffffff, 0x788, 0x788, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv6=@remote, @gre_key}}}, {{@ipv6={@local, @private0, [], [], 'bond_slave_0\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xd8}, @common=@unspec=@CONNMARK={0x30}}, {{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@empty, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4=@loopback, @ipv4=@broadcast, @icmp_id, @icmp_id}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4d8) 05:51:33 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000000), 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000000)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000580)={0x20, r1, 0xb478d7629f8069af, 0x0, 0x0, {}, [{{0x8, 0x1, r3}, {0x4}}]}, 0x20}}, 0x0) 05:51:33 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:33 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001640)={&(0x7f0000000080)={0xa, 0x4e20, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000001540)=[@pktinfo={{0x24, 0x29, 0x32, {@private2}}}], 0x28}, 0x0) 05:51:33 executing program 4: mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000080)='./bus\x00', 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./bus\x00', &(0x7f0000000100), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,metacopy=on']) chdir(&(0x7f0000000340)='./bus\x00') r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x400) io_setup(0x202, &(0x7f0000000200)=0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x18, 0xd9f, 0x0) io_submit(r1, 0x1, &(0x7f0000000380)=[&(0x7f00000000c0)={0x25, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000280)="19", 0x1}]) 05:51:33 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x2, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffe3a}, 0xa7) 05:51:33 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x2, &(0x7f00000004c0)={0x18, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9f, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x3e}, 0x3e) 05:51:33 executing program 5: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0/file0\x00'}, 0x10) 05:51:33 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FIDEDUPERANGE(r0, 0xc0189436, 0x0) [ 497.846686][T25726] overlayfs: './bus' not a directory [ 497.927614][T25728] overlayfs: './bus' not a directory 05:51:33 executing program 1: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x0, 0x101002) r1 = dup(r0) write$tun(r1, &(0x7f0000001340)={@void, @val, @llc={@snap={0x0, 0x0, "da", "378f99"}}}, 0x12) 05:51:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000000), 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000580)={0x60, r1, 0xb478d7629f8069af, 0x0, 0x0, {}, [{{0x8, 0x1, r3}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x9}, {0x8}}, {0x8}}}]}}]}, 0x60}}, 0x0) 05:51:33 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:33 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x1b, &(0x7f0000000140)=@nat={'nat\x00', 0x1b, 0x5, 0x478, 0x2a8, 0x560, 0xffffffff, 0x0, 0x2a8, 0x788, 0x788, 0xffffffff, 0x788, 0x788, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv6=@remote, @gre_key}}}, {{@ipv6={@local, @private0, [], [], 'bond_slave_0\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xd8}, @common=@unspec=@CONNMARK={0x30}}, {{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@empty, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4=@loopback, @ipv4=@broadcast, @icmp_id, @icmp_id}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffd}}}}, 0x4d8) 05:51:33 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) mmap$xdp(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x100000000) 05:51:34 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_buf(r0, 0x107, 0x5, &(0x7f0000000200)="f64a46b90687433760022ec40d28c86d", 0x10) 05:51:34 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x48, &(0x7f0000000140)=@nat={'nat\x00', 0x1b, 0x5, 0x478, 0x2a8, 0x560, 0xffffffff, 0x0, 0x2a8, 0x788, 0x788, 0xffffffff, 0x788, 0x788, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv6=@remote, @gre_key}}}, {{@ipv6={@local, @private0, [], [], 'bond_slave_0\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xd8}, @common=@unspec=@CONNMARK={0x30}}, {{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@empty, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4=@loopback, @ipv4=@broadcast, @icmp_id, @icmp_id}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4d8) [ 498.057085][T25743] validate_nla: 12 callbacks suppressed [ 498.057164][T25743] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 498.088147][T25743] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 05:51:34 executing program 5: r0 = socket(0x10, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) [ 498.156936][T25751] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 05:51:34 executing program 5: r0 = syz_open_dev$vcsa(&(0x7f00000011c0), 0x0, 0x2) r1 = dup(r0) write$tun(r1, &(0x7f0000001340)={@void, @val, @llc={@snap={0x0, 0x0, "da", "378f99"}}}, 0x12) [ 498.221750][T25751] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. 05:51:34 executing program 2: r0 = socket(0x11, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8943, &(0x7f0000000000)) 05:51:34 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)={0x14, r1, 0x303}, 0x14}}, 0x0) 05:51:34 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x109181, 0x0) 05:51:34 executing program 2: r0 = socket(0x10, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000008c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@rthdrdstopts={{0x18}}, @hoplimit={{0xfffffffffffffe74}}, @flowinfo={{0x14}}, @dontfrag={{0x14}}, @hoplimit_2292={{0x14}}, @rthdr={{0x68, 0x29, 0x39, {0x0, 0xa, 0x0, 0x0, 0x0, [@dev, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private2, @private1, @dev]}}}], 0xe0}}, {{&(0x7f0000000840)={0xa, 0x0, 0x0, @mcast2}, 0x1c, 0x0}}], 0x2, 0x0) 05:51:34 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x3c, &(0x7f0000000140)=@nat={'nat\x00', 0x1b, 0x5, 0x478, 0x2a8, 0x560, 0xffffffff, 0x0, 0x2a8, 0x788, 0x788, 0xffffffff, 0x788, 0x788, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv6=@remote, @gre_key}}}, {{@ipv6={@local, @private0, [], [], 'bond_slave_0\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xd8}, @common=@unspec=@CONNMARK={0x30}}, {{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@empty, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4=@loopback, @ipv4=@broadcast, @icmp_id, @icmp_id}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4d8) 05:51:34 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) copy_file_range(r0, &(0x7f00000000c0), r1, 0x0, 0x0, 0x0) 05:51:34 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@nat={'nat\x00', 0x1b, 0x5, 0x858, 0x2a8, 0x560, 0xffffffff, 0x0, 0x2a8, 0x788, 0x788, 0xffffffff, 0x788, 0x788, 0x5, 0x0, {[{{@uncond, 0x0, 0x118, 0x160, 0x0, {}, [@common=@dst={{0x48}}, @common=@eui64={{0x28}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv6=@remote, @gre_key}}}, {{@ipv6={@local, @private0, [], [], 'bond_slave_0\x00', 'hsr0\x00'}, 0x0, 0x118, 0x148, 0x0, {}, [@common=@ipv6header={{0x28}}, @common=@hbh={{0x48}}]}, @common=@unspec=@CONNMARK={0x30}}, {{@uncond, 0x0, 0x270, 0x2b8, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private0, @private2, @private2, @private2, @ipv4={'\x00', '\xff\xff', @dev}, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, @dev, @rand_addr=' \x01\x00', @mcast2, @dev, @private2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @remote, @private1]}}, @common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @empty, @private1}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@empty, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @port, @icmp_id}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @empty, @remote, @mcast2, @mcast2, @mcast2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, @remote, @empty, @private2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, @mcast2]}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4=@loopback, @ipv4=@broadcast, @icmp_id, @icmp_id}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3) 05:51:34 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:34 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f0000000200)={0x1, &(0x7f00000001c0)=[{0x64}]}) [ 498.743353][T25783] x_tables: duplicate underflow at hook 1 05:51:34 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x45, 0x40, 0x0, 0x0) 05:51:34 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40049409, 0x0) 05:51:34 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x10}}}, 0x1c) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r0, 0x29, 0x37, 0x0, 0x0) 05:51:34 executing program 4: pselect6(0x40, &(0x7f00000001c0), &(0x7f0000000200)={0x1}, &(0x7f0000000240)={0x5}, &(0x7f0000000280)={0x77359400}, 0x0) [ 498.931471][ T37] audit: type=1326 audit(1627969894.874:109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=25789 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x0 05:51:34 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8993, &(0x7f0000000000)) 05:51:35 executing program 0: dup(0xffffffffffffffff) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0, 0x0) syz_io_uring_setup(0x4d3, &(0x7f0000000140), &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000200)) 05:51:35 executing program 2: setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)="5a8fe91070da4a787f176cc3ddc1583859cae313f8c68219ab8fc8bc33ba926225d1b0aa5ccfa9d3a4d960a1bd3802dc1851799e639dd678a4", 0x39) bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x97) 05:51:35 executing program 1: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x25, 0x3, 0x130) 05:51:35 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000001740)={&(0x7f0000001640), 0xc, &(0x7f0000001700)={&(0x7f0000001680)={0x34, 0x0, 0x2, 0x101, 0x0, 0x0, {}, [@CTA_EXPECT_MASTER={0x18, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @private}}}]}, @CTA_EXPECT_CLASS={0x8}]}, 0x34}}, 0x0) 05:51:35 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:35 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0x17, 0x0, 0x80, 0x2cc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x400000, 0x2}, 0x40) 05:51:35 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x6, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:51:35 executing program 0: r0 = io_uring_setup(0x67df, &(0x7f0000000100)) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x20013, r0, 0x10000000) [ 499.736747][ T37] audit: type=1326 audit(1627969895.684:110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=25789 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x0 05:51:35 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_ACCT_NEW(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(r0, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000001700)={0x0}}, 0x0) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f00000019c0)={&(0x7f0000001900)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000001980)={&(0x7f0000001940)={0x24, 0x3, 0x6, 0x401, 0x0, 0x0, {0x7}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x20044040) 05:51:35 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendmsg$AUDIT_DEL_RULE(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000040)={0x420, 0x3f4, 0x1}, 0x420}}, 0x0) 05:51:35 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) 05:51:35 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x88, 0x40, 0x0, 0x0) 05:51:35 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x12, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:51:35 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:35 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@req={0x28, &(0x7f0000000000)={'veth1_macvtap\x00', @ifru_addrs=@xdp={0x2c, 0x0, 0x0}}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890c, &(0x7f0000000080)={@remote, @mcast2, @mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000, r1}) 05:51:35 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000000), 0xffffffffffffffff) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000300)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000580)={0x60, r1, 0xb478d7629f8069af, 0x0, 0x0, {}, [{{0x8, 0x1, r3}, {0x44, 0x2, 0x0, 0x1, [{0x3, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}]}, 0x60}}, 0x0) 05:51:35 executing program 5: r0 = socket(0x10, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000008c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000300)="3ae78f45e01f72b90a35632faabeaa7a3d8fa1bf8637d7ac1ca8acb03cf10ed20c9ed79dc5e24619584b3ec4998bb5d4a3563f802c2f06823be44242904dfca82f57f280872c699fa93499f48a42a1365ff1c1ce3cf766cf1f50bc22808e5de47a2e9c6983842286910b847c5d314d38ec795cb09d5182e2", 0x78}, {&(0x7f0000000380)="b4980f64b896920fb9ea9fa1093b847d9364500ad36c6305d461ea369d8e710eb97da189ae8ee4246ef810ed50684ec54a60a924c7154cabf0cbc6492c1b4f88a02b6e12394f074080f447d68b5968732a4022123dd2a02dc081193cb828add0d4a67c5e8da1b2d992a7eb9a12417b4ab0182351d8a8dad61fd9", 0x7a}, {&(0x7f0000001400)="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", 0xdd0}], 0x3, &(0x7f0000000740)=[@rthdrdstopts={{0x30, 0x29, 0x37, {0x16, 0x2, '\x00', [@padn, @hao={0xc9, 0x10, @private2={0xfc, 0x2, '\x00', 0x1}}]}}}, @hoplimit={{0x14}}, @tclass={{0x14}}, @dstopts_2292={{0x20, 0x29, 0x4, {0x89, 0x0, '\x00', [@pad1]}}}, @pktinfo={{0x24, 0x29, 0x32, {@private1={0xfc, 0x1, '\x00', 0x1}}}}], 0xa8}}, {{&(0x7f0000000840)={0xa, 0x0, 0x0, @mcast2}, 0x1c, 0x0}}], 0x2, 0x0) 05:51:35 executing program 2: getresuid(&(0x7f0000002e40), &(0x7f0000002e80), 0x0) 05:51:36 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r0, 0x107, 0x11, 0x0, &(0x7f0000000280)) 05:51:36 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x5}]}) 05:51:36 executing program 5: r0 = socket(0xa, 0x3, 0x3) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000100)={&(0x7f0000000000)={0xa}, 0x2000000c, &(0x7f00000000c0)={0x0}}, 0xffd8) 05:51:36 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x13, &(0x7f0000000140)=@nat={'nat\x00', 0x1b, 0x5, 0x478, 0x2a8, 0x560, 0xffffffff, 0x0, 0x2a8, 0x788, 0x788, 0xffffffff, 0x788, 0x788, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv6=@remote, @gre_key}}}, {{@ipv6={@local, @private0, [], [], 'bond_slave_0\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xd8}, @common=@unspec=@CONNMARK={0x30}}, {{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@empty, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4=@loopback, @ipv4=@broadcast, @icmp_id, @icmp_id}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4d8) 05:51:36 executing program 5: r0 = socket(0x11, 0xa, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000000)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8910, &(0x7f0000000000)) [ 500.285246][ T37] audit: type=1326 audit(1627969896.234:111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=25857 comm="syz-executor.0" exe="/root/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x0 05:51:36 executing program 4: syz_open_dev$rtc(&(0x7f0000000180), 0x1, 0x105200) 05:51:36 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000180), 0x4) 05:51:36 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x0, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:36 executing program 5: r0 = socket(0x11, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x541b, &(0x7f0000000000)) 05:51:36 executing program 0: r0 = socket(0xa, 0x3, 0x3) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000100)={&(0x7f0000000000)={0xa}, 0x2000000c, &(0x7f00000000c0)={0x0}}, 0xfc00) 05:51:36 executing program 2: syz_io_uring_setup(0x6d9f, &(0x7f0000000040), &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f00000000c0)=0x0, &(0x7f0000000100)) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) syz_io_uring_submit(r0, 0x0, 0x0, 0x0) 05:51:36 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x5, &(0x7f0000000200)={0x1, &(0x7f00000001c0)=[{0x6}]}) 05:51:36 executing program 0: openat$nvram(0xffffffffffffff9c, &(0x7f0000000200), 0xc0, 0x0) 05:51:36 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x3, &(0x7f0000000180)=@framed={{}, [], {0x95, 0x0, 0x0, 0x63000000}}, &(0x7f0000000200)='GPL\x00', 0x7, 0xd8, &(0x7f0000000240)=""/216, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 500.629898][ T37] audit: type=1326 audit(1627969896.574:112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=25879 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665e9 code=0x0 05:51:36 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0xaf02, 0x0) 05:51:36 executing program 4: r0 = socket(0x10, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000008c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000300)="e3100000e01f72b90a35632faabeaa7a3d8fa1bf8637d7ac1ca8acb03cf10ed20c9ed79dc5e24619584b3ec4998bb5d4a3563f802c2f06823be44242904dfca82f57f280872c699fa93499f48a42a1365ff1c1ce3cf766cf1f50bc22808e5de47a2e9c6983842286910b847c5d314d38ec795cb09d5182e2", 0x78}, {&(0x7f0000000380)="b4980f64b896920fb9ea9fa1093b847d9364500ad36c6305d461ea369d8e710eb97da189ae8ee4246ef810ed50684ec54a60a924c7154cabf0cbc6492c1b4f88a02b6e12394f074080f447d68b5968732a4022123dd2a02dc081193cb828add0d4a67c5e8da1b2d992a7eb", 0x6b}, {&(0x7f0000001400)="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", 0x1000}], 0x3}}], 0x1, 0x0) [ 500.737891][ T37] audit: type=1326 audit(1627969896.614:113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=25879 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=3 compat=0 ip=0x4193fb code=0x0 05:51:36 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x3, &(0x7f0000000180)=@framed={{0x18, 0xf}}, &(0x7f0000000200)='GPL\x00', 0x7, 0xd8, &(0x7f0000000240)=""/216, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:51:36 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x80001, 0x0) write(r0, &(0x7f0000000040)="2fe3d528e2f9b301fe", 0x9) 05:51:37 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) sendto$packet(r0, &(0x7f0000000180)="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", 0x5dd, 0x0, &(0x7f0000000080)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) 05:51:37 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x41, &(0x7f0000000140)=@nat={'nat\x00', 0x1b, 0x5, 0x478, 0x2a8, 0x560, 0xffffffff, 0x0, 0x2a8, 0x788, 0x788, 0xffffffff, 0x788, 0x788, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv6=@remote, @gre_key}}}, {{@ipv6={@local, @private0, [], [], 'bond_slave_0\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xd8}, @common=@unspec=@CONNMARK={0x30}}, {{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@empty, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4=@loopback, @ipv4=@broadcast, @icmp_id, @icmp_id}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4d8) 05:51:37 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x15, &(0x7f0000000140)=@nat={'nat\x00', 0x1b, 0x5, 0x478, 0x2a8, 0x560, 0xffffffff, 0x0, 0x2a8, 0x788, 0x788, 0xffffffff, 0x788, 0x788, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv6=@remote, @gre_key}}}, {{@ipv6={@local, @private0, [], [], 'bond_slave_0\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xd8}, @common=@unspec=@CONNMARK={0x30}}, {{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@empty, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4=@loopback, @ipv4=@broadcast, @icmp_id, @icmp_id}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4d8) 05:51:37 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x1e, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:51:37 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x0, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:37 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x4a, &(0x7f0000000140)=@nat={'nat\x00', 0x1b, 0x5, 0x478, 0x2a8, 0x560, 0xffffffff, 0x0, 0x2a8, 0x788, 0x788, 0xffffffff, 0x788, 0x788, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv6=@remote, @gre_key}}}, {{@ipv6={@local, @private0, [], [], 'bond_slave_0\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xd8}, @common=@unspec=@CONNMARK={0x30}}, {{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@empty, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4=@loopback, @ipv4=@broadcast, @icmp_id, @icmp_id}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4d8) 05:51:37 executing program 4: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1, &(0x7f0000000080)=0x1, 0x4) [ 501.274352][ T3254] ieee802154 phy0 wpan0: encryption failed: -22 [ 501.280688][ T3254] ieee802154 phy1 wpan1: encryption failed: -22 05:51:37 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@FILEID_INO32_GEN_PARENT={0x10}, 0x0) 05:51:37 executing program 5: prctl$PR_SET_THP_DISABLE(0x29, 0x1) sched_rr_get_interval(0x0, &(0x7f0000003e40)) 05:51:37 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) recvmsg(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0) 05:51:37 executing program 2: syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x14f282) 05:51:37 executing program 4: r0 = socket(0x11, 0x3, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x1850000) 05:51:37 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x1e, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:51:37 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x3, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}}, &(0x7f0000000200)='GPL\x00', 0x7, 0xd8, &(0x7f0000000240)=""/216, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:51:37 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x0, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:37 executing program 0: openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x470100, 0x0) 05:51:37 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x19, 0x3, &(0x7f0000000180)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:51:37 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x42, &(0x7f0000000140)=@nat={'nat\x00', 0x1b, 0x5, 0x478, 0x2a8, 0x560, 0xffffffff, 0x0, 0x2a8, 0x788, 0x788, 0xffffffff, 0x788, 0x788, 0x5, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv6=@remote, @gre_key}}}, {{@ipv6={@local, @private0, [], [], 'bond_slave_0\x00', 'hsr0\x00'}, 0x0, 0xa8, 0xd8}, @common=@unspec=@CONNMARK={0x30}}, {{@uncond, 0x0, 0xa8, 0xf0}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@empty, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @port, @icmp_id}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4=@loopback, @ipv4=@broadcast, @icmp_id, @icmp_id}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4d8) 05:51:37 executing program 2: timer_create(0x2, &(0x7f0000000000)={0x0, 0x3}, &(0x7f0000000040)) 05:51:37 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@req={0x28, &(0x7f0000000000)={'veth1_macvtap\x00', @ifru_addrs=@xdp={0x2c, 0x0, 0x0}}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000080)={@private1, @mcast2, @mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1}) 05:51:37 executing program 0: openat$sysfs(0xffffffffffffff9c, &(0x7f0000002740)='/sys/block/ram1', 0x0, 0x0) 05:51:38 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r0, r1) 05:51:38 executing program 2: r0 = socket(0x11, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x89b0, &(0x7f0000000000)) 05:51:38 executing program 0: syz_io_uring_setup(0x6d9f, &(0x7f0000000040), &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) syz_io_uring_setup(0x4d3, &(0x7f0000000140)={0x0, 0xa2de, 0x10, 0x1, 0x162}, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000001c0), 0x0) 05:51:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$unix(0x1, 0x2, 0x0) dup2(r0, r1) 05:51:38 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:38 executing program 5: mprotect(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) 05:51:38 executing program 4: sigaltstack(&(0x7f0000ffd000/0x3000)=nil, 0x0) syz_io_uring_setup(0x6582, &(0x7f00000000c0), &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000080), &(0x7f0000000200)) 05:51:38 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x16, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:51:38 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000140)=@nat={'nat\x00', 0x1b, 0x5, 0x858, 0x2a8, 0x560, 0xffffffff, 0x0, 0x2a8, 0x788, 0x788, 0xffffffff, 0x788, 0x788, 0x5, 0x0, {[{{@uncond, 0x0, 0x118, 0x160, 0x0, {}, [@common=@dst={{0x48}}, @common=@eui64={{0x28}}]}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@multicast1, @ipv6=@remote, @gre_key}}}, {{@ipv6={@local, @private0, [], [], 'bond_slave_0\x00', 'hsr0\x00'}, 0x0, 0x118, 0x148, 0x0, {}, [@common=@ipv6header={{0x28}}, @common=@hbh={{0x48}}]}, @common=@unspec=@CONNMARK={0x30}}, {{@uncond, 0x0, 0x270, 0x2b8, 0x0, {}, [@common=@rt={{0x148}, {0x0, [], 0x0, 0x0, 0x0, [@private0, @private2, @private2, @private2, @ipv4={'\x00', '\xff\xff', @dev}, @private1, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, @dev, @rand_addr=' \x01\x00', @mcast2, @dev, @private2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @remote, @private1]}}, @common=@srh1={{0x90}, {0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @empty, @private1}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@empty, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @port, @icmp_id}}}, {{@uncond, 0x0, 0x1e0, 0x228, 0x0, {}, [@common=@rt={{0x138}, {0x0, [], 0x0, 0x0, 0x0, [@private2, @empty, @remote, @mcast2, @mcast2, @mcast2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @remote, @remote, @empty, @private2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, @mcast2]}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x0, @ipv4=@loopback, @ipv4=@broadcast, @icmp_id, @icmp_id}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x8b8) 05:51:38 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0x17, 0x0, 0x80, 0x2cc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x40) 05:51:38 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x3, &(0x7f0000000180)=@framed={{}, [], {0x95, 0x0, 0x0, 0x9cffffff}}, &(0x7f0000000200)='GPL\x00', 0x7, 0xd8, &(0x7f0000000240)=""/216, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:51:38 executing program 4: dup(0xffffffffffffffff) syz_io_uring_setup(0x0, &(0x7f0000000040)={0x0, 0x0, 0x2}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) syz_io_uring_setup(0x4d3, &(0x7f0000000140)={0x0, 0xa2de, 0x10, 0x1}, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000200)) 05:51:38 executing program 0: r0 = socket(0x10, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f00000008c0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000300)="3ae78f45e01f72b90a35632faabeaa7a3d8fa1bf8637d7ac1ca8acb03cf10ed20c9ed79dc5e24619584b3ec4998bb5d4a3563f802c2f06823be44242904dfca82f57f280872c699fa93499f48a42a1365ff1c1ce3cf766cf1f50bc22808e5de47a2e9c6983842286910b847c5d314d38ec795cb09d5182e2", 0x78}, {&(0x7f0000000380)="b4980f64b896920fb9ea9fa1093b847d9364500ad36c6305d461ea369d8e710eb97da189ae8ee4246ef810ed50684ec54a60a924c7154cabf0cbc6492c1b4f88a02b6e12394f074080f447d68b5968732a4022123dd2a02dc081193cb828add0d4a67c5e8da1b2d992a7eb", 0x6b}, {&(0x7f0000001400)="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", 0x1000}], 0x3, &(0x7f0000000740)=[@rthdrdstopts={{0x18}}, @tclass={{0x14}}], 0x30}}, {{&(0x7f0000000840)={0xa, 0x0, 0x0, @mcast2}, 0x1c, 0x0}}], 0x2, 0x0) 05:51:38 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000080), 0x0, 0x0) 05:51:38 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={@private0, @dev, @private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18000c}) 05:51:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000000c0)={'gre0\x00', &(0x7f0000000040)={'syztnl2\x00', 0x0, 0x1, 0x7, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14}}}}) 05:51:38 executing program 0: madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0xb) 05:51:38 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000100)="825d2e7d0d31b8524bd55ed2b5d93a57141314f4ab3dcc4ea168c97c8dd974c5953e6a9595f9d99ace233686daff7abfa6f20b87b75c2f3388f9a6d644871dc5769ffc1d775c5eb053a8a7b17fd1dba186e1fa803a5c2216da5031b20de54a68b3d02a9fb31ac35627d2d6d1a377e607e051af5b1875738db4c58d254e02e54a41dc25ce830537991b6a3149e83160a1a4f2662242d5cca70c1a7ef7c5eb84775c826b30da56fc84b0272d42f475359ba0db406cfa0688d9a16261ae086bf6da993b42e3c034f44bc120fdec4f6b1c27a24bfad2c5efa929798f0e01bbcbf7e3bf9ed6e3fd4579385707931a9ce762726c743c4fcc7475331f482ae137c389c6") 05:51:38 executing program 5: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x80001, 0x0) write(r0, 0x0, 0x0) 05:51:38 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:38 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='.\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000000000012000']) 05:51:39 executing program 5: r0 = socket(0xa, 0x3, 0x3) setsockopt$inet_tcp_int(r0, 0x6, 0x0, 0x0, 0x0) 05:51:39 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x40) 05:51:39 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f00000003c0)={0x17, 0x0, 0x80, 0x2cc}, 0x40) 05:51:39 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f0000000080)={@private1={0xfc, 0x3a}, @mcast2, @mcast2}) 05:51:39 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x40201, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) 05:51:39 executing program 2: prctl$PR_SET_IO_FLUSHER(0x39, 0x14) 05:51:39 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3={0x8000, 0x401}, 0x1c) 05:51:39 executing program 4: r0 = socket(0x10, 0x2, 0x0) connect$inet6(r0, 0x0, 0x700) 05:51:39 executing program 0: r0 = mq_open(&(0x7f0000000340)='d\x00\x90\xe0\x00\xf8\xff\xff\xff\xff\xff\xff\xd080\x1a\x9b\xf3\xad\xcb\x86\t\x97o\xbe7Q\x1f\xd3;uG/\x9e\x87VO\xa5\xfd\xf6j\xe0\x1f`C\x8c\x136\t\x01\xa6\x05\x0e<\xc53;nCz\xe1+QIy4\xdb\x95\x04\xbc}t\r=N\xd0\x04\xc6\x03\xbf\xf3\xbc0\xc4\x11\xb0\" a\x9d\xec\xb6\xb9&\xd5\x7f\x94;;D\x80\xe2\xd1\xe0\xfcM\xf0\xd93;\x00\x9b`\x90\xd2\xbcv.\xa6d\xe1,\xdc\x16\xd3\xdf7M\xa9\xda\xdb\x8c\xb2\xf1!Q%\xc9`?~\xef\'\xb9\xdeN\xfd\xb7\xe6*I\xc4\xda\x10\xdb\x8fQ\x1d;\xc4\x89\x9d\xd1\xb9\xe6W\xc7\xcc7\xf7\x0eg\xa2\xda\xc0\x02r\xcf\xc6\xd4v', 0x0, 0x0, 0x0) mq_notify(r0, 0x0) 05:51:39 executing program 2: r0 = socket(0x11, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8913, &(0x7f0000000000)) 05:51:39 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0xe, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:51:39 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:39 executing program 4: r0 = io_uring_setup(0x3bf9, &(0x7f0000000140)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/211, 0xd3}, {0x0}], 0x2) 05:51:39 executing program 0: syz_io_uring_setup(0x4d3, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x162}, &(0x7f0000ff7000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000200)) 05:51:39 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) sendto$packet(r0, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x20000154) 05:51:39 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x7fffffffffffd, 0x101002) r1 = dup(r0) write$tun(r1, 0x0, 0x0) 05:51:39 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)={[{@nr_blocks={'nr_blocks', 0x3d, [0x6d]}}]}) 05:51:40 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0xa, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:51:40 executing program 1: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0), 0x20401, 0x0) r1 = fork() write$cgroup_pid(r0, &(0x7f0000000100)=r1, 0x12) 05:51:40 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x80001, 0x0) write(r0, &(0x7f0000000040)="2fe3d528e2", 0x5) 05:51:40 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0}) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000080)={r1}, 0x0, 0x0) 05:51:40 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x4008af30, 0x0) 05:51:40 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/module/spurious', 0x0, 0x0) write$cgroup_pid(r0, 0x0, 0x0) 05:51:40 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:40 executing program 2: r0 = socket(0xa, 0x5, 0x0) sendmsg$IPSET_CMD_HEADER(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 05:51:40 executing program 4: r0 = socket(0x11, 0xa, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8953, 0x0) 05:51:40 executing program 0: syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) 05:51:40 executing program 5: getsockopt$bt_BT_DEFER_SETUP(0xffffffffffffffff, 0x112, 0x7, 0x0, 0x0) io_cancel(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hidp_HIDPGETCONNINFO(0xffffffffffffffff, 0x800448d3, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000003c0), 0xffffffffffffffff) r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r0, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000580)={0x0}}, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000780), 0xffffffffffffffff) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) 05:51:40 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f0000000980)={0x0, 0x0, &(0x7f0000000940)={0x0}}, 0x0) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000e40)={0x0, 0x0, &(0x7f0000000e00)={0x0}}, 0x0) 05:51:40 executing program 2: prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000009c0)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ff8000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ff6000/0x3000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, 0x0}, 0x68) 05:51:40 executing program 1: syz_open_dev$dri(&(0x7f0000000580), 0x6, 0x280800) socket$nl_generic(0x10, 0x3, 0x10) 05:51:40 executing program 0: syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYRESDEC]) 05:51:40 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000780), 0xffffffffffffffff) 05:51:40 executing program 4: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) 05:51:40 executing program 2: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) 05:51:40 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) [ 505.019622][T26111] fuse: Bad value for 'fd' 05:51:41 executing program 4: syz_genetlink_get_family_id$batadv(&(0x7f00000003c0), 0xffffffffffffffff) r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000540)={0x10}, 0x10}}, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000780), 0xffffffffffffffff) 05:51:41 executing program 5: io_cancel(0x0, 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(0xffffffffffffffff, 0x800448d3, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000003c0), 0xffffffffffffffff) [ 505.045838][T26111] fuse: Bad value for 'fd' 05:51:41 executing program 2: openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000002180), 0x140, 0x0) 05:51:41 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ptype\x00') ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 05:51:41 executing program 2: shmget(0x3, 0x2000, 0x20, &(0x7f0000ffe000/0x2000)=nil) 05:51:41 executing program 0: r0 = shmget(0x3, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmctl$IPC_INFO(r0, 0x3, &(0x7f0000000000)=""/47) 05:51:41 executing program 1: recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x38c54f851c94cb11, 0x0, 0x0) 05:51:41 executing program 4: r0 = getpid() syz_open_procfs$userns(r0, 0x0) 05:51:41 executing program 2: shmget(0x3, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) 05:51:41 executing program 5: get_mempolicy(0x0, &(0x7f0000000180), 0x7, &(0x7f0000ffd000/0x2000)=nil, 0x2) 05:51:41 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000008d80)) 05:51:41 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:41 executing program 2: getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) gettid() 05:51:41 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ptype\x00') setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, 0x0, 0x0) 05:51:41 executing program 4: shmget(0x1, 0x1000, 0x80, &(0x7f0000003000/0x1000)=nil) 05:51:41 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0xca, &(0x7f0000000140)='%', 0x1) 05:51:41 executing program 5: shmctl$SHM_STAT(0x0, 0xd, 0x0) r0 = shmget(0x0, 0x1000, 0x1000, &(0x7f0000fff000/0x1000)=nil) r1 = shmget(0x0, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000000300)=""/99) shmctl$SHM_STAT_ANY(r1, 0xf, &(0x7f0000000000)=""/159) shmctl$IPC_RMID(r0, 0x0) 05:51:41 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ptype\x00') sendmsg$unix(r0, 0x0, 0x0) 05:51:42 executing program 1: r0 = getpid() prlimit64(r0, 0xb, 0x0, 0x0) 05:51:42 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ptype\x00') ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, 0x0) 05:51:42 executing program 5: r0 = shmget(0x0, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_UNLOCK(r0, 0xc) 05:51:42 executing program 0: openat$fuse(0xffffffffffffff9c, &(0x7f0000004940), 0x2, 0x0) 05:51:42 executing program 2: r0 = socket$unix(0x1, 0x5, 0x0) sendmsg$unix(r0, 0x0, 0x8008000) 05:51:42 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:42 executing program 5: shmget(0x0, 0x1000, 0x200, &(0x7f0000ffd000/0x1000)=nil) 05:51:42 executing program 2: r0 = shmget(0x3, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) shmctl$IPC_SET(r0, 0x1, &(0x7f00000001c0)={{0x3, 0x0, 0x0, 0xee01, 0xffffffffffffffff}}) 05:51:42 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ptype\x00') ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, 0x0) 05:51:42 executing program 0: get_mempolicy(0x0, &(0x7f0000000180), 0x1, &(0x7f0000ffe000/0x2000)=nil, 0x4) 05:51:42 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ptype\x00') write$nbd(r0, 0x0, 0x0) 05:51:42 executing program 2: r0 = memfd_create(&(0x7f0000000000)='\x9d#\x00\xe6Z\x00\xafq%\xa5\x83\xa6#\r\x83y\xf3\xb2\xe6b\x00\x00\xee\xff\xff\xff\xff\xff\xff\xff\x00\xff\xff\x7f\x17?$^\xe1Ob\xe1Y\xd6\xeb\x91\x83;\xeb\xf1\xd0\xce\xe5\x19THP\xf4O\xe2\x9f\xd9\xae\xcf>/\x05\x00\x00\x00\x00\x00\x00\x00\xa1\xa2\xe0g\x98\xbf*\xa2c\x12.\xb7\xbe`\'\xcb\xb6\xaf\xdc\xa0\xb04\xb7T5\x957\xec\xfb\xe6|\\\xe4h\xfc\x14\x06\xb5\x03\x8a\xc40\xbe\xe3\x93A\x15\xec\xdb\xaa\t9\x11\xb4\x84$&0#\xc3\xfd\x0e\"\x10\vy(q~\x1e\x104\x1b|\xdd\x19\x86\x90\xbe\xd7\xdc\n\xcbC\x15\xfcp\x11\xdai\f{\xb5\x82q\x19\xacS\x88|\x99\xfd`\xdd/k\t\xbe\xcd\xf0%\x97!\xba\xe3J\x82t\x96\xf8\xb1\xd2\x168\xbf`$\xbf\xca\xea\xa3\x83\x8e-k\x12\xdf\xb9q\xb6^r\xd4\xb5X\\\xdbD\n\x03G\xa1\xaf\xe1\x9d\xbc\xac\x18\xb3%QF\x03\b\x9dh\xcb)\xf4f\x12[\xf9w\xd2\r\t\xef{h\xb0\xc0:\x8f|\x8f\x06\xf8T\xeb\xa4\xf2\x05\x14\xa5A81;p\x97\xb3\xb6\xef\xf2\'\xe4\x00\x06V\x1f\xf8!\x89hE\xf6\x94\xe4$\xb0\x11kM\x92\x9e\x1e\xa9\v\xf5\xbb,\x91I\xa0\xb0/\x06-u\xf03\x99\xae\xd8b3\x0e\x12\xf6\xbf\xca\xb5v\xdc\xe0\xc6\x90\x03hi\xee\x0f\x1a\xda\x06\x15\x15=\xc9\x12\'\xe8\x8cjM\xa3\x16(y\xe7\x85\xc4B-\xd0\xdd\x8ej\'u\xe6\xd2\xcb\x86#q\xb6\x9aaVd\xfe\xc0B\x0e\xde\x8am\x05Nbv\xdf\xcaeJ?.\x84\xb3\f\xc3c\xf0\xac!\x91\x8cR\xb7m\xe1\x91\xff\x95;o\xbd\b\xb87!\x82X\xa5\xcb\x84\xc4\b\x8c\a\x1b;{\x82\xd05M\x83&\xd1P\x1e\x90R\xa6\x06Y?\xfe\xde\xe6\xe5;g\x93\xabs\xdf\xc6\xb3\x97\xf5g\x1e\x1d\x852S\x8e2Z\xb8\xec\x9c\xcb`~5(\xb72\xed\a\xc1\xa2x\x01\x04\x00\x00\x00\x00\x00\x00\xbd\xfd\x03\x00\x00\x007jm\xc9\xca\x8e\xa6\x11\xe3\xd8\xd6{KU\x94R\xe5\x88\xe1%\xe3\x98v\xd2\xe5\x1e0\xb3\xfd\xf2i\x92\x1c_\xe3\xed\xb9p\x17\xb9\xe9\x81\xa7\xb7\xdb\x8e\xda\x8a\xcc\x9c\x89Il\xe4H\xff\xde\b\xf0\xcb\x1c\x9b\xfd\xe8\x8a\x13d\xd1\x86\xcd\xcb\x1e\xfd\r\x00\x00\x00\x00\x00\x000E\x85\xc9NC\xc1\xdc\x93c<\xa5\x88\xf1o7~\xe2\x18\xca\x02{(\xba\x17\xfat~\x97,[\x80\xc7\x00\x00\x00\x00', 0x0) lseek(r0, 0x0, 0x3) 05:51:42 executing program 1: r0 = shmget(0x0, 0x1000, 0x0, &(0x7f0000ffd000/0x1000)=nil) shmat(r0, &(0x7f0000ffd000/0x1000)=nil, 0x4000) 05:51:42 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/igmp6\x00') read$char_usb(r0, &(0x7f00000001c0)=""/137, 0x89) 05:51:42 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='fd/3\x00') 05:51:42 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ptype\x00') connect$inet6(r0, 0x0, 0x0) 05:51:42 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ptype\x00') read$FUSE(r0, 0x0, 0x0) 05:51:42 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:42 executing program 0: syz_mount_image$hfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f00000006c0)={[{@file_umask}]}) 05:51:42 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp6\x00') read$eventfd(r0, 0x0, 0xfebc) 05:51:42 executing program 2: r0 = syz_usbip_server_init(0x0) fsetxattr$security_capability(r0, &(0x7f0000000200), &(0x7f0000000240)=@v2, 0x14, 0x0) 05:51:42 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='ns\x00') statx(r0, &(0x7f0000004d80)='./file0\x00', 0x0, 0x0, 0x0) [ 507.064706][T26216] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN 05:51:43 executing program 4: shmat(0x0, &(0x7f0000ffd000/0x3000)=nil, 0x1000) 05:51:43 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=ANY=[@ANYBLOB="3c00000010008506000000000000ff0100000000", @ANYRES32=r2, @ANYBLOB="01000000002200001c0012000c000100626f6e64"], 0x3c}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$packet(0x11, 0x2, 0x300) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0x53, 0x0, 0x0, r5}, [@IFLA_MTU={0x8, 0x4, 0x400}]}, 0x28}}, 0x0) [ 507.312248][T26226] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 05:51:43 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) 05:51:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000011c0)={0x2, 0x0, @rand_addr=0x64010100}, 0x10) 05:51:43 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:43 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, 0x0, 0x10) 05:51:43 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) recvmmsg(r0, &(0x7f0000006700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 05:51:43 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @multicast1}}}, 0x108) [ 507.457360][T26235] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. 05:51:43 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, 0x0, 0x0) 05:51:43 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) [ 507.602498][T26216] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN 05:51:43 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000004200)=""/221, &(0x7f0000004300)=0xdd) 05:51:43 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x7, &(0x7f0000000000)={0x8, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @private}}}, 0x108) 05:51:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) 05:51:43 executing program 1: r0 = socket$inet(0x2, 0x3, 0x3a) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) 05:51:43 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CALIPSO_C_ADD(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x0, 0x1}, 0x14}}, 0x0) 05:51:43 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0xfffffffffffffebd, 0x0, 0x0, 0x0, 0x0, {}, ["", "", "", "", "", ""]}, 0x1c}}, 0x0) 05:51:43 executing program 2: socket$inet(0x2, 0x8080c, 0x0) 05:51:43 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x81) write$sndseq(r0, 0x0, 0x0) 05:51:43 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000040)="0001", 0x2) 05:51:43 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:43 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f00000005c0)={0x0, {{0x2, 0x0, @multicast2}}}, 0x90) 05:51:44 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r0, 0x0, 0x7, 0x0, &(0x7f0000000000)) 05:51:44 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$UI_DEV_CREATE(r0, 0x5501) 05:51:44 executing program 0: syz_open_dev$sg(&(0x7f0000000000), 0x0, 0xaa02) 05:51:44 executing program 1: syz_mount_image$nfs4(&(0x7f0000000080), &(0x7f00000000c0)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)) 05:51:44 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvmmsg(r0, 0x0, 0xfffffffffffffed6, 0x0, &(0x7f0000004480)={0x0, 0x989680}) 05:51:44 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_buf(r0, 0x0, 0x30, 0x0, &(0x7f0000004300)) 05:51:44 executing program 0: socketpair(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000140), r0) 05:51:44 executing program 5: add_key$user(&(0x7f0000000140), 0x0, 0x0, 0x0, 0xfffffffffffffffa) 05:51:44 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:44 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f00000000c0)={'sit0\x00', 0x0}) 05:51:44 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000001c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000000)) 05:51:44 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000000)={0x0, 0x1, 0x6, @broadcast}, 0x10) 05:51:44 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x0, 0x101001) write$FUSE_BMAP(r0, 0x0, 0x0) 05:51:44 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f00000039c0)=[{{0x0, 0x0, &(0x7f00000008c0)=[{0x0}, {0x0}], 0x2}}], 0x1, 0x10243, 0x0) 05:51:44 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x0, 0x101001) write$FUSE_BMAP(r0, &(0x7f0000000100)={0x18}, 0x18) 05:51:45 executing program 1: openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x4000) 05:51:45 executing program 4: socketpair(0xa, 0x0, 0x401, 0x0) 05:51:45 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x101001) write$FUSE_BMAP(r0, 0x0, 0x0) 05:51:45 executing program 0: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0x7, 0x0, 0x0) 05:51:45 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000000)={'security\x00', 0x4, [{}, {}, {}, {}]}, 0x68) 05:51:45 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:45 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000000200), 0x4) 05:51:45 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={0x0, @in={0x2, 0x0, @multicast1}, @hci, @isdn, 0xbd86}) 05:51:45 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_NEIGHBORS(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={0x0}}, 0x40801) 05:51:45 executing program 0: syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002140)=ANY=[]) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x610401, 0x0) 05:51:45 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000080)=@req={0x6, 0xffffffff}, 0x10) 05:51:45 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x81) write$sndseq(r0, &(0x7f0000000140)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @connect}], 0x1c) write$sndseq(r0, &(0x7f0000000240)=[{0xff, 0x0, 0x0, 0x0, @tick, {}, {}, @raw8={"4fe52a5ca89ba39bd9621b43"}}], 0x1c) 05:51:45 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast1, @dev, @multicast2}, 0xc) 05:51:45 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LISTALL(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0xf0}}, 0x0) 05:51:45 executing program 5: select(0x40, &(0x7f0000000300), 0x0, 0x0, &(0x7f00000003c0)) 05:51:45 executing program 0: socketpair(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000002f80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40010042, 0x0) 05:51:45 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000000)="b7", 0x1) 05:51:45 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:45 executing program 5: openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0xc000, 0x0) 05:51:45 executing program 4: perf_event_open(&(0x7f0000006040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:51:45 executing program 0: socketpair(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) 05:51:45 executing program 2: r0 = getpgrp(0x0) fork() waitid(0x2, r0, 0x0, 0x2, 0x0) 05:51:46 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:46 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f0000000000)={0x0, {{0x2, 0x0, @loopback}}, {{0x2, 0x0, @broadcast}}}, 0x108) 05:51:46 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4240, 0x0) 05:51:46 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x0) 05:51:46 executing program 0: syz_open_dev$vcsn(&(0x7f0000006280), 0x3, 0x3881f23a1a1c7514) 05:51:46 executing program 5: socketpair(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000007b80)=[{0x0, 0x0, &(0x7f0000000700)=[{0x0}, {&(0x7f00000038c0)=']', 0x1}], 0x2}], 0x1, 0x0) 05:51:46 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:46 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8993, &(0x7f0000000000)={'veth0_to_batadv\x00', @ifru_hwaddr=@random}) 05:51:46 executing program 5: syz_mount_image$hfsplus(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x240, 0x0) 05:51:46 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x12, &(0x7f0000000000)='m', 0x1) 05:51:46 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) [ 510.845609][ T37] audit: type=1800 audit(1627969906.794:114): pid=26446 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=14833 res=0 errno=0 [ 510.887872][ T37] audit: type=1800 audit(1627969906.824:115): pid=26446 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=14833 res=0 errno=0 05:51:46 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x1, &(0x7f0000000080)=0x5, 0x4) 05:51:46 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={0x0, 0x1, 0x6, @multicast}, 0x10) 05:51:46 executing program 0: r0 = socket$inet(0x2, 0x3, 0x3) getsockopt$inet_mreq(r0, 0x0, 0x20, 0x0, &(0x7f0000000180)) 05:51:46 executing program 5: socketpair(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x8947, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) 05:51:46 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:46 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x2203, 0x0) read$FUSE(r0, 0x0, 0x0) 05:51:47 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000080), 0x10) 05:51:47 executing program 2: add_key$user(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)="9b", 0x1, 0xfffffffffffffffd) 05:51:47 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020}, 0x2020) 05:51:47 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x31, &(0x7f0000000240), 0x4) 05:51:47 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:47 executing program 4: socket$inet(0x2, 0x5f97d6215e3979fe, 0x0) 05:51:47 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x25, &(0x7f0000000040)={@empty, @dev, @loopback}, 0xc) 05:51:47 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x240, 0x0) mount$fuseblk(&(0x7f00000002c0), &(0x7f0000000300)='./file0\x00', &(0x7f0000000340), 0x8, 0x0) 05:51:47 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r0, 0x0, 0x18, 0x0, &(0x7f0000000200)) 05:51:47 executing program 4: socketpair(0x10, 0x3, 0x100000, 0x0) 05:51:47 executing program 2: socketpair(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000040)={'batadv_slave_0\x00'}) 05:51:47 executing program 1: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={0x0, @in={0x2, 0x0, @multicast1}, @hci, @isdn, 0xbd86, 0x0, 0x0, 0x0, 0xab}) 05:51:47 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:47 executing program 0: socketpair(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f00000003c0)) 05:51:47 executing program 5: socketpair(0xa, 0x3, 0x1, 0x0) 05:51:47 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$packet_int(r0, 0x107, 0xb, &(0x7f0000000000), &(0x7f0000000180)=0x4) 05:51:47 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000280)={0x0, @isdn, @generic={0x0, "059260e3c189a7446c52e17107f6"}, @xdp}) 05:51:47 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r0, 0x0, 0x21, 0x0, &(0x7f0000000040)) 05:51:47 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000000)=ANY=[@ANYBLOB="ac1414bbe00000018a1466af0000d2"], 0x10) 05:51:47 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000080)=r0) 05:51:47 executing program 5: add_key$user(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)="fd", 0x1, 0xfffffffffffffffe) 05:51:47 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:47 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x31, &(0x7f0000000240)=0x2, 0x4) 05:51:48 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000004c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000500)={0x8000}) 05:51:48 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x28, &(0x7f0000000040)={@multicast2, @dev, @loopback}, 0xc) 05:51:48 executing program 2: setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x0, @remote, 0x0, 0x0, 'none\x00'}, 0x2c) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f00000001c0)) 05:51:48 executing program 5: socketpair(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000000700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40000001, 0x0) 05:51:48 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000000)=ANY=[], 0x290) 05:51:48 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:48 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000000)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee00}}, {{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x2, @in=@multicast1}}, 0xe8) 05:51:48 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x6, 0x0, 0x0) 05:51:48 executing program 0: socketpair(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000240)) 05:51:48 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f00000005c0)={0x0, {{0x2, 0x0, @multicast2}}, 0x2}, 0x90) 05:51:48 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LISTALL(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[], 0xf0}}, 0x0) 05:51:48 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000040)={'icmp6\x00'}, &(0x7f0000000080)=0x1e) 05:51:48 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, 0x0, &(0x7f0000000100)) 05:51:48 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x64, &(0x7f0000000040)=0x8000, 0x4) 05:51:48 executing program 2: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x240, 0x0) read$FUSE(r0, 0x0, 0x0) 05:51:48 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)={[{@part={'part', 0x3d, 0x100000001}}]}) 05:51:48 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000002c0)={@remote, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) 05:51:48 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:48 executing program 5: syz_mount_image$fuse(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={{}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@default_permissions}]}}) 05:51:48 executing program 2: syz_mount_image$nfs4(0x0, 0x0, 0x0, 0xaaaaaaaaaaaadec, &(0x7f0000000480)=[{&(0x7f00000004c0)="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", 0x5c0}], 0x0, 0x0) 05:51:48 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000ac0), 0x0, 0x0) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, 0x0) sched_rr_get_interval(0x0, &(0x7f0000000080)) 05:51:48 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x26, &(0x7f0000000280)={@empty, @local, @dev}, 0xc) [ 513.074477][T26571] fuse: Bad value for 'fd' [ 513.105333][T26571] fuse: Bad value for 'fd' 05:51:49 executing program 5: r0 = socket$inet(0x2, 0x3, 0xff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, 0x0) 05:51:49 executing program 4: getitimer(0x0, &(0x7f0000000740)) 05:51:49 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) sendto$packet(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) 05:51:49 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_LISTALL(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9500c7"], 0xf0}}, 0x0) 05:51:49 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:49 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000080)={'batadv_slave_1\x00'}) 05:51:49 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x0, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @dev}}}, 0x108) 05:51:49 executing program 0: select(0x40, &(0x7f0000000300), 0x0, &(0x7f0000000380)={0x55d7}, 0x0) 05:51:49 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={0x0, @ax25={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}, @rc={0x1f, @fixed}, @l2={0x1f, 0x0, @any, 0x0, 0x1}}) 05:51:50 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000000000)=""/229, &(0x7f0000004300)=0xe5) 05:51:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r0, 0x0, 0x17, 0x0, &(0x7f0000000040)) 05:51:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000040)={0x8, {{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x88) 05:51:50 executing program 4: socketpair(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) accept(r0, 0x0, 0x0) 05:51:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000000)=ANY=[@ANYBLOB="6d0400000000000002"], 0x290) 05:51:50 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, 0x0) 05:51:50 executing program 2: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x81) write$sndseq(r0, 0x0, 0x0) write$sndseq(r0, &(0x7f0000000140)=[{0x0, 0x6, 0x0, 0x0, @time, {}, {}, @time}], 0x1c) 05:51:50 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000240)=ANY=[@ANYBLOB="530600000000000002004e24ffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c979b00000000000000000000000000000000000000000000000000000000000000000000000000000000100000006"], 0x390) 05:51:50 executing program 0: syz_mount_image$hfsplus(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000001540), 0x1, &(0x7f0000003640)={[{@force}]}) 05:51:50 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:50 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000100)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x40}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, 0xe8) 05:51:50 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f00000000c0)={0x0, {}, 0x0, 0x1, [{{0x2, 0x0, @loopback}}]}, 0x110) 05:51:50 executing program 2: socketpair(0x1, 0x3, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) sendmmsg$alg(r0, &(0x7f0000007b80)=[{0x0, 0x0, &(0x7f0000000700)=[{0x0}, {&(0x7f00000038c0)=']', 0x1}], 0x2, &(0x7f0000003a00)=[@op={0x18}, @op={0x18}], 0x30}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc090}], 0x2, 0x0) 05:51:50 executing program 5: mount$fuse(0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0) 05:51:50 executing program 0: syz_mount_image$fuse(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x0, &(0x7f0000000700)={{}, 0x2c, {'rootmode', 0x3d, 0xd3dc7bda551bec28}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}}) 05:51:50 executing program 4: syz_mount_image$nfs4(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0xaaaaaaaaaaaa7d3, &(0x7f0000000280)=[{&(0x7f0000000480)="51e849d65ee25404d878c61d2ceebcf5a47143d9ae382eb3bf6f952bed3071f1ca584b7323ba287bcc477f50e6e6e1b2467324e88c396ad88ca0e8a42ce1f7e0763980726fb707bb77b03399683cfa3b8c05884980fc1253b66a09c2016537f3dc67759e2946161743ace05fefbe963da3044f9308d0fc3a7e80ee9caf671003bf0a36f03454b2d64b74d4099c052c1e3e9bf3da8633a9ca06a7099ffb854e9ad785e4a8782597be92f717dd28221fd438978bf0251797407c57000000b0882440a9000000000000000000000010000000000000000279a13804dc8be82a0dc5c5db7a46964e9a98aeac1c05", 0xac, 0x9}, {&(0x7f0000000340)="72ad4b76a1fcca3131cb3c0950fb29c5766e89f418905a134ade71d6e88ddf3cb7b2bda42743583db3b0822438d5c2b8b65605c6c37ecd7188361a15e335e31ac22fc1fdc03329e988de641e61ed7cb20d231561a14d9c2fb3f402a749cf61008c5c12c4aed5c5b029c654aede34d74a80068db6af912b733fccab8b469616615c71a3d7920daf00000000000000a2fd245ec7fc19f2f3e3bd78c6b9a187be2d7a6c9daff2c937c9a374fc5acbd5d0332178b8b8b24bbd4b3763a59967798654bff605000000ed8de35eff6d4b1170987dc795f6bc2a12762aa4810c342b50b822f50132d1c98f050cd4ca53835dcd34e97f01800000dc3f224f05cc38d2d6f8d11081df8ae6e900ddd574c69d63df8a", 0x110, 0xffffffffffff7fff}, {&(0x7f0000000240)="eb542aefbcb3add996fa1546d36825eab26449", 0x13, 0xff}], 0x84040c, &(0x7f0000000300)=ANY=[@ANYBLOB='(,}/\\\',:{[!,^,,euid>', @ANYRESDEC, @ANYBLOB="ffff"]) 05:51:50 executing program 2: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000001c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000000)={{0xff}}) [ 514.851935][T26641] fuse: Bad value for 'fd' 05:51:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) 05:51:51 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000001c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000000)={0x3, @time}) 05:51:51 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) 05:51:51 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:51 executing program 2: syz_mount_image$nfs4(&(0x7f0000000040), 0x0, 0x0, 0x3, &(0x7f00000004c0)=[{&(0x7f00000000c0)="a4", 0x1, 0xd6ac}, {&(0x7f0000000100)='y', 0x1}, {&(0x7f0000000280)="8e", 0x1, 0x4c4f}], 0x0, &(0x7f0000000580)) 05:51:51 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000580)={0x3ff}) 05:51:51 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000000)={{0x2, 0x0, @broadcast}, {0xe7bd3f414dd71523, @multicast}, 0x0, {0x2, 0x0, @broadcast}, 'veth1_macvtap\x00'}) 05:51:51 executing program 2: socket$inet_tcp(0x2, 0x1, 0x0) select(0x40, &(0x7f0000000000), &(0x7f0000000080)={0x8}, 0x0, 0x0) 05:51:51 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x3, 0x101001) write$FUSE_BMAP(r0, &(0x7f0000000100)={0x18}, 0x18) 05:51:51 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x0) 05:51:51 executing program 4: select(0x40, &(0x7f0000000080), &(0x7f00000000c0)={0x8001}, 0x0, &(0x7f0000000140)={0x0, 0x2710}) 05:51:51 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000040)={0x0, {{0x2, 0x0, @multicast1}}}, 0x88) 05:51:51 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x240, 0x0) read$FUSE(r0, &(0x7f0000000b00)={0x2020}, 0x2020) 05:51:51 executing program 2: openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 05:51:51 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:51 executing program 1: syz_mount_image$fuse(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540), 0x2000010, &(0x7f0000000700)={{}, 0x2c, {'rootmode', 0x3d, 0xd3dc7bda551bec28}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[{@default_permissions}, {@blksize={'blksize', 0x3d, 0x1000}}], [{@smackfsroot={'smackfsroot', 0x3d, 'smackfsroot'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@appraise}, {@appraise_type}, {@subj_role={'subj_role', 0x3d, 'user_id'}}, {@fsname={'fsname', 0x3d, 'allow_other'}}, {@pcr={'pcr', 0x3d, 0x1f}}, {@obj_type={'obj_type', 0x3d, ':,\''}}]}}) 05:51:52 executing program 0: r0 = socket$inet(0x2, 0x3, 0x4e) getsockopt$inet_buf(r0, 0x0, 0x0, 0x0, 0x0) 05:51:52 executing program 2: setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000040)={0x0, @remote, 0x0, 0x0, 'none\x00'}, 0x2c) socketpair(0x1, 0x3, 0x0, &(0x7f0000000380)) 05:51:52 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_int(r0, 0x0, 0x16, 0x0, &(0x7f0000000100)) 05:51:52 executing program 5: r0 = socket$inet6(0x18, 0x3, 0x0) setsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f0000000000)={0x43}, 0x8) 05:51:52 executing program 0: open(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) unlink(&(0x7f0000000a00)='./file0\x00') 05:51:52 executing program 2: r0 = socket$inet6(0x18, 0x3, 0x0) getsockname(r0, 0x0, &(0x7f0000000100)) 05:51:52 executing program 5: r0 = socket$inet6(0x18, 0x3, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x40d, &(0x7f00000000c0)={0x18, 0x1}, 0xc) 05:51:52 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x240, 0x0) ioctl$TIOCSBRK(r0, 0x2000747b) 05:51:52 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r0, &(0x7f0000000400)=""/250, 0xfa, 0x0, 0x0, 0x0) 05:51:52 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:52 executing program 2: r0 = socket$inet6(0x18, 0x3, 0x0) connect$inet6(r0, 0x0, 0x0) [ 516.941873][T26723] fuse: Bad value for 'fd' [ 516.959151][T26723] fuse: Bad value for 'fd' 05:51:52 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000001240)=[{0x0}], 0x1) 05:51:52 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r1, &(0x7f00000012c0)=[{&(0x7f0000000040)="87", 0x1}], 0x1) shutdown(r0, 0x0) 05:51:52 executing program 1: r0 = socket$inet6(0x18, 0x3, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0x68, &(0x7f0000000000)={{0x18, 0x2}, {0x18, 0x2}}, 0x3c) 05:51:52 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x200, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x200, 0x0) 05:51:53 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000001240)=[{&(0x7f0000000080)="9c", 0x1}], 0x1) 05:51:53 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:53 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180)="1b", 0x1}, {0x0}, {&(0x7f00000003c0)='p', 0x1}], 0x3) 05:51:53 executing program 5: openat$null(0xffffffffffffff9c, 0xfffffffffffffffe, 0x0, 0x0) 05:51:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f00000013c0)=[{&(0x7f00000003c0)="8386a46999684b432e786c6b412e56d856706bf5cd089a2a7f245130c1217fdcdfa772516dc96f7407d3f8213e06097fa42b5c685c9d2e20a7d2278d6095f051bc217f8248887b2229d2f7a72164b568cab6909a9c9bd7b2bd5344c01d6eb3c642836f640cb475dc87558f0a1b6e72b4b781930c416c0f1e203c3e571b3ca332634ec2464d39a382db413210a3c2e38add", 0x91}], 0x1) sendmsg$unix(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="87", 0x1}], 0x1}, 0x0) 05:51:53 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000180)="872cad103000d8070d43079839968596ca1ff87ec8de48366ca1fea385fc6033ef9185d018056b7681442c57886d76e1e32232c873abe1368dac7f02f00506baa65ff00298d2ddea965c990092734ecd3bf311f63de5397b108e14ad8fa3d2197fb79bcf10eca33a98d29ba0470a1ad063a84fd34c1a4dc3801418ec70157f7a5e16", 0xffffff54}, {&(0x7f0000000140)="527f991f2fee4b95be6cc4ad364b34", 0xf}], 0x2}, 0x0) 05:51:53 executing program 2: socket$inet6(0x18, 0x3, 0x0) socket$inet6(0x18, 0x3, 0x0) 05:51:53 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x200, 0x0) 05:51:53 executing program 5: r0 = socket$inet(0x2, 0x3, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x3}, 0xc) 05:51:53 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:53 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f00000013c0)=[{&(0x7f00000003c0)="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", 0x170}, {&(0x7f0000000180)="d5", 0x1}], 0x2) sendmsg$unix(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="872cad103000d8070d43079839968596ca1ff87ec8de48366ca1fea385fc6033ef9185d018056b7681442c57886d76e1e32232c873abe1368dac7f02f00506baa65ff00298d2ddea965c990092734ecd3bf311f63de5397b108e14ad8fa3d2197fb79bcf10eca33a98d29ba0470a1ad063a84fd34c1a4dc3801418ec70157f7a5e16", 0x82}, {&(0x7f0000000140)="527f991f2fee4b95be6cc4ad364b34", 0xf}], 0x2}, 0x0) 05:51:53 executing program 0: open(&(0x7f0000000040)='.\x00', 0x0, 0x0) open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) 05:51:53 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) shutdown(r0, 0x0) 05:51:53 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) shutdown(r0, 0x1) 05:51:53 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:54 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f0000000040), 0x8) 05:51:54 executing program 5: r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat(r0, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0) 05:51:54 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000180)="872cad103000d8070d43079839968596ca1ff87ec8de48366ca1fea385fc6033ef9185d018056b7681442c57886d76e1e32232c873abe1368dac7f02f00506baa65ff00298d2ddea965c990092734ecd3bf311f63de5397b108e1438fcfd71406c0af076e5ad8fa3d2197fb79bcf10eca33a98d29ba0470a1ad063a84fd34c1a4dc3801418ec70157f7a5e1680a0f9cdcd52e856660a819512deca82bfd7863a5f932ca14076ade10b7c8b20d86172d3992f1d43792ed295d92a9bb83c", 0xffffffffffffff9a}, {&(0x7f0000000000)="527f991f2fee4b95be6cc4ad364b34", 0xf}], 0x100000000000009e, 0x0, 0x0, 0x400}, 0x409) 05:51:54 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=[@rights], 0x10}, 0x0) 05:51:54 executing program 0: r0 = socket$inet6(0x18, 0x3, 0x0) sendto$inet6(r0, 0x0, 0xfffffd98, 0x0, &(0x7f0000000000)={0x18}, 0xc) 05:51:54 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000780)={&(0x7f0000000040)=@abs, 0x8, 0x0, 0x0, &(0x7f0000000740)}, 0x0) 05:51:54 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:54 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r0, 0x0, 0x0) 05:51:54 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="10", 0x1}, {&(0x7f00000004c0)="a4", 0x1}], 0x2}, 0x0) 05:51:54 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0xc0189436, 0x0) 05:51:54 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000000b40)=[{&(0x7f0000000540)="e0f788023b2e0abc8ed6294fc1791d9a730df20090a18de60cdeed2645cb4ad2aef425d4ae9280b51cf3d35821fc955319f557c1fdb0a317dce826c57b7115aea778c422781b3485819c3bcc8e060ac4aba6e925b0debd46c729f7f1f4dccb6f503d3ec8e593ca428025e8465e2c42fdee278637fb43274ab99643d367d7a15220f1f27adc57df533c2f342f985ac0fdf12f2d16dc643b153ca751841d80d087afc0057a03ea7f954566afdc0508de2582f871006e3d8d1b8b0ec2e684e2d7b5eb14110d3c0f3692c02fcc0091af888fe554f2bfc0629bf6851aed687603e7c78715e9ab", 0xe4}, {&(0x7f0000000640)="df381408aed88688b762e750962d9ce6bf56773e22a363e46b9186f04b1571a4816cdadadc8aff17a3bbc0af8afb9e8fbbef3e38ed362b24811bbdb10053e13095ac5ad14e813c2f3f112d4b79465d86233ad45d8d6962f2d31f312c1b3d6730ba70a468a652858e647e8458d7173293952d90989ea8252996227881f8cca8e9ef54a6e0bd02edc034ff9d7fda", 0x8d}], 0x2) 05:51:54 executing program 0: linkat(0xffffffffffffff9c, &(0x7f0000000100)='.\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x0) 05:51:54 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x200, 0x0) execve(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 05:51:54 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f00000013c0)=[{&(0x7f00000003c0)="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", 0x770}], 0x1) sendmsg$unix(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="872cad103000d8070d43079839968596ca1ff87ec8de48366ca1fea385fc6033ef9185d018056b7681442c57886d76e1e32232c873abe1368dac7f02f00506baa65ff00298d2ddea965c990092734ecd3bf311f63de5397b108e14ad8fa3d2197fb79bcf10eca33a98d29ba0470a1ad063a84fd34c1a4dc3801418ec70157f7a5e16", 0x82}, {&(0x7f0000000140)="527f991f2fee4b95be6cc4ad364b34", 0xf}], 0x2}, 0x0) 05:51:55 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendto$l2tp6(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x1000}, 0x20) 05:51:55 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) 05:51:55 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:55 executing program 2: r0 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000100), 0x140481, 0x0) write$fb(r0, 0x0, 0x0) 05:51:55 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, [@sadb_key={0x1, 0x9}]}, 0x18}}, 0x0) 05:51:55 executing program 1: select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x3}, 0x0, &(0x7f00000000c0)={0x77359400}) 05:51:55 executing program 4: socketpair(0x1e, 0x0, 0x10000, &(0x7f0000000000)) 05:51:55 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x89b0, &(0x7f0000000000)="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") 05:51:55 executing program 5: setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000100)="20075b55c8b11e90e859e84cddf4fe53720d1da53d7ddc44f7cb1010c0f4dd0143555795296fc8fd69f4dddccfd3939d37edd0fdae26ab600de321aac6695f0ef1dfae616d7662e73c12fe80cc7f36d71b970a323d3cf0df62bf1bd381637c016798b8ef4cec6fe2db3bba69f65ff6dc8498ed3acffbf94bdeaf2dcad16afecceac15565f07423f561d6e2cd4e459c04bcfa2520db94bb70f0b50e54", 0xfffffc8b) 05:51:55 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:55 executing program 5: add_key(&(0x7f0000000300)='ceph\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) 05:51:55 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private2, @private0}}) 05:51:55 executing program 4: socketpair(0x11, 0x0, 0x0, &(0x7f0000000280)) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000004, 0xffffffffffffffff) 05:51:55 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:55 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x2, 0x7, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty}}]}, 0x38}}, 0x0) 05:51:55 executing program 4: r0 = syz_io_uring_setup(0x5015, &(0x7f0000000040), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) syz_io_uring_setup(0x5e42, &(0x7f0000000140)={0x0, 0xa265, 0x0, 0x3, 0x0, 0x0, r0}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, 0x0, 0x0) 05:51:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x401c5820, 0x0) 05:51:56 executing program 1: socketpair(0x22, 0x0, 0x1, &(0x7f0000000180)) 05:51:56 executing program 5: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000280)) 05:51:56 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:56 executing program 0: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x42041, 0x0) 05:51:56 executing program 4: r0 = syz_open_dev$mouse(&(0x7f0000000040), 0xff, 0xc0200) read$FUSE(r0, 0x0, 0x0) 05:51:56 executing program 4: socketpair(0xa, 0x3, 0x80, &(0x7f0000000280)) 05:51:56 executing program 5: r0 = syz_open_dev$mouse(&(0x7f0000000000), 0x0, 0x200400) fcntl$setstatus(r0, 0x4, 0x0) 05:51:56 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in=@private, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @sadb_x_sec_ctx={0x1}]}, 0x40}}, 0x0) 05:51:56 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) sendmsg(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=[{0x0, 0x7da}, {&(0x7f0000000380)='#', 0x1}, {0x0}, {&(0x7f00000004c0)="a4", 0x1}], 0x4}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000300)='./cgroup.net/syz1\x00', 0x1ff) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg(r1, &(0x7f00000002c0)={&(0x7f0000000040)=@xdp={0x2c, 0x9, 0x0, 0x18}, 0x80, &(0x7f0000000140)=[{&(0x7f00000000c0)="0c376d7baf002f2628c38dfd6138e0926408bc61101a8f4f544836a3d3b73e", 0x1f}, {&(0x7f0000000100)="e81c5a001e124bd77df46393b73972a3c5a0e84867dd131b7acdb105a0d3ded5d7632bcc83306af4617dc76cc7f98009cc5d0df637ba89", 0x37}], 0x2, &(0x7f0000000180)=[{0x18, 0x104, 0xabfd, "923fc6cd6d"}, {0xf0, 0x10f, 0x2d9, "6eb2b55788c48d6264526f083c8c5251aff1396fb40b2655f1f93ba14c5cd25d57969f461e103c3f65e822f536f309c1b5e97ac1578a791f8c2f3729c1d53e9d65e158f5f91cb669b33bc6bf4bf9d71b56bcbe45a01bd2bafb90a4cbd596810c26f40dbd9c631c5b6608ad6617b505047b3ea62dc9cbd3e8dccb17cb3c17b6bef0ae6ac5e7750955348ef235e4139e9f17a278dfea133783009788f3638322794b3d856c28141dac0c76cf083599de5aa6a783bfeb35576d09f97fcbf979572346dd6c32bf50914ef4e4b602e95802c977d95149011115a3ad45511304db5810"}, {0x20, 0x108, 0x1d2, "3a218ddd1a960d5b41f047cc900714"}], 0x128}, 0x80) 05:51:56 executing program 4: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/ipc\x00') ioctl$F2FS_IOC_FLUSH_DEVICE(r0, 0x4008f50a, 0x0) 05:51:56 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)={0x2, 0xf, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 05:51:56 executing program 1: socketpair(0x0, 0x82fd2017038fb621, 0x0, 0x0) 05:51:56 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:56 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000080)={0xe, 0x18, 0xfa00, @id_tos={0x0}}, 0x20) 05:51:56 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="9d044e7580f967e0ed3f71dc984ff943b3d6f657becb49bfc313ff4a6506bf7a60896d5b8fe47987347427385d204169cee1e317d33a30b301099176a3698e8e51a48217fc2d94e3ff39d7a9125c6f278d2fc2dd49ea0071b74d0a395891dad62d12640ad19ada6b51813e6a5e37bfaf7e7cccffd5958bf77de97bb7111ee9cd510670f4b940b1e2bd9676c90c0ac574562e4f32becad1c0fb2d3d2df5622b0b1200f2ac35f58d138a679ea26a3771efaaf40cf0e4d905abccf558e39903efac34e2217ad224c667bbc55ea8a98d8889b4c28f43e090b95b7ce4a6cfe518a3be345bddc3c7c9975592"}, {&(0x7f0000000140)="a57ba46229d8dea3244fb3aebed144d9c2b72128f940cac777f2b4ddc85584ffb9b5e617f55cfe43b9bd1824097fc03af9112fca8d9c127b9d4b09e0580ec2e9a15d89b171b5dbce6ccf6c209d37c382a52857eb3c7975006edbd8b5f69f970c774b5ae431a72b6a8a57a65bfd23923472fb818f74b717c1ec7aff92d992ec4439648864f9b50d48f75108e42825ed22b8864be41cac325688238defd70469550fc2d9102a00376339f2ca58061f77cd7b5e41ff7d1d61869e632026fa5e58af9d40e6fba1ff40e58dd015def32aaef382df6c40e0add7a987359f75d508208c595fb680d789"}], 0x290}, 0x40000) 05:51:56 executing program 4: syz_usb_connect$cdc_ecm(0x0, 0x52, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x20, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x40, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, [@obex={0x5}]}, {[], {}, {{0x9, 0x5, 0x3, 0x2, 0x10}}}}}]}}]}}, 0x0) 05:51:56 executing program 2: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, &(0x7f00000000c0)) 05:51:57 executing program 0: r0 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FBIOPUT_VSCREENINFO(r0, 0x4601, &(0x7f0000000080)={0x556, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {}, {}, {}, {}, 0x0, 0x80, 0x0, 0x0, 0x0, 0x7}) 05:51:57 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_USER_AVC(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x10}, 0x10}}, 0x0) 05:51:57 executing program 2: socket$inet(0x2, 0x8000e, 0x0) 05:51:57 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:51:57 executing program 2: r0 = openat$fb1(0xffffffffffffff9c, &(0x7f0000000100), 0x140481, 0x0) write$fb(r0, &(0x7f0000000000)="ab", 0x1) 05:51:57 executing program 0: r0 = openat$drirender128(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$DRM_IOCTL_DMA(r0, 0xc0406429, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 521.392652][ T9693] usb 5-1: new high-speed USB device number 2 using dummy_hcd 05:51:57 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=[{0x0, 0x9effffff}, {&(0x7f0000000380)='#', 0x1}, {0x0}, {&(0x7f00000004c0)="a4", 0x1}], 0x4}, 0x0) 05:51:57 executing program 0: syz_usb_connect$cdc_ecm(0x4, 0x4d, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3b, 0x1, 0x1, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6, 0x0, 0x0, {{0x5}, {0x5}, {0xd}}}}]}}]}}, 0x0) 05:51:57 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:51:57 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x13, 0x0, &(0x7f0000000080)) [ 521.707146][ T9693] usb 5-1: Using ep0 maxpacket: 32 [ 521.863669][ T9693] usb 5-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 522.070059][ T9693] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 522.086530][ T9693] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 522.132799][ T9693] usb 5-1: Product: syz [ 522.137070][ T9693] usb 5-1: Manufacturer: syz [ 522.141753][ T9693] usb 5-1: SerialNumber: syz [ 522.183336][T26959] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 522.205914][ T9693] cdc_ether: probe of 5-1:1.0 failed with error -22 05:51:58 executing program 4: openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x109240}, 0x18) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)) 05:51:58 executing program 5: socketpair(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x10}, 0x10}}, 0x0) 05:51:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x80108907, 0x0) 05:51:58 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:51:58 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x4}, 0x0) 05:51:58 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="02020000190000000000000000000000020010"], 0xc8}}, 0x0) [ 522.452720][ T4111] usb 5-1: USB disconnect, device number 2 05:51:58 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="0206000702"], 0x10}}, 0x0) 05:51:58 executing program 0: r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$FUSE_OPEN(r0, &(0x7f0000000140)={0x20}, 0x20) 05:51:58 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, 0x0) 05:51:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x80086601, 0x0) 05:51:58 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) recvmsg$can_j1939(r0, &(0x7f0000001e80)={0x0, 0x0, 0x0}, 0x0) 05:51:59 executing program 4: r0 = openat$ttynull(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, 0x0) 05:51:59 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x2, 0x1, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 05:51:59 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000280)="f4566282bfa9eda1b9713580949d61", 0xf}, {0x0}, {&(0x7f00000004c0)="a4", 0x1}], 0x3, 0x0, 0x4}, 0x0) 05:51:59 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:51:59 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x2, 0x9, 0x0, 0x6, 0x5, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @private}}]}, 0x28}}, 0x0) 05:51:59 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)={0x2, 0xb, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 05:51:59 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x18, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}]}, 0x18}}, 0x0) 05:51:59 executing program 4: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, 0x0) 05:51:59 executing program 0: socketpair(0x1a, 0x0, 0x0, &(0x7f0000000880)) 05:51:59 executing program 3: socketpair(0x22, 0x0, 0xbf, &(0x7f0000000040)) 05:51:59 executing program 2: socketpair(0xb, 0x0, 0x0, &(0x7f0000000100)) 05:51:59 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)={0x2, 0x0, 0x0, 0x0, 0x2}, 0x7ffffffff000}, 0x300}, 0x0) 05:51:59 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)={0x14, r1, 0xcd22d1c01e48506b}, 0x14}}, 0x0) 05:51:59 executing program 5: socketpair(0x1e, 0x0, 0x6, &(0x7f0000000000)) 05:51:59 executing program 2: select(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x7}, 0x0) 05:51:59 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_GET(r0, &(0x7f0000000040)={0x0, 0x0, 0xfffffffffffffffc}, 0x0) 05:51:59 executing program 4: openat$ttynull(0xffffffffffffff9c, &(0x7f0000000080), 0x800, 0x0) 05:52:00 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)={0x2, 0x2, 0x0, 0x0, 0x2}, 0x10}, 0x8}, 0x0) 05:52:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x401c5820, &(0x7f0000000000)="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") 05:52:00 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) recvmsg$can_j1939(r0, &(0x7f0000001e80)={0x0, 0x0, 0x0}, 0x40000120) 05:52:00 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)={0x2, 0x2, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 05:52:00 executing program 4: socketpair(0x11, 0x0, 0x0, &(0x7f0000000280)) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) 05:52:00 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x34) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) tkill(r0, 0x16) ptrace(0x9, r0) 05:52:00 executing program 3: r0 = syz_io_uring_setup(0x2ba7, &(0x7f0000000200), &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000280)) syz_io_uring_setup(0x6ed6, &(0x7f0000000340)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, r0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000fef000/0x1000)=nil, &(0x7f00000002c0), &(0x7f00000003c0)) 05:52:00 executing program 4: mmap$fb(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x30, 0xffffffffffffffff, 0x0) 05:52:00 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x8990, &(0x7f0000000000)="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") 05:52:00 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x801c581f, 0x0) 05:52:00 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x8993, &(0x7f0000000000)="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") 05:52:00 executing program 4: syz_io_uring_setup(0x65b1, &(0x7f0000000080)={0x0, 0x3720, 0x8}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f00000001c0)) 05:52:00 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x2, 0x9, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty}}, @sadb_key={0x1, 0x8}]}, 0x48}}, 0x0) 05:52:00 executing program 5: r0 = syz_io_uring_setup(0x5c62, &(0x7f0000000040)={0x0, 0x65cc}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0x13, r0, 0x8000000) syz_io_uring_setup(0x78db, &(0x7f0000000200), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000000280), &(0x7f00000002c0)) 05:52:00 executing program 1: openat$fb1(0xffffffffffffff9c, &(0x7f00000001c0), 0x4c000, 0x0) 05:52:00 executing program 3: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) mmap$fb(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, r0, 0x0) 05:52:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x89a0, 0x0) 05:52:03 executing program 0: r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000100)) 05:52:03 executing program 2: socketpair(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$AUDIT_LIST_RULES(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={0x0}}, 0x0) 05:52:03 executing program 5: syz_io_uring_setup(0x2ba7, &(0x7f0000000200)={0x0, 0x0, 0x2}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000100), &(0x7f0000000280)) 05:52:03 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) bind$bt_rfcomm(r0, &(0x7f00000000c0)={0x1f, @fixed}, 0xa) 05:52:03 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000fee000/0x11000)=nil, 0x11000, 0x5, 0x2010, r0, 0x8000000) 05:52:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x89a0, &(0x7f0000000000)="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") 05:52:03 executing program 2: openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x2001) 05:52:03 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x34000}, 0x0) 05:52:03 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0xffffff7f}, 0x0) 05:52:03 executing program 3: syz_io_uring_setup(0x5015, &(0x7f0000000040), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) syz_io_uring_setup(0x5e42, &(0x7f0000000140), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000200)) 05:52:03 executing program 0: semctl$SETALL(0xffffffffffffffff, 0x0, 0x9, 0x0) 05:52:03 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) read(r0, 0x0, 0x0) 05:52:03 executing program 4: socket(0x20, 0x0, 0x22) 05:52:03 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002340)) 05:52:03 executing program 0: symlinkat(&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0) 05:52:03 executing program 3: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000140), 0x900, 0x0) 05:52:03 executing program 2: semctl$SETALL(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000000)=[0x0]) 05:52:04 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) sendmsg(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000002c0)=[{0x0}], 0x1}, 0x0) 05:52:04 executing program 5: openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x10, 0x0) 05:52:04 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$KDENABIO(r0, 0x20004b3c) 05:52:04 executing program 0: dup2(0xffffffffffffffff, 0xffffffffffffff9c) 05:52:04 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 05:52:04 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) fcntl$getflags(r0, 0x3) 05:52:04 executing program 0: shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000080)={{0x0, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff}}) 05:52:04 executing program 4: clock_gettime(0x0, 0x0) clock_gettime(0x0, &(0x7f0000000040)) 05:52:04 executing program 5: r0 = socket$unix(0x1, 0x2, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x0, './file0\x00'}, 0xa) 05:52:04 executing program 3: open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) chown(&(0x7f0000001180)='./file0\x00', 0x0, 0x0) 05:52:04 executing program 2: socketpair(0x1, 0x3, 0x32, 0x0) 05:52:04 executing program 5: sendmsg(0xffffffffffffff9c, 0x0, 0x0) 05:52:04 executing program 1: socket(0x6, 0x0, 0xe) 05:52:04 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r0, 0x0, 0x0) 05:52:04 executing program 4: mkdirat(0xffffffffffffff9c, 0x0, 0x0) 05:52:04 executing program 3: pipe2(&(0x7f0000000340)={0xffffffffffffffff}, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 05:52:04 executing program 2: mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x13, 0xffffffffffffffff, 0x0) 05:52:04 executing program 5: chdir(&(0x7f0000001740)='./file0/../file0\x00') open$dir(&(0x7f0000001780)='./file0/../file0\x00', 0x0, 0x0) 05:52:04 executing program 0: pipe2(0x0, 0x8004) 05:52:04 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) connect$unix(r0, 0x0, 0x0) 05:52:04 executing program 3: recvfrom$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x18, 0x3}, 0xc) 05:52:04 executing program 5: preadv(0xffffffffffffffff, &(0x7f00000021c0)=[{0x0}, {0x0}], 0x2, 0x0, 0x0) 05:52:04 executing program 4: chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 05:52:04 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000002100)='./file0\x00', 0x0) 05:52:05 executing program 1: socket$inet(0x2, 0x0, 0x6) 05:52:05 executing program 4: sendmsg(0xffffffffffffff9c, &(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x228}, 0x0) 05:52:05 executing program 0: preadv(0xffffffffffffffff, &(0x7f0000000180)=[{0x0}], 0x1, 0x0, 0x0) 05:52:05 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) fcntl$getown(r0, 0x5) 05:52:05 executing program 2: pwritev(0xffffffffffffffff, &(0x7f0000000240)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0) 05:52:05 executing program 5: open$dir(&(0x7f0000000100)='./file0\x00', 0x200, 0x0) 05:52:05 executing program 3: mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 05:52:05 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff}) getsockopt$sock_int(r0, 0xffff, 0x0, 0x0, 0x0) 05:52:05 executing program 5: socket$inet(0x2, 0x0, 0x8) 05:52:05 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) read(r0, &(0x7f00000000c0)=""/87, 0x57) 05:52:05 executing program 4: pipe2(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt(r0, 0x0, 0x0, 0x0, 0x0) 05:52:05 executing program 0: syz_usb_connect$uac1(0x3, 0xca, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0xb8, 0x3, 0x1, 0x0, 0x10, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{0xa, 0x24, 0x1, 0x7e01, 0x6}, [@processing_unit={0xc, 0x24, 0x7, 0x3, 0x3, 0x5, "8e109d9065"}, @selector_unit={0x6, 0x24, 0x5, 0x3, 0x1, "f9"}, @selector_unit={0xa, 0x24, 0x5, 0x5, 0x1, "ceefdb4933"}, @mixer_unit={0x5, 0x24, 0x4, 0x4, 0x6}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_ii_discrete={0x10, 0x24, 0x2, 0x2, 0x8000, 0x6, 0x30, "4dcb2e53f3c3a1"}, @as_header={0x7, 0x24, 0x1, 0x79, 0x5, 0x3}, @format_type_ii_discrete={0xf, 0x24, 0x2, 0x2, 0x401, 0x7fff, 0x0, "1afda4256ea6"}]}, {{0x9, 0x5, 0x1, 0x9, 0x10, 0x5, 0x5, 0x81, {0x7, 0x25, 0x1, 0x2, 0x4, 0x1}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {[@format_type_i_discrete={0xb, 0x24, 0x2, 0x1, 0x7, 0x3, 0xe9, 0x3, "4e8885"}, @as_header={0x7, 0x24, 0x1, 0x9, 0x1}]}, {{0x9, 0x5, 0x82, 0x9, 0x400, 0x8, 0x81, 0x8, {0x7, 0x25, 0x1, 0x0, 0x5, 0x79}}}}}}}]}}, &(0x7f0000000280)={0xa, &(0x7f0000000100)={0xa, 0x6, 0x300, 0x8, 0x1, 0x0, 0x20}, 0xde, &(0x7f0000000140)={0x5, 0xf, 0xde, 0x3, [@generic={0xcc, 0x10, 0x2, "77bc5b6454b33c2d62216cce303136b9cf1711de76bd4921a1d8cc7fd30f51093ec8719b891e9f51a49ceaa4d71220410941ed4371c39d0d8b3bccacdfe568d7e111b8e242cfb2a2007f40c559a155b48cf8ac27f39872efc49887be507c407a3a91851d9630beeb08e80ca857395bf8282475090a34c313a8f37f824fbcfafd426110318aef0d9c79e39ab91efcb6cd32a1f659881772e72cbfa1fe5e8415c4d41422c42046cb20ee3624cff05b3904d86edd7b1ffe2111144a4f68419482118084a426d066f6f29b"}, @ptm_cap={0x3}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0xc, 0x4, 0x81, 0x5f}]}, 0x1, [{0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x40d}}]}) syz_usb_connect$cdc_ecm(0x6, 0x7f, &(0x7f0000000640)={{0x12, 0x1, 0x200, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x6d, 0x1, 0x1, 0x80, 0x30, 0x4, [{{0x9, 0x4, 0x0, 0xec, 0x3, 0x2, 0x6, 0x0, 0x1f, {{0x8, 0x24, 0x6, 0x0, 0x0, "41afaa"}, {0x5, 0x24, 0x0, 0xffff}, {0xd, 0x24, 0xf, 0x1, 0x7ff, 0x24, 0x2, 0x6}, [@acm={0x4, 0x24, 0x2, 0x2}, @call_mgmt={0x5, 0x24, 0x1, 0x0, 0x81}, @call_mgmt={0x5, 0x24, 0x1, 0x1, 0x6e}, @mdlm={0x15, 0x24, 0x12, 0x307}, @obex={0x5, 0x24, 0x15, 0x81}, @dmm={0x7, 0x24, 0x14, 0xffff, 0x4}]}, {[], {{0x9, 0x5, 0x82, 0x2, 0x200, 0x9, 0x3, 0xe1}}, {{0x9, 0x5, 0x3, 0x2, 0x40, 0x7f, 0x1}}}}}]}}]}}, &(0x7f0000000880)={0xa, &(0x7f00000006c0)={0xa, 0x6, 0x300, 0x30, 0x4, 0x3, 0x20, 0x98}, 0x23, &(0x7f0000000700)={0x5, 0xf, 0x23, 0x2, [@ss_cap={0xa, 0x10, 0x3, 0x0, 0x9, 0x81, 0x3, 0x100}, @ssp_cap={0x14, 0x10, 0xa, 0xff, 0x2, 0x4, 0xf000, 0xffc1, [0x1feff18, 0xc000]}]}, 0x2, [{0xea, &(0x7f0000000740)=@string={0xea, 0x3, "97f5d77ebc2392bb32117d4ed3ef48f6595738ae4d959b022ec8b2cd41aadfaeba7118eb938faec89297bc07e42fc19d53126291f86dba6afd2295d6a682cb9554a7eff0e15bc8ae62d6779c1f72cc681375b3bd25502f5fb808a4e30201438f1740f2a0e8951b700d5710cb8d55519adbda2560597b411c3933fe5951ecc5a142a4beb6a4ca17eb89e7120271c4bc6c2062cdbc0b8bd4b21a028343efd117543a044f313646911c2e784d2dfd02f4ec43ea823f38f9b16a607672ad5098028a155e5353cfa1d51ab15713e0074b78390bbd0bcc60c9bcbb8c3c071d751aa9a18233e2086fc4aa2a"}}, {0x4, &(0x7f0000000840)=@lang_id={0x4, 0x3, 0x3409}}]}) syz_usb_connect$cdc_ecm(0x6, 0x81, &(0x7f00000008c0)={{0x12, 0x1, 0x201, 0x2, 0x0, 0x0, 0x10, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x6f, 0x1, 0x1, 0xb7, 0xa0, 0x40, [{{0x9, 0x4, 0x0, 0x2, 0x2, 0x2, 0x6, 0x0, 0x9, {{0x5}, {0x5, 0x24, 0x0, 0x8000}, {0xd, 0x24, 0xf, 0x1, 0x5, 0x5dd, 0x7}, [@obex={0x5, 0x24, 0x15, 0x7}, @mbim={0xc, 0x24, 0x1b, 0x3ff, 0x1000, 0x4, 0x7b, 0x7}, @mdlm_detail={0xd, 0x24, 0x13, 0x4, "162d088a2222b7ee38"}, @mbim_extended={0x8, 0x24, 0x1c, 0xffff, 0xc2, 0x6cd}, @obex={0x5, 0x24, 0x15, 0x8}]}, {[{{0x9, 0x5, 0x81, 0x3, 0x200, 0x0, 0x4, 0x1}}], {{0x9, 0x5, 0x82, 0x2, 0x10, 0x9, 0x2, 0x4}}, {{0x9, 0x5, 0x3, 0x2, 0x400, 0x8, 0x5}}}}}]}}]}}, &(0x7f0000000bc0)={0xa, &(0x7f0000000980)={0xa, 0x6, 0x201, 0xff, 0x4, 0xc, 0x20, 0x5}, 0x10e, &(0x7f00000009c0)={0x5, 0xf, 0x10e, 0x4, [@ext_cap={0x7, 0x10, 0x2, 0xe, 0xc, 0x8, 0x1}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x4, 0x9, 0x4c, 0x401}, @ptm_cap={0x3}, @generic={0xf5, 0x10, 0xa, "5d0c7bf5655648b709ab966d0162dcb989151735752a58682335cd2016fea20cb850bc5c50bb89efc5639cc5ee9ccf67f257a5c22c50beb2f78c8d426222c59d45e0d4b91aac0695333aedc27c45d98845f31db1d08080d0ae2d6b656ec414b21ba775b0155a53bfd68aa14884341db27b1a8e5880c2ed2e79a33a1f4aba05133787f47e53b93b4010fd39e1d066dd35b9eca9f44c7ab2d9be6b6e5743faf5864ae6979d098ed83fe800732a17a487e4a6450ad18fb9e47ece26652819ca166aaff2f1d49a81c678d6b89aacee005d42419ed90965e63007dde1b11059fc1146334e76ed403790efc3c0737e18a53e9a5376"}]}, 0x3, [{0x4, &(0x7f0000000b00)=@lang_id={0x4, 0x3, 0x411}}, {0x4, &(0x7f0000000b40)=@lang_id={0x4, 0x3, 0x41f}}, {0x2, &(0x7f0000000b80)=@string={0x2}}]}) syz_usb_connect$cdc_ncm(0x5, 0x83, &(0x7f0000002fc0)={{0x12, 0x1, 0x300, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x71, 0x2, 0x1, 0x6, 0x80, 0x3, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5, 0x24, 0x0, 0x9}, {0xd, 0x24, 0xf, 0x1, 0x80000000, 0x3ff, 0xc7b1, 0x1}, {0x6, 0x24, 0x1a, 0x6, 0x1}, [@country_functional={0xe, 0x24, 0x7, 0x9, 0x6, [0x0, 0x0, 0x0, 0xd826]}, @dmm={0x7, 0x24, 0x14, 0x72, 0x41f5}]}, {{0x9, 0x5, 0x81, 0x3, 0x400, 0x8, 0x7, 0x48}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x8, 0x5, 0x7, 0xce}}, {{0x9, 0x5, 0x3, 0x2, 0x3ff, 0xff, 0x9, 0x5}}}}}}}]}}, &(0x7f0000003100)={0xa, &(0x7f0000003080)={0xa, 0x6, 0x310, 0x8, 0x1, 0x9e, 0xff, 0x80}, 0x5, &(0x7f00000030c0)={0x5, 0xf, 0x5}}) syz_usb_connect$printer(0x0, 0x36, &(0x7f0000003480)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x8, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x2, 0xb0, 0x0, [{{0x9, 0x4, 0x0, 0x7, 0x2, 0x7, 0x1, 0x1, 0x4, "", {{{0x9, 0x5, 0x1, 0x2, 0x10, 0x80, 0x20, 0x20}}, [{{0x9, 0x5, 0x82, 0x2, 0x20, 0xb, 0x8, 0x5}}]}}}]}}]}}, &(0x7f0000003780)={0xa, &(0x7f00000034c0)={0xa, 0x6, 0x201, 0x48, 0x6, 0x9, 0x40, 0x4}, 0xac, &(0x7f0000003500)={0x5, 0xf, 0xac, 0x5, [@ss_container_id={0x14, 0x10, 0x4, 0x40, "3e861e24038ec4d255b9449c41c9f549"}, @ssp_cap={0xc, 0x10, 0xa, 0xf7, 0x0, 0x338, 0xf000, 0x40}, @ssp_cap={0x14, 0x10, 0xa, 0xdb, 0x2, 0x81, 0x1ef00, 0x7fff, [0xc03f, 0xff3f]}, @generic={0x53, 0x10, 0x3, "f249646fbe0567b7c4eda89e4814db22cb1a4aece096d8697c551ef08e3235ba62b01e5f48cceb067db1b75f0b362d5cfa4fb9d07529e94b8b6d59a4b1a028882ad4fc23e6f6547b988f27b1b86c7636"}, @ssp_cap={0x20, 0x10, 0xa, 0xb8, 0x5, 0x1, 0xff00, 0x1, [0x0, 0xff00c0, 0xffff0f, 0x30, 0x6030]}]}, 0x5, [{0x4, &(0x7f00000035c0)=@lang_id={0x4, 0x3, 0xc0c}}, {0x4, &(0x7f0000003600)=@lang_id={0x4, 0x3, 0x807}}, {0xa6, &(0x7f0000003640)=@string={0xa6, 0x3, "0d09e86314dabb539c773cc8a2eac251bcee24d9230946dae5fa29bfd4fc7cb378562112c87bc4208079cba52b8cf9cc60f7a332d6fd30b803424d470ae2befe4bd23fc319488cdbd07c053c7311c4e5491fe9ea38ba1a26551614c2625824548708fa0cb707376ffb6167da619725a2aa184680280c73a2061d9e25c2b3e3fa07d94dcb8e8bebc3610f7f0d25b7fd743f107413292dbe78a1a9c118c80a9abe3e4eecaf"}}, {0x4, &(0x7f0000003700)=@lang_id={0x4, 0x3, 0xc08}}, {0x4, &(0x7f0000003740)=@lang_id={0x4, 0x3, 0x1801}}]}) 05:52:05 executing program 4: r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0x0, 0x0) read$hidraw(r0, 0x0, 0x0) 05:52:05 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000140), 0x0, 0x0) ioctl$EVIOCGPHYS(r0, 0xc0189436, 0xfffffffffffffffc) 05:52:05 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x101) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000040)={@private2, @ipv4={'\x00', '\xff\xff', @loopback}, @loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2008a}) 05:52:05 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000040)={0xb9db84e2598cae1c, 0x0, 0x0}) 05:52:05 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) recvmmsg$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000003c40)) [ 529.682560][ T9810] usb 1-1: new high-speed USB device number 3 using dummy_hcd 05:52:05 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x4141, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) read$FUSE(r0, &(0x7f0000000400)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) fchownat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, r1, 0x1000) 05:52:05 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x2000, 0x1) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 05:52:05 executing program 3: unshare(0x8000080) 05:52:05 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmmsg$sock(r0, &(0x7f0000000400), 0x0, 0x0) 05:52:05 executing program 5: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) setxattr$incfs_id(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080), 0x0, 0x0, 0x0) 05:52:05 executing program 3: clock_gettime(0x2ab489d5a82bbead, 0x0) [ 529.942497][ T9810] usb 1-1: Using ep0 maxpacket: 16 [ 530.072893][ T9810] usb 1-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 530.090190][ T9810] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 530.263116][ T9810] usb 1-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 530.272693][ T9810] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 530.280685][ T9810] usb 1-1: Product: syz [ 530.285346][ T9810] usb 1-1: Manufacturer: syz [ 530.289962][ T9810] usb 1-1: SerialNumber: syz 05:52:06 executing program 0: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/power_supply', 0x208280, 0x94) 05:52:06 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) accept4(r0, 0x0, 0x0, 0x0) 05:52:06 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) fstat(r0, &(0x7f0000000240)) 05:52:06 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x540, 0x0) open(&(0x7f00000004c0)='./file0\x00', 0x4300, 0x4) 05:52:06 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$tcp_congestion(r0, 0x0, 0x0) 05:52:06 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000005440)='./file0\x00', 0x80100, 0x7) [ 530.612610][ T9810] usb 1-1: 0:2 : does not exist 05:52:06 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x410482, 0x0) 05:52:06 executing program 5: socketpair(0x1, 0x0, 0xfb, 0x0) 05:52:06 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) timerfd_gettime(r0, 0x0) [ 530.688351][ T9810] usb 1-1: USB disconnect, device number 3 05:52:06 executing program 0: r0 = socket$inet(0x2, 0x3, 0xff) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, 0x0, 0x0) 05:52:06 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) recvmmsg(r0, 0x0, 0x0, 0x125, &(0x7f0000001000)={0x0, 0x989680}) 05:52:06 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r0, 0x0, &(0x7f0000000140)) 05:52:06 executing program 0: r0 = socket$inet(0x2, 0x3, 0xff) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, 0x0, 0x0) 05:52:06 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f00000002c0)={@remote}, 0x14) 05:52:06 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, &(0x7f0000000040)) 05:52:06 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x740, 0x0) 05:52:07 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file0\x00') openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 05:52:07 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) write$binfmt_elf64(r0, 0x0, 0x283) 05:52:07 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x288080, 0x26) 05:52:07 executing program 5: syz_mount_image$fuse(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000500)='./file0\x00', 0x0, 0x0, 0x0) 05:52:07 executing program 0: open(&(0x7f0000000040)='.\x00', 0x200000, 0x141) 05:52:07 executing program 4: openat$incfs(0xffffffffffffff9c, &(0x7f0000000140)='.pending_reads\x00', 0x40, 0x0) 05:52:07 executing program 4: r0 = socket$inet(0x2, 0x3, 0xff) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f00000000c0)) 05:52:07 executing program 0: clock_gettime(0x3, &(0x7f0000002300)) 05:52:07 executing program 3: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000005440)='./file0\x00', 0x80100, 0x8) 05:52:07 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x540, 0x0) 05:52:07 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) fstat(r0, &(0x7f0000000180)) 05:52:07 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000005440)='./file0\x00', 0x80100, 0x0) 05:52:07 executing program 1: clock_nanosleep(0x1, 0x1, &(0x7f0000000040)={0x0, 0x989680}, &(0x7f0000000140)) 05:52:07 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x6, &(0x7f0000000540), &(0x7f0000000580)=0x4) 05:52:07 executing program 4: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) setxattr$security_ima(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000080), 0x0, 0x0, 0x0) 05:52:07 executing program 3: openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x2c041, 0xa) 05:52:07 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, 0x0, 0x0, 0x4000084, &(0x7f00000001c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x80) 05:52:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r0, 0x0, 0x0, 0x0) 05:52:07 executing program 2: openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x840, 0x0) 05:52:07 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x21, &(0x7f00000000c0)='>', 0x1) 05:52:07 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) lremovexattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000100)=@random={'trusted.', '^#\x00'}) 05:52:07 executing program 0: r0 = socket$inet(0x2, 0x3, 0xff) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, 0x0, 0x0) 05:52:07 executing program 3: openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.pending_reads\x00', 0xc0, 0x107) 05:52:07 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x240, 0xd0) 05:52:08 executing program 1: r0 = socket$inet(0x2, 0x3, 0xff) getsockname(r0, 0x0, &(0x7f0000000080)) 05:52:08 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) getsockname(r0, 0x0, &(0x7f0000000080)=0xfffffffffffffe6b) 05:52:08 executing program 2: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x680, 0x0) 05:52:08 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) setxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200), 0x0, 0x0, 0x0) 05:52:08 executing program 5: syz_mount_image$fuse(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) rmdir(&(0x7f00000000c0)='./file0\x00') 05:52:08 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000005440)='./file0\x00', 0x0, 0x0) openat$cgroup_freezer_state(r0, &(0x7f0000000040), 0x2, 0x0) 05:52:08 executing program 4: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) getxattr(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000080)=@known='user.incfs.metadata\x00', 0x0, 0x0) 05:52:08 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fstat(r0, &(0x7f0000000140)) 05:52:08 executing program 5: add_key(&(0x7f0000000300)='ceph\x00', 0x0, &(0x7f00000003c0)="55f4b94342b659eb137d4deb", 0xc, 0xffffffffffffffff) 05:52:08 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, 0x0, 0x55) 05:52:08 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0xe, &(0x7f0000000000)='0', 0x1) 05:52:08 executing program 5: openat$urandom(0xffffffffffffff9c, &(0x7f0000000200), 0x180, 0x0) 05:52:08 executing program 1: openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x823c0, 0x0) 05:52:08 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x5, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 05:52:08 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x24800, 0x54) 05:52:08 executing program 3: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00') 05:52:08 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x54) 05:52:08 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x240, 0x0) read$FUSE(r0, 0x0, 0x0) 05:52:08 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000180), &(0x7f00000000c0)=0x4) 05:52:08 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0x1) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) 05:52:08 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000040)=@deltfilter={0x24, 0x2d, 0x1}, 0x24}}, 0x0) 05:52:08 executing program 5: r0 = socket$inet6(0xa, 0x803, 0x6) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000008440)=[{{0x0, 0x536, 0x0}}], 0x400000000000107, 0x0) 05:52:08 executing program 3: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$FICLONE(r0, 0x40049409, r1) 05:52:08 executing program 4: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, 0x0, 0x0) 05:52:09 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000008c0)=0x2, 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x57) sendto$inet(r0, &(0x7f0000000d80)="ba671368d1010000004900000001000000018be49e9301442865319997d0efdb2f54b6a10c7327757482bfce945c2a91fb8dfafc1d3f56bc543ab87321e12cca08a744a2d128b00634bc882151d36809229a96bc3437ef159489384ade077ba295eac2882dbfd3781dd4d4e609c42628dbb709b3eb1fa030009045dd98b9e6d77b6cec9ceb685595d43995e0f04c32260943add79831e661c6a351dedc8b9d220fbf9fb6e44fb6a629ce9a82025124fec9f3ee751f7da0cd7e799be88ddbdac20b48e890ff81d7fa28c2d017d7932f2569038740461accd4582f576e4fdb6150a3399f8266bc19eb942648ad1ad81420ed6c382436e474390c8995e829e4f9df43eed85a60b9ee254e31eb62900857fa134e76cc64880334adbff069a2e5e647d2ed36a96b23834b6f6ca6b8113baf4cf30347fbb7ffc30aea99872cc0dba03b07d3347b2d257edb88feec14566137e2733c26b7337a79962d8ce85469e3bcbe0e4a48a6ae69d13f2d4b5155b390ef67aa714b82b6313ee277cb8986eca5db2e97cb1ae2243bba80274f614ece521baef484394b4c161cb9ae926e21892578b49cfd6efe1cb1572148c10d92218ed73ec116a18de80ac42d2726a4523a764fc6dc356c5fbbf9d2c947ae3bc9a3dc76099f3257c8d5952876151b0326d8cb1d5683ee4ad5ded9a34c00ac1b03f34627ec18a7c2e92c87b7896549cfab5eb55fa85a970994bd4b22b5f0d045e241256d06232cd41908b5cfa4b8fcfcafce500a0c7ae99767b5217d26927aa69f6ccd7daea62f19ceb82559f41899c9a9aee99113e7e64b5f8b9824be9fdbfa4dd4995673d882bb4daeb64413b334e114965d2ba3cea8051e692508701b9400cb12eae457f8b8549944091b729160939918d8fcae611a5ded665f770db637487a236da1a58ba7566668651a77171fc4fe506496d19059343dbe4f426625d3f2b705f545816d06576d3f5326372361770bf5a9098a9fafefaf546426b294239ac33e3186e4d58ad2fa995a6ad4dc074e7cca11aead109563b2076c7c6e9f57ec63df960804e2e7f9d8444de9550cca3df7834d864e9777291c2e1f6205de2e43dc995ab8bb1515a365efc2830fa3e7a1dd137f550d6035212bc1f51c3b4ceea430df49ffc9210084ef156ad7e0d219efd6c116693735b44521d389969a3a65617cd2fd6e14060601cee4cd054cf36fe048b57d1d9ee3cad2a73552449926b4a69823823af35bc53e9d339be086e8b03fbe9c0ec68357e1fbe52eee7b67f5870c0aefb7ee8236747e0d67a26725fb515544cbbe8464da94cfd8c0b94bb4e51a263b1749bd0a7cf651931f806d1b928d1f9994f1ad4d50e6a5cd7a8e4e687f8564fdacc864013d095ba9d5709eced3c28eabda476d177a7836400a01e02beeb5a6636d4064fdda344967ad8682d14b87c71727cb66be27d1d39191f4223c545b62fb4860262ba8076a65dbc194cee1df846c584b7bbe9dce6e6895b2cbbb64b03b5554a4845cc3de2f939ef918421af9a5e9157e837651245299c03992d0ddee06bd22a31522aca0f309b1feccebc0b1c0ed9d21c19bfd15cd313ff643941d6b10904890c9f6d646b026f27253e8f584c3ffd20ad67e8b", 0x481, 0x0, 0x0, 0x0) sendmsg$alg(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) recvmmsg(r0, &(0x7f0000007a80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) 05:52:09 executing program 0: creat(&(0x7f0000002940)='./file0/file0\x00', 0x0) 05:52:09 executing program 4: fchown(0xffffffffffffff9c, 0x0, 0x0) 05:52:09 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$can_raw(0x1d, 0x3, 0x1) poll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x2097}, {0xffffffffffffffff, 0x8281}, {r0, 0x4030}, {}, {r1, 0x6020}, {r2}, {}], 0x7, 0x8000) 05:52:09 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @private0}}) 05:52:09 executing program 5: r0 = socket(0x25, 0x1, 0x0) setsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, 0x0, 0x0) 05:52:09 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000001e80)={0x0, 0x0, &(0x7f0000001e40)={&(0x7f0000001e00)={0x14}, 0x14}}, 0x0) 05:52:09 executing program 0: pipe(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r0, &(0x7f0000000900)=[{0x0}, {&(0x7f0000000540)='\f', 0x1}], 0x2) 05:52:09 executing program 4: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$F2FS_IOC_SET_PIN_FILE(r0, 0x40086602, 0x0) 05:52:09 executing program 3: pipe(&(0x7f00000002c0)={0xffffffffffffffff}) r1 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r1, r0, 0x0, 0x0, 0x0}, 0x30) 05:52:09 executing program 5: r0 = socket$tipc(0x1e, 0x2, 0x0) sendmsg$tipc(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000040)="5e51404067de9d29a7170e06cda3212f13402beb37cf047a87ddc6532174d9b206d65809568a08f6cc667d2a2a364cc92b1fa8fe6e10c121c59f96b495519785748811e9367fa2089f05a9e57dc1507a39c59ad999e60c1fbf56ddb8914bb8ddf5468da7d5ffcff12914f2a68ea8ac3ed0f28503acd12127c3307fd4994b5724e7fc56425d1fa19be2adcb8356ef0e38621082f70a96c2b823c88694d5f666", 0x9f}, {&(0x7f0000000100)="485bc86fab87d06ac4546295b55af37df783afa4bd47fe477866c23bcc8f837e1835d8b63faf5e3d01e2d1404e6c30d1c1bf184ae1f2c2876b34c4795e71349e332c1fae77d7e274ee8332f7653212ddf9958262596129ddf82e655336935473da46ad9d053256aec62b331d7b249613204de6171156614a78992b919b0410058b7301ea569c5d78e1d5ca34a01302a8b5222d085f3ced9de021932f62eba7be2716fd6fd730124e1c8ff32c42a2dbf860d52ec3fa347a0b", 0xb8}, {&(0x7f00000001c0)="a5d9c71cdf624ef01946fd59668ceb8646578232413630670dd7f02562910bd88b43a559aa1fb2835c3d12792329d2bbb860706ec3f981eda5253e6d74", 0x3d}, {&(0x7f0000000200)="7b9d36c6b60e87b9adc756ef0f29c0a6d487705efbbfb9a8d2b5fa25b43092192db170040697fc11f3f8907ed515729e6cd5093d0ac224af1ae022c62b31b046a4e1cd1c804cc9", 0xffffff71}], 0x4, &(0x7f0000000340)="d98e6301cec4dc34557f39f298e6c80e21da6dc33472980ecd6a2f2ce560d584f223192b5952f3dfbca072613d970d6c918befdc55983f06992a6143aef274e96b696f852f80210fbf2c29fd8ae8d69651b0e8d05a91b71f0f7625504d05f861a505980676466c9e537f6099db184f22d2c1", 0x72, 0x80}, 0x4014) 05:52:09 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, 0x0, 0x0) 05:52:09 executing program 1: r0 = socket$tipc(0x1e, 0x2, 0x0) getsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x89, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 05:52:09 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002f80)={0x11, 0x3, &(0x7f0000000000)=@framed, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:52:09 executing program 4: r0 = socket$rxrpc(0x21, 0x2, 0xa) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000000)='}!\x00', 0x3) 05:52:10 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x6e, 0x0, 0x0) 05:52:10 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_RELOAD_REGDB(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x1}, 0x14}}, 0x0) 05:52:10 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_RELOAD_REGDB(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x1, 0x0, 0x0, {}, [""]}, 0x14}}, 0x4000000) accept(0xffffffffffffffff, 0x0, 0x0) 05:52:10 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f00000000c0)={0x1f, 0x0, 0x4}, 0x6) 05:52:10 executing program 3: r0 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 05:52:10 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @private1}, @in={0x2, 0x0, @multicast1}], 0x2c) 05:52:10 executing program 4: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$F2FS_IOC_SET_PIN_FILE(r0, 0x89ed, 0x0) [ 534.114399][T27543] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 534.137300][T27543] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 05:52:10 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x7d, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @private1}], 0x1c) 05:52:10 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast1}}) 05:52:10 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) pselect6(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x9}, &(0x7f00000000c0), 0x0) 05:52:10 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x24, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @private1}], 0x1c) [ 534.303893][T27550] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 534.346302][T27550] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db 05:52:10 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000180)={0x0, @in={{0x2, 0x0, @broadcast}}}, 0x90) 05:52:10 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000180)=ANY=[], 0x208e2ab) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$IPSET_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000100)={0xfffffffffffffffe, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x1c, 0x4, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r3, r2, 0x0, 0x100000500) 05:52:10 executing program 5: r0 = socket(0x25, 0x1, 0x0) sendmsg$NL80211_CMD_SET_POWER_SAVE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 05:52:10 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x9, 0x8, 0x6d, 0x8000000000000002, 0x0, 0x0}, 0x40) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000), &(0x7f00000004c0), 0x80000002, r0}, 0x38) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) 05:52:10 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000000)=[@in={0xa, 0x0, @multicast1}], 0x10) 05:52:10 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$FIDEDUPERANGE(r0, 0xc0189436, 0x0) [ 534.667414][ T37] audit: type=1804 audit(1627969930.615:116): pid=27574 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.0" name="/root/syzkaller-testdir376489602/syzkaller.W6kDv7/1093/cgroup.controllers" dev="sda1" ino=15281 res=1 errno=0 05:52:10 executing program 1: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$F2FS_IOC_SET_PIN_FILE(r0, 0x40049409, 0x0) 05:52:10 executing program 5: pipe(&(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}) accept$alg(r0, 0x0, 0x0) 05:52:10 executing program 4: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000100)=ANY=[@ANYBLOB="500000001000074790270600fd1a27540001a381", @ANYRES32=0x0, @ANYBLOB="7fff0002810300001c0012000b0001006d616373656300e10b00000000fc9f682339c3000a0005c0100000000000"], 0x50}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000000), 0x4924924924924cb, 0x0) 05:52:10 executing program 2: r0 = socket$tipc(0x1e, 0x5, 0x0) accept4$tipc(r0, 0x0, 0x0, 0x0) 05:52:10 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @dev}}}, &(0x7f0000000100)=0x100) 05:52:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_route(r1, &(0x7f00000008c0)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)=ANY=[@ANYBLOB="000000000000000026bd7000ffdbdf25000001006a13ed7ebb430a9d000000000000000000000001"], 0x34}, 0x1, 0x0, 0x0, 0x40080}, 0x2404008d) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001300), 0xffffffffffffffff) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000001380)={&(0x7f0000000000)={0x18, r2, 0x1, 0x70bd2d, 0x1, {}, [@IPVS_CMD_ATTR_SERVICE={0x4}]}, 0x18}}, 0x0) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000c40)=ANY=[@ANYRESDEC=r1, @ANYRES16=r2, @ANYBLOB="080027bd7000ffdbdf25100000000c000280080006000700000044000380050008003f00000008000100000000000800030004000000060004009d0300000800010000000000060007004e210000050008008100000006000400070000000800060000000000680003801400020076657468315f766c616e00000000000008000100000000000600040064040000060007004e200000060007004e210000060007004e21000014000200766c616e30000000000000000000000014000600ff0200000000000000000000000000010800040001000000080005000700000008000500080000000800040000010000"], 0xf4}}, 0x4000000) r3 = socket(0x10, 0x803, 0x0) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000480)=ANY=[@ANYRES32, @ANYRESHEX=r3, @ANYRESHEX], 0x28}, 0x1, 0x0, 0x0, 0x24008089}, 0x0) sendmsg$NL80211_CMD_SET_REG(r1, &(0x7f0000000b00)={&(0x7f0000000a40)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000425bd7000fcdbdf251a00000008009a000000000007002100626200000400cc0008000100290000000800010014000000"], 0x38}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000001) getsockopt$ARPT_SO_GET_INFO(r3, 0x0, 0x60, &(0x7f0000000240), &(0x7f0000000340)=0x44) sendmsg$NL80211_CMD_SET_REG(r1, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000002}, 0xc, &(0x7f00000002c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="01b8", @ANYBLOB="1ccbba61d715393a5c310c66db2aaa3a5cb1e2ad418e0a7c7180ca01eb87769ee411d4409c390027e2294ac1e83cb213abbcdc74", @ANYRES32=r1], 0x34}, 0x1, 0x0, 0x0, 0x91}, 0x20004084) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f00000007c0), r1) sendmsg$L2TP_CMD_TUNNEL_CREATE(r0, &(0x7f0000000a00)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000880)={&(0x7f0000000800)={0x48, r4, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @L2TP_ATTR_VLAN_ID={0x6}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x3f}, @L2TP_ATTR_PEER_CONN_ID={0x8}, @L2TP_ATTR_OFFSET={0x6}]}, 0x48}, 0x1, 0x0, 0x0, 0x4004040}, 0x4000000) sendmsg$TIPC_NL_MON_GET(r3, &(0x7f0000000600)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="20000552da", @ANYRES16=0x0, @ANYBLOB="330a2dbd7000040004000000000000003c00038008000100ffffffff08000200070000000800010000040000080003003d00000008000200e50000000800020029040000080002000002000004000380240005800c000280080003000314000280080002009d01000008000200060000000000000000000000000000000000e41334976853e32c6accff7c373624582ff13e623e9f4b91e90e6fb157943e515d07af5254370e9241557453000000"], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x20000040) getsockname$packet(r3, &(0x7f0000000900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r5, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006000000"], 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newlink={0x74, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x41100, 0x7001d}, [@IFLA_LINKINFO={0x4c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x3c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_FLAGS={0x6}, @IFLA_IPTUN_FLOWINFO={0x8, 0x7, 0x8004}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_ENCAP_SPORT={0x6, 0x11, 0x4e23}, @IFLA_IPTUN_COLLECT_METADATA={0x4}, @IFLA_IPTUN_FLAGS={0x8, 0x8, 0x1e}, @IFLA_IPTUN_ENCAP_FLAGS={0x6, 0x10, 0x9}, @IFLA_IPTUN_PROTO={0x5, 0x9, 0x4}]}}}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x74}}, 0x40880) 05:52:11 executing program 0: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) write$binfmt_elf64(r0, 0x0, 0x0) [ 535.131401][T27595] netlink: 'syz-executor.4': attribute type 5 has an invalid length. 05:52:11 executing program 5: setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000000c0), 0xfffffffffffffde6) [ 535.178389][T27595] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 535.228116][T27595] device team_slave_0 entered promiscuous mode [ 535.234857][T27595] device team_slave_1 entered promiscuous mode [ 535.259822][T27595] device macsec1 entered promiscuous mode [ 535.275320][T27595] device team0 entered promiscuous mode [ 535.295238][T27604] netlink: 'syz-executor.2': attribute type 1 has an invalid length. 05:52:11 executing program 1: r0 = socket$caif_seqpacket(0x25, 0x5, 0x0) connect$caif(r0, &(0x7f0000000080)=@dgm, 0x18) [ 535.441855][T27604] 8021q: adding VLAN 0 to HW filter on device bond1 [ 535.450679][T27606] netlink: 'syz-executor.4': attribute type 5 has an invalid length. [ 535.491938][T27606] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. [ 535.544461][T27599] bond1: (slave ip6tnl1): The slave device specified does not support setting the MAC address [ 535.585938][T27599] bond1: (slave ip6tnl1): Error -95 calling set_mac_address [ 535.879673][T27599] netlink: 'syz-executor.2': attribute type 1 has an invalid length. [ 535.911115][T27599] bond2 (uninitialized): Released all slaves 05:52:13 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000002140), 0x8) 05:52:13 executing program 0: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$sock_ifreq(r0, 0x8927, &(0x7f00000000c0)={'veth0_virt_wifi\x00', @ifru_names}) 05:52:13 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}]}, 0x1c}}, 0x0) 05:52:13 executing program 2: pipe(&(0x7f00000002c0)) pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x1f}, 0x0, 0x0, 0x0) 05:52:13 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_ifreq(r0, 0x8916, 0x0) 05:52:13 executing program 4: r0 = socket$inet(0x2, 0x6, 0x0) recvfrom(r0, 0x0, 0x0, 0x40000062, 0x0, 0x0) 05:52:13 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x22, 0x0, 0x0) 05:52:13 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000600)={0x0, @in={{0x2, 0x0, @empty}}}, 0x90) 05:52:13 executing program 3: recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0xa, [@datasec={0x8, 0x2, 0x0, 0xf, 0xfffffffe, [{0x3, 0x4, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x4a, 0xf9, 0x8}, 0x20) 05:52:13 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000005440)='./file0\x00', 0x109000, 0x211) 05:52:13 executing program 2: r0 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r0, &(0x7f0000001fc0)={0x18, 0x2, {0x3, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) 05:52:13 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$sock_ifreq(r0, 0x8916, &(0x7f0000000000)={'vlan0\x00', @ifru_hwaddr=@broadcast}) 05:52:13 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x7d, 0x0, 0x0) [ 537.719690][T27684] BPF:[1] DATASEC _ [ 537.736748][T27684] BPF:size=4294967294 vlen=2 [ 537.759725][T27684] BPF: 05:52:13 executing program 4: pipe(&(0x7f00000008c0)={0xffffffffffffffff}) close(r0) [ 537.773783][T27684] BPF:Invalid btf_info size 05:52:13 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x77, 0x0, 0x0) [ 537.795316][T27684] BPF: [ 537.795316][T27684] [ 537.849329][T27693] BPF:[1] DATASEC _ [ 537.855883][T27693] BPF:size=4294967294 vlen=2 [ 537.860658][T27693] BPF: [ 537.867114][T27693] BPF:Invalid btf_info size [ 537.880472][T27693] BPF: [ 537.880472][T27693] 05:52:13 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000007040)={&(0x7f0000006000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@volatile={0x0, 0x0, 0x0, 0x9, 0x3}]}}, &(0x7f0000006040)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 05:52:13 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x7c, 0x0, 0x0) 05:52:13 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) poll(&(0x7f00000006c0)=[{}, {r0}, {r1}], 0x3, 0x0) 05:52:13 executing program 4: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) write$binfmt_elf64(r0, &(0x7f0000000000)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 05:52:13 executing program 2: r0 = socket(0x11, 0x3, 0x0) connect$llc(r0, 0x0, 0xfffffffffffffff6) 05:52:13 executing program 3: recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0xa, [@datasec={0x8, 0x2, 0x0, 0xf, 0xfffffffe, [{0x3, 0x4, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x4a, 0xf9, 0x8}, 0x20) [ 538.050111][T27708] BPF:[1] DATASEC _ [ 538.064870][T27708] BPF:size=4294967294 vlen=2 [ 538.084490][T27708] BPF: [ 538.094624][T27708] BPF:Invalid btf_info size [ 538.113888][T27708] BPF: [ 538.113888][T27708] 05:52:14 executing program 5: r0 = socket$inet(0x2, 0x6, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getpid() sendmsg$unix(r1, &(0x7f0000000900)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000000840)=[@rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {r2}}}], 0x38}, 0x0) 05:52:14 executing program 4: socket(0x3, 0x0, 0x3256216d) 05:52:14 executing program 3: recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0xa, [@datasec={0x8, 0x2, 0x0, 0xf, 0xfffffffe, [{0x3, 0x4, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x4a, 0xf9, 0x8}, 0x20) 05:52:14 executing program 2: r0 = socket(0x28, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, 0x0, 0x0) 05:52:14 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$llc(r0, 0x0, 0x0) [ 538.244791][T27723] BPF:[1] DATASEC _ [ 538.268956][T27723] BPF:size=4294967294 vlen=2 05:52:14 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x75, 0x0, 0x0) [ 538.300453][T27723] BPF: [ 538.317252][T27723] BPF:Invalid btf_info size [ 538.336817][T27723] BPF: [ 538.336817][T27723] 05:52:14 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r0, 0x107, 0x9, &(0x7f00000000c0), 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000b80)=ANY=[@ANYBLOB="b702000014000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000e3a333a0daf2f73451c0e17a606fec68cb7d67514fe60077d4dd90123d27e7cf43548ee85857ad4a77cb56e0fcb3dfd4e70ebec677d6ac14c2c794f72cbf5fe31789e70227bfd8115efd90c8c48258f8dbe82e16cf0000000000000000000000000000000000000000000000000000790ae2fd45d54b107c8c8a14195e32f13799d6707432ff48bc085760314166443ce72c74f3db890e1ff15a10d91f27e9a232fe2238fff867ba8fd41b29caad2a986e0e244bd11747ffda1a869db7e632df4de8572344b419c45c2170fe873692d8255170c16822bdffd3135480dae93c7e33bdef00000000d8fd8c79a5d0967ab7e43686b4d1e03e326beea7905ef7de375ef8bc8143df20d13c37db269971210fab7071cc3094078a044777aab9d86cf50afefd7b72a0950d389bc9cb43aa607b7269561dd50b22bd2491331818a10f2ac8c3249582a20d4e04fd1ab7883f656b84137d5f7a6edba86a7b9a4c2f3b3a8abf93b280ea53ce01dcc2d30f4310e8281b0cdc017f9759060ea88a2f6597e966a85c9a74ca196700218f919746bb4b84c16fd56ee450e411d75ab7613b644ba7580b2a0942394ed1737517eed1c892422f54d5a2e1cf1a60fe2dcc1a465aa8d54cb4000053c3f01ea714a7bd4fad615ff6e2991589bbdd1ae0d1bce65c620c4a2527a82afe16e019a5e0b5ec1b1b8aafba090000c3630488edcc4a8cbd3246e962b773a75b28a51cd09cbcb3577fea6f1e9fe8cd2b532c084cbd051b4aeaf0e7813354f14a453b093948d49bca31a7170419bb1d32f256ff3010e69b2f0482c63ab78a74dec8b19ca76e7fdf29766d96e4c2f57ba917f0abd5253e87fbe5b86a4b9151c316df3925d86899ab3e2036f4866e277d82829165922f8aeb4ea2b9db2dbb6a6b157d4019545e00028d09608ef2e186fd216ce84d913813e1be50f5b6b98d5dab8d5fe3dc100d8b6cf41c29b550f45d68a627db8335fd97bd633694ebb6173d9474c50c0360daa387ba5da3e092463a4c08f2c686ca2ab5f8c62353b8f2c81700000000297c8161e5c939855271fe95df690f658da38153646e660e9ba212986cd3628a500d14d378d4af508f428ecb0e85322f9fd317b29ec23b193b1ded2824dc90eeea4c56a676609d2f9e6b925cc413cde5414869387f23a309fe29c7e63101fec34b22aae77bd5df5f6181f5b4639119fc5446893479e7907e2eedfd728963537e45e01cd99203cc1f28fb06e5f5a6c96ef934e8"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x24f}, 0x48) perf_event_open(&(0x7f0000001980)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x1800000000000060, 0xf, 0x0, &(0x7f0000000100)="280e003f4305607e5bc5795e655800", 0x0, 0x100, 0xf2ffffff, 0x0, 0x0, 0x0, 0x0}, 0x48) 05:52:14 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x21, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @private1}], 0x1c) 05:52:14 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000200)={0xa, 0x14e24}, 0x1c) connect$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) ppoll(&(0x7f0000000040)=[{r0, 0x2, 0x3000300}], 0x1, 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) 05:52:14 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f000000da80)={&(0x7f000000c940)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{}]}]}}, &(0x7f000000ca80)=""/4096, 0x2e, 0x1000, 0x1}, 0x20) 05:52:14 executing program 3: recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0xa, [@datasec={0x8, 0x2, 0x0, 0xf, 0xfffffffe, [{0x3, 0x4, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x4a, 0xf9, 0x8}, 0x20) 05:52:14 executing program 5: r0 = perf_event_open(&(0x7f0000000080)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, 0x0) [ 538.490214][T27740] BPF:[1] DATASEC _ [ 538.507737][T27740] BPF:size=4294967294 vlen=2 [ 538.524983][T27740] BPF: 05:52:14 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(r0, 0x0, 0x0) 05:52:14 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x800000, 0x4, 0x1}, 0x40) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000280)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01001800000000000000300000000230e54ce300000000000000010000453172d400000000000000000000000080000000005b00000b0000000800002e00000000080000007a5e"], &(0x7f0000000100)=""/201, 0x4d, 0xc9, 0x8}, 0x20) socket$kcm(0x10, 0x2, 0x10) bpf$MAP_CREATE(0x1f00000000000000, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 538.536744][T27740] BPF:Invalid btf_info size [ 538.579376][T27740] BPF: [ 538.579376][T27740] 05:52:14 executing program 3: recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0xa, [@datasec={0x8, 0x2, 0x0, 0xf, 0xfffffffe, [{0x3, 0x4, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x4a, 0xf9, 0x8}, 0x20) 05:52:14 executing program 5: perf_event_open(&(0x7f0000000080)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:52:14 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f000000da80)={&(0x7f000000c940)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{}, {}]}]}}, &(0x7f000000ca80)=""/4096, 0x36, 0x1000, 0x1}, 0x20) [ 538.753456][T27753] BPF:[1] DATASEC _ [ 538.766517][T27754] BPF:Invalid section offset [ 538.771093][T27753] BPF:size=4294967294 vlen=2 [ 538.796845][T27753] BPF: [ 538.810532][T27753] BPF:Invalid btf_info size [ 538.839003][T27753] BPF: [ 538.839003][T27753] 05:52:14 executing program 2: perf_event_open(&(0x7f0000000080)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x801c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:52:15 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001540)={0x11, 0x4, &(0x7f00000037c0)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x8}]}, &(0x7f0000000080)='syzkaller\x00', 0x2, 0x1000, &(0x7f00000004c0)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:52:15 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x800000, 0x4, 0x1}, 0x40) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000280)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01001800000000000000300000000230e54ce300000000000000010000453172d400000000000000000000000080000000005b00000b0000000800002e00000000080000007a5e"], &(0x7f0000000100)=""/201, 0x4d, 0xc9, 0x8}, 0x20) socket$kcm(0x10, 0x2, 0x10) bpf$MAP_CREATE(0x1f00000000000000, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 539.141334][T27770] BPF:Invalid section offset 05:52:15 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$sock(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="a0", 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000003540)={0x0, 0x0, 0x0}, 0x0) 05:52:15 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0xa, [@datasec={0x8, 0x2, 0x0, 0xf, 0xfffffffe, [{0x3, 0x4, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x4a, 0xf9, 0x8}, 0x20) 05:52:15 executing program 2: socketpair(0x11, 0x3, 0xffffffff, &(0x7f0000000040)) 05:52:15 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x3}}]}}, &(0x7f0000000400)=""/163, 0x32, 0xa3, 0x1}, 0x20) [ 539.429205][T27774] BPF:[1] DATASEC _ [ 539.447565][T27774] BPF:size=4294967294 vlen=2 05:52:15 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000040)="89000000120081ae08060c0f009b00ff7f03e3f70000000000e2ffca1b4e2906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e32ef568027802600123d000200789977a0bdad446b9bbc7a46e39882d3f868fecea4e455366883b180e02d5c5568c4324f72cbeb13ad14955f947ee2b49e3b6f8afa020d2347", 0x89}], 0x1}, 0x8004) [ 539.489500][T27774] BPF: [ 539.498031][T27774] BPF:Invalid btf_info size [ 539.528524][T27774] BPF: [ 539.528524][T27774] 05:52:15 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:15 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x800000, 0x4, 0x1}, 0x40) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000280)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01001800000000000000300000000230e54ce300000000000000010000453172d400000000000000000000000080000000005b00000b0000000800002e00000000080000007a5e"], &(0x7f0000000100)=""/201, 0x4d, 0xc9, 0x8}, 0x20) socket$kcm(0x10, 0x2, 0x10) bpf$MAP_CREATE(0x1f00000000000000, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 05:52:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 05:52:15 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x42003, 0x0) close(r0) 05:52:15 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000040)="89000000120081ae08060c0f009b00ff7f03e3f70000000000e2ffca1b4e2906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e32ef568027802600123d000200789977a0bdad446b9bbc7a46e39882d3f868fecea4e455366883b180e02d5c5568c4324f72cbeb13ad14955f947ee2b49e3b6f8afa020d2347", 0x89}], 0x1}, 0x8004) [ 539.753129][T27793] BPF:Invalid section offset 05:52:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f000000da80)={&(0x7f000000c940)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x4}]}]}}, &(0x7f000000ca80)=""/4096, 0x2e, 0x1000, 0x1}, 0x20) 05:52:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 05:52:15 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:15 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000040)="89000000120081ae08060c0f009b00ff7f03e3f70000000000e2ffca1b4e2906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e32ef568027802600123d000200789977a0bdad446b9bbc7a46e39882d3f868fecea4e455366883b180e02d5c5568c4324f72cbeb13ad14955f947ee2b49e3b6f8afa020d2347", 0x89}], 0x1}, 0x8004) 05:52:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 05:52:16 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(r0, &(0x7f0000005300)={0x0, 0x0, &(0x7f0000002040)=[{&(0x7f0000002000)='X', 0x1}], 0x1, &(0x7f0000002080)=ANY=[], 0x3258}, 0x50) 05:52:16 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) close(r0) socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454d9, 0x0) 05:52:16 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000040)="89000000120081ae08060c0f009b00ff7f03e3f70000000000e2ffca1b4e2906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e32ef568027802600123d000200789977a0bdad446b9bbc7a46e39882d3f868fecea4e455366883b180e02d5c5568c4324f72cbeb13ad14955f947ee2b49e3b6f8afa020d2347", 0x89}], 0x1}, 0x8004) 05:52:16 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x800000, 0x4, 0x1}, 0x40) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000280)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01001800000000000000300000000230e54ce300000000000000010000453172d400000000000000000000000080000000005b00000b0000000800002e00000000080000007a5e"], &(0x7f0000000100)=""/201, 0x4d, 0xc9, 0x8}, 0x20) socket$kcm(0x10, 0x2, 0x10) bpf$MAP_CREATE(0x1f00000000000000, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 05:52:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) 05:52:16 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) [ 540.319173][T27820] BPF:hdr_len not found 05:52:16 executing program 0: socketpair(0x2c, 0x0, 0x0, &(0x7f0000000100)) 05:52:16 executing program 2: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000040)="89000000120081ae08060c0f009b00ff7f03e3f70000000000e2ffca1b4e2906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e32ef568027802600123d000200789977a0bdad446b9bbc7a46e39882d3f868fecea4e455366883b180e02d5c5568c4324f72cbeb13ad14955f947ee2b49e3b6f8afa020d2347", 0x89}], 0x1}, 0x8004) 05:52:16 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) [ 540.454164][T27825] BPF:Invalid section offset 05:52:16 executing program 2: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000040)="89000000120081ae08060c0f009b00ff7f03e3f70000000000e2ffca1b4e2906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e32ef568027802600123d000200789977a0bdad446b9bbc7a46e39882d3f868fecea4e455366883b180e02d5c5568c4324f72cbeb13ad14955f947ee2b49e3b6f8afa020d2347", 0x89}], 0x1}, 0x8004) 05:52:16 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000340)={&(0x7f00000001c0)=@id={0x1e, 0x3, 0x0, {0x0, 0x4}}, 0x10, 0x0}, 0x0) [ 540.522022][T27831] BPF:hdr_len not found 05:52:16 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000003c0)) 05:52:16 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x800000, 0x4, 0x1}, 0x40) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000280)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01001800000000000000300000000230e54ce300000000000000010000453172d400000000000000000000000080000000005b00000b0000000800002e00000000080000007a5e"], &(0x7f0000000100)=""/201, 0x4d, 0xc9, 0x8}, 0x20) socket$kcm(0x10, 0x2, 0x10) bpf$MAP_CREATE(0x1f00000000000000, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 05:52:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={0x0, &(0x7f0000000380)=""/249, 0x0, 0xf9, 0x8}, 0x20) 05:52:16 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:16 executing program 2: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000040)="89000000120081ae08060c0f009b00ff7f03e3f70000000000e2ffca1b4e2906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e32ef568027802600123d000200789977a0bdad446b9bbc7a46e39882d3f868fecea4e455366883b180e02d5c5568c4324f72cbeb13ad14955f947ee2b49e3b6f8afa020d2347", 0x89}], 0x1}, 0x8004) 05:52:16 executing program 0: perf_event_open(&(0x7f0000000080)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 540.814042][T27850] BPF:hdr_len not found 05:52:16 executing program 2: r0 = socket$kcm(0x10, 0x0, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000040)="89000000120081ae08060c0f009b00ff7f03e3f70000000000e2ffca1b4e2906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e32ef568027802600123d000200789977a0bdad446b9bbc7a46e39882d3f868fecea4e455366883b180e02d5c5568c4324f72cbeb13ad14955f947ee2b49e3b6f8afa020d2347", 0x89}], 0x1}, 0x8004) 05:52:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x19, 0x19, 0xa, [@datasec={0x8, 0x1, 0x0, 0xf, 0x1, [{0x3, 0x4, 0xfffffffc}], "f3"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x3e, 0xf9, 0x8}, 0x20) [ 540.875013][T27852] BPF:Invalid section offset 05:52:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x4, 0x4}]}]}}, &(0x7f0000000100)=""/150, 0x32, 0x96, 0x1}, 0x20) 05:52:16 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) [ 540.968186][T27855] BPF:Unsupported section found 05:52:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x19, 0x19, 0xa, [@datasec={0x8, 0x1, 0x0, 0xf, 0x1, [{0x3, 0x4, 0xfffffffc}], "f3"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x3e, 0xf9, 0x8}, 0x20) 05:52:17 executing program 2: r0 = socket$kcm(0x10, 0x0, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000040)="89000000120081ae08060c0f009b00ff7f03e3f70000000000e2ffca1b4e2906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e32ef568027802600123d000200789977a0bdad446b9bbc7a46e39882d3f868fecea4e455366883b180e02d5c5568c4324f72cbeb13ad14955f947ee2b49e3b6f8afa020d2347", 0x89}], 0x1}, 0x8004) [ 541.156646][T27866] BPF:Unsupported section found 05:52:17 executing program 1: perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x800000, 0x4, 0x1}, 0x40) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(0xffffffffffffffff, 0x400454cd, 0x339) socketpair(0x0, 0x8e6284c9a8f015e4, 0x7, &(0x7f0000000000)) ioctl$TUNSETLINK(r0, 0x8912, 0x0) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000280)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB], &(0x7f0000000100)=""/201, 0x4d, 0xc9}, 0x20) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000280)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x7f, 0x0}, 0x0) bpf$MAP_CREATE(0x1f00000000000000, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x8000000000000002}, 0x40) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xd, 0x4, &(0x7f00000002c0)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}]}, 0x0, 0x2, 0x6a, &(0x7f0000000340)=""/106, 0x0, 0x0, '\x00', 0x0, 0xf, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:52:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e002030029000505d25a80238c63940d0424fc60050011400a2f0000013582c137153e370848018000f01700d1bd", 0x302e0}], 0x1}, 0x0) 05:52:17 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x19, 0x19, 0xa, [@datasec={0x8, 0x1, 0x0, 0xf, 0x1, [{0x3, 0x4, 0xfffffffc}], "f3"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x3e, 0xf9, 0x8}, 0x20) 05:52:17 executing program 2: r0 = socket$kcm(0x10, 0x0, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000040)="89000000120081ae08060c0f009b00ff7f03e3f70000000000e2ffca1b4e2906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e32ef568027802600123d000200789977a0bdad446b9bbc7a46e39882d3f868fecea4e455366883b180e02d5c5568c4324f72cbeb13ad14955f947ee2b49e3b6f8afa020d2347", 0x89}], 0x1}, 0x8004) 05:52:17 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x800000, 0x4, 0x1}, 0x40) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000280)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01001800000000000000300000000230e54ce300000000000000010000453172d400000000000000000000000080000000005b00000b0000000800002e00000000080000007a5e"], &(0x7f0000000100)=""/201, 0x4d, 0xc9, 0x8}, 0x20) socket$kcm(0x10, 0x2, 0x10) bpf$MAP_CREATE(0x1f00000000000000, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) [ 541.530781][T27878] BPF:Unsupported section found [ 541.540863][T27880] netlink: 183744 bytes leftover after parsing attributes in process `syz-executor.0'. 05:52:17 executing program 2: socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000040)="89000000120081ae08060c0f009b00ff7f03e3f70000000000e2ffca1b4e2906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e32ef568027802600123d000200789977a0bdad446b9bbc7a46e39882d3f868fecea4e455366883b180e02d5c5568c4324f72cbeb13ad14955f947ee2b49e3b6f8afa020d2347", 0x89}], 0x1}, 0x8004) 05:52:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x26, 0x26, 0xa, [@datasec={0x8, 0x1, 0x0, 0xf, 0x1, [{0x3, 0x4, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], 'w'}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x4a, 0xf9, 0x8}, 0x20) [ 541.637675][T27888] BPF:Invalid section offset 05:52:17 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:17 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000000)={r0}) [ 541.759841][T27901] BPF:Unsupported section found 05:52:17 executing program 2: socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000040)="89000000120081ae08060c0f009b00ff7f03e3f70000000000e2ffca1b4e2906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e32ef568027802600123d000200789977a0bdad446b9bbc7a46e39882d3f868fecea4e455366883b180e02d5c5568c4324f72cbeb13ad14955f947ee2b49e3b6f8afa020d2347", 0x89}], 0x1}, 0x8004) 05:52:17 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x800000, 0x4, 0x1}, 0x40) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000280)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01001800000000000000300000000230e54ce300000000000000010000453172d400000000000000000000000080000000005b00000b0000000800002e00000000080000007a5e"], &(0x7f0000000100)=""/201, 0x4d, 0xc9, 0x8}, 0x20) socket$kcm(0x10, 0x2, 0x10) bpf$MAP_CREATE(0x1f00000000000000, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) [ 541.970937][T27913] BPF:Invalid section offset 05:52:18 executing program 1: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000640)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000400)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}]}, &(0x7f0000000480)='GPL\x00', 0x1, 0xef, &(0x7f00000004c0)=""/239, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:52:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x26, 0x26, 0xa, [@datasec={0x8, 0x1, 0x0, 0xf, 0x1, [{0x3, 0x4, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], 'w'}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x4a, 0xf9, 0x8}, 0x20) 05:52:18 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:18 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, 0x0) 05:52:18 executing program 2: socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000040)="89000000120081ae08060c0f009b00ff7f03e3f70000000000e2ffca1b4e2906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e32ef568027802600123d000200789977a0bdad446b9bbc7a46e39882d3f868fecea4e455366883b180e02d5c5568c4324f72cbeb13ad14955f947ee2b49e3b6f8afa020d2347", 0x89}], 0x1}, 0x8004) 05:52:18 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x800000, 0x4, 0x1}, 0x40) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000280)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01001800000000000000300000000230e54ce300000000000000010000453172d400000000000000000000000080000000005b00000b0000000800002e00000000080000007a5e"], &(0x7f0000000100)=""/201, 0x4d, 0xc9, 0x8}, 0x20) socket$kcm(0x10, 0x2, 0x10) bpf$MAP_CREATE(0x1f00000000000000, 0x0, 0x0) [ 542.272058][T27928] BPF:Unsupported section found 05:52:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x26, 0x26, 0xa, [@datasec={0x8, 0x1, 0x0, 0xf, 0x1, [{0x3, 0x4, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], 'w'}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x4a, 0xf9, 0x8}, 0x20) 05:52:18 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x500, 0x0) 05:52:18 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, 0x0, 0x8004) 05:52:18 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) [ 542.365514][T27932] BPF:Invalid section offset [ 542.425413][T27937] BPF:Unsupported section found 05:52:18 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x800000, 0x4, 0x1}, 0x40) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000280)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01001800000000000000300000000230e54ce300000000000000010000453172d400000000000000000000000080000000005b00000b0000000800002e00000000080000007a5e"], &(0x7f0000000100)=""/201, 0x4d, 0xc9, 0x8}, 0x20) socket$kcm(0x10, 0x2, 0x10) 05:52:18 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, 0x0, 0x8004) [ 542.627952][T27949] BPF:Invalid section offset 05:52:18 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x4, &(0x7f00000008c0)=[{0x10}, {0x10}], 0x20}, 0x0) 05:52:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x27, 0x27, 0xa, [@datasec={0x8, 0x1, 0x0, 0xf, 0x1, [{0x3, 0x4, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x2, [], "7794"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x4a, 0xf9, 0x8}, 0x20) 05:52:18 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:18 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x10, 0x4, 0x4, 0x8}, 0x40) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000100)=r0, 0x4) bpf$MAP_DELETE_ELEM(0x4, &(0x7f0000000040)={r0, 0x0, 0x541000}, 0x20) 05:52:18 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, 0x0, 0x8004) 05:52:18 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x8004) [ 542.901952][T27961] BPF:Unsupported section found 05:52:18 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x800000, 0x4, 0x1}, 0x40) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000280)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01001800000000000000300000000230e54ce300000000000000010000453172d400000000000000000000000080000000005b00000b0000000800002e00000000080000007a5e"], &(0x7f0000000100)=""/201, 0x4d, 0xc9, 0x8}, 0x20) socket$kcm(0x10, 0x2, 0x10) 05:52:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x27, 0x27, 0xa, [@datasec={0x8, 0x1, 0x0, 0xf, 0x1, [{0x3, 0x4, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x2, [], "7794"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x4a, 0xf9, 0x8}, 0x20) 05:52:18 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:18 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x8004) 05:52:18 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000b40)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000500)='W', 0x11d80}], 0x1, &(0x7f00000008c0)=[{0x10}, {0x10}], 0x20}, 0x0) [ 543.039890][T27970] BPF:Unsupported section found 05:52:19 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x8004) [ 543.106178][T27976] BPF:Invalid section offset 05:52:19 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) 05:52:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x27, 0x27, 0xa, [@datasec={0x8, 0x1, 0x0, 0xf, 0x1, [{0x3, 0x4, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x2, [], "7794"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x4a, 0xf9, 0x8}, 0x20) 05:52:19 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:19 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r2 = socket$kcm(0x29, 0x5, 0x0) r3 = getpid() sendmsg$unix(r1, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@rights={{0x18, 0x1, 0x1, [r2, r0]}}, @cred={{0x1c, 0x1, 0x2, {r3}}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x50}, 0x0) 05:52:19 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000019c0)}, 0x8004) 05:52:19 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x800000, 0x4, 0x1}, 0x40) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000280)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01001800000000000000300000000230e54ce300000000000000010000453172d400000000000000000000000080000000005b00000b0000000800002e00000000080000007a5e"], &(0x7f0000000100)=""/201, 0x4d, 0xc9, 0x8}, 0x20) [ 543.397202][T27993] BPF:Unsupported section found 05:52:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf, 0xf, 0xa, [@datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x32, 0xf9, 0x8}, 0x20) [ 543.465033][T27996] BPF:Invalid section offset 05:52:19 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:19 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000019c0)}, 0x8004) 05:52:19 executing program 0: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xd4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x101}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) gettid() ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xa, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)='f', 0x1}], 0x1, 0x0, 0x0, 0xf00}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0x9, 0x0, &(0x7f0000001740)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x7, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000005380)={0x1, 0xb, 0x0, 0x5}, 0x10, 0xffffffffffffffff}, 0x78) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x31d2) write$cgroup_subtree(r1, &(0x7f0000001400)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x206, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x100}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r2, &(0x7f0000000200), 0x22000) [ 543.567509][T28001] BPF:Unsupported section found 05:52:19 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000019c0)}, 0x8004) 05:52:19 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x800000, 0x4, 0x1}, 0x40) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) ioctl$TUNGETSNDBUF(0xffffffffffffffff, 0x800454d3, &(0x7f0000000280)) [ 543.645253][ C1] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 05:52:20 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x1000000, 0x0) 05:52:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf, 0xf, 0xa, [@datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x32, 0xf9, 0x8}, 0x20) 05:52:20 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000019c0)=[{0x0}], 0x1}, 0x8004) 05:52:20 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:20 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x800000, 0x4, 0x1}, 0x40) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 05:52:20 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000006c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) 05:52:20 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:20 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000019c0)=[{0x0}], 0x1}, 0x8004) [ 544.255179][T28032] BPF:Unsupported section found 05:52:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf, 0xf, 0xa, [@datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x32, 0xf9, 0x8}, 0x20) 05:52:20 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr={0x0, 0x0, 0x3}]}}, &(0x7f0000000080)=""/182, 0x26, 0xb6, 0x1}, 0x20) 05:52:20 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:20 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000019c0)=[{0x0}], 0x1}, 0x8004) [ 544.464070][T28046] BPF:Unsupported section found 05:52:20 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x890c, &(0x7f0000000000)={'vlan1\x00', @ifru_ivalue}) 05:52:20 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000000)=0x2080, 0x4) 05:52:20 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0xa, [@datasec={0x0, 0x2, 0x0, 0xf, 0xfffffffe, [{0x3, 0x4, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x4a, 0xf9, 0x8}, 0x20) 05:52:20 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000040)}], 0x1}, 0x8004) 05:52:20 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x800000, 0x4, 0x1}, 0x40) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) [ 544.959551][T28066] BPF:[1] DATASEC (anon) 05:52:20 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/40, 0x2a}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 544.989488][T28066] BPF:size=4294967294 vlen=2 [ 545.023027][T28066] BPF: [ 545.048212][T28066] BPF:Invalid name [ 545.069796][T28066] BPF: [ 545.069796][T28066] 05:52:21 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0xa, [@datasec={0x0, 0x2, 0x0, 0xf, 0xfffffffe, [{0x3, 0x4, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x4a, 0xf9, 0x8}, 0x20) 05:52:21 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000040)}], 0x1}, 0x8004) 05:52:21 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/40, 0x2a}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 545.138862][T28072] Dead loop on virtual device ip6_vti0, fix it urgently! 05:52:21 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) [ 545.217493][T28076] BPF:[1] DATASEC (anon) [ 545.235527][T28076] BPF:size=4294967294 vlen=2 [ 545.254657][T28076] BPF: [ 545.261124][T28077] Dead loop on virtual device ip6_vti0, fix it urgently! [ 545.272239][T28076] BPF:Invalid name [ 545.281542][T28076] BPF: [ 545.281542][T28076] 05:52:21 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x800000, 0x4, 0x1}, 0x40) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) 05:52:21 executing program 1: socketpair(0x0, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000001980)={0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000280)="d7d094de9af42a2e00ccecdddac8030bec25774cdb", 0x15}, {&(0x7f0000000380)="162ad740f39668802232088064efc8af88350c7a3cfb133c7b8e0899e756d27499427c91d2c6e395f6cc7cec8bd2fb1a8bf65a3cfe38a9c485919c647045cd5802c5353eb775911dcaa1e47ea02e65e41f3f1464bd56c88a24557571d1d9cd7f5fdb9774361552fa7d1605ff610669ea8b92769074441c8ff7424ac0690b2cd49d7464438b0cebdc6f8a8a3ea7d2abf074ab6c35b7ac87d84691", 0x9a}, {&(0x7f0000000480)="851b7d4ccb90d56b27ac4dea352ffc09691ff019a776ab3f16ea1f908c713ffa92dbc4afed5ad8a87cd7667b73ae84e45a1810523640e71979d2e8e4446d2987da495a9a9b20d18644724da5dd5fe4dd7aaa9ad09bd2d8c601fc487e29f567259dcde95fef573816f9150cd1d314e334b0ac8f7a941b3c29e22bd79e3699b72a6a254721a88da1730b5ca3cd2c8b1f7dc6e3436281aee6211f2192781b1ad36e980a66bff0c5e4e2cc5e6a00bf1690e27eafa216277cdbef79c40a1a2d632fedf5d990573890bf403a56f68d1a584b1dd064a627191a8b7711ae8a96", 0xdc}, {&(0x7f0000000580)="23920e00b131ef8f2561a4cd6c5abbe41c5b13a1bd72bde21e3c2eb2d813c786e92ebbbd751958514712f4bc8b6f9be0c095045a28", 0x35}, {&(0x7f00000005c0)="6c8d40d69f9e5b88a951fad59193c1b91cd3aa492c21299d0cea874c64dc965d02fe48f5ec52e297e868371de6c170eb31b7418c66712cce56ca8a5a7a58d688a701675f7821c5ff6398a048993ef8f565f772ffb9f54a7577c25eb113193aa8e9c16fee39908e8164ed903a7ce486a55ea4251ea72a7f25f6a0ab9f37b4340d5ad58c7e7083169dff1b33168c80154a4f934507f7ad369c1552e46811c0f92c2e5a44e84eda6418c5cded67707258fae73c23adc81fb5a5", 0xb8}, {0x0}], 0x6, &(0x7f0000000940)}, 0x24040850) sendmsg(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x32e8}, 0x45) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0xe100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x5e2c, 0x200, 0xffff, 0x0, 0x2, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x200000000000002, 0x300) recvmsg(r1, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) r2 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r2, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x2a}, @dev}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f00000007c0)={&(0x7f0000000740)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0xfffffeff, 0x0, 0x0, 0xffffffffffffffff}, 0x100) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x10, 0x2, 0x10) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0xe43) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 05:52:21 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000040)}], 0x1}, 0x8004) 05:52:21 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0xa, [@datasec={0x0, 0x2, 0x0, 0xf, 0xfffffffe, [{0x3, 0x4, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x4a, 0xf9, 0x8}, 0x20) 05:52:21 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/40, 0x2a}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:52:21 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) [ 545.859037][T28098] Dead loop on virtual device ip6_vti0, fix it urgently! 05:52:21 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/40, 0x2a}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:52:21 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x800000, 0x4, 0x1}, 0x40) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) 05:52:21 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000040)="89000000120081ae08060c0f009b00ff7f03e3f70000000000e2ffca1b4e2906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e32ef", 0x45}], 0x1}, 0x8004) [ 545.946827][T28100] BPF:[1] DATASEC (anon) [ 545.958050][T28100] BPF:size=4294967294 vlen=2 [ 545.985793][T28100] BPF: [ 546.004467][T28100] BPF:Invalid name [ 546.004703][T28106] Dead loop on virtual device ip6_vti0, fix it urgently! [ 546.009486][T28100] BPF: [ 546.009486][T28100] 05:52:22 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:22 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000040)="89000000120081ae08060c0f009b00ff7f03e3f70000000000e2ffca1b4e2906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e32ef", 0x45}], 0x1}, 0x8004) 05:52:22 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@datasec={0x8, 0x0, 0x0, 0xf, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x3e, 0xf9, 0x8}, 0x20) 05:52:22 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/40, 0x2a}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 546.213988][T28115] BPF:[2] Invalid kind:0 [ 546.269001][T28119] Dead loop on virtual device ip6_vti0, fix it urgently! [ 546.447627][T28122] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 546.460780][T28122] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. [ 546.590939][T28125] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 546.600625][T28125] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 05:52:22 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000040)="89000000120081ae08060c0f009b00ff7f03e3f70000000000e2ffca1b4e2906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e32ef", 0x45}], 0x1}, 0x8004) 05:52:22 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x800000, 0x4, 0x1}, 0x40) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) 05:52:22 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@datasec={0x8, 0x0, 0x0, 0xf, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x3e, 0xf9, 0x8}, 0x20) 05:52:22 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:22 executing program 1: socketpair(0x0, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000001980)={0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000280)="d7d094de9af42a2e00ccecdddac8030bec25774cdb", 0x15}, {&(0x7f0000000380)="162ad740f39668802232088064efc8af88350c7a3cfb133c7b8e0899e756d27499427c91d2c6e395f6cc7cec8bd2fb1a8bf65a3cfe38a9c485919c647045cd5802c5353eb775911dcaa1e47ea02e65e41f3f1464bd56c88a24557571d1d9cd7f5fdb9774361552fa7d1605ff610669ea8b92769074441c8ff7424ac0690b2cd49d7464438b0cebdc6f8a8a3ea7d2abf074ab6c35b7ac87d84691", 0x9a}, {&(0x7f0000000480)="851b7d4ccb90d56b27ac4dea352ffc09691ff019a776ab3f16ea1f908c713ffa92dbc4afed5ad8a87cd7667b73ae84e45a1810523640e71979d2e8e4446d2987da495a9a9b20d18644724da5dd5fe4dd7aaa9ad09bd2d8c601fc487e29f567259dcde95fef573816f9150cd1d314e334b0ac8f7a941b3c29e22bd79e3699b72a6a254721a88da1730b5ca3cd2c8b1f7dc6e3436281aee6211f2192781b1ad36e980a66bff0c5e4e2cc5e6a00bf1690e27eafa216277cdbef79c40a1a2d632fedf5d990573890bf403a56f68d1a584b1dd064a627191a8b7711ae8a96", 0xdc}, {&(0x7f0000000580)="23920e00b131ef8f2561a4cd6c5abbe41c5b13a1bd72bde21e3c2eb2d813c786e92ebbbd751958514712f4bc8b6f9be0c095045a28", 0x35}, {&(0x7f00000005c0)="6c8d40d69f9e5b88a951fad59193c1b91cd3aa492c21299d0cea874c64dc965d02fe48f5ec52e297e868371de6c170eb31b7418c66712cce56ca8a5a7a58d688a701675f7821c5ff6398a048993ef8f565f772ffb9f54a7577c25eb113193aa8e9c16fee39908e8164ed903a7ce486a55ea4251ea72a7f25f6a0ab9f37b4340d5ad58c7e7083169dff1b33168c80154a4f934507f7ad369c1552e46811c0f92c2e5a44e84eda6418c5cded67707258fae73c23adc81fb5a5", 0xb8}, {0x0}], 0x6, &(0x7f0000000940)}, 0x24040850) sendmsg(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x32e8}, 0x45) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0xe100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x5e2c, 0x200, 0xffff, 0x0, 0x2, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x200000000000002, 0x300) recvmsg(r1, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) r2 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r2, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x2a}, @dev}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f00000007c0)={&(0x7f0000000740)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0xfffffeff, 0x0, 0x0, 0xffffffffffffffff}, 0x100) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x10, 0x2, 0x10) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0xe43) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 05:52:22 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/40, 0x2a}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 546.737359][T28154] BPF:[2] Invalid kind:0 05:52:22 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000040)="89000000120081ae08060c0f009b00ff7f03e3f70000000000e2ffca1b4e2906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e32ef568027802600123d000200789977a0bdad446b9bbc7a46e39882d3f868fecea4e455", 0x67}], 0x1}, 0x8004) 05:52:22 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@datasec={0x8, 0x0, 0x0, 0xf, 0x1, [], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x3e, 0xf9, 0x8}, 0x20) [ 546.760377][T28157] Dead loop on virtual device ip6_vti0, fix it urgently! 05:52:22 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/40, 0x2a}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:52:22 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) [ 546.900857][T28161] BPF:[2] Invalid kind:0 05:52:22 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000040)="89000000120081ae08060c0f009b00ff7f03e3f70000000000e2ffca1b4e2906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e32ef568027802600123d000200789977a0bdad446b9bbc7a46e39882d3f868fecea4e455", 0x67}], 0x1}, 0x8004) [ 546.964789][T28165] Dead loop on virtual device ip6_vti0, fix it urgently! 05:52:22 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0xa, [@datasec={0x8, 0x2, 0x0, 0xf, 0xfffffffe, [{0x0, 0x4, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x4a, 0xf9, 0x8}, 0x20) 05:52:23 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/40, 0x2a}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 547.144230][T28173] BPF: type_id=0 offset=4 size=4294967292 [ 547.175070][T28173] BPF: [ 547.191650][T28173] BPF:Invalid type_id [ 547.221369][T28173] BPF: [ 547.221369][T28173] [ 547.234286][T28176] Dead loop on virtual device ip6_vti0, fix it urgently! 05:52:23 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x800000, 0x4, 0x1}, 0x40) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) 05:52:23 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:23 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000040)="89000000120081ae08060c0f009b00ff7f03e3f70000000000e2ffca1b4e2906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e32ef568027802600123d000200789977a0bdad446b9bbc7a46e39882d3f868fecea4e455", 0x67}], 0x1}, 0x8004) [ 547.665361][T28189] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 547.689011][T28189] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 05:52:23 executing program 1: socketpair(0x0, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000001980)={0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000280)="d7d094de9af42a2e00ccecdddac8030bec25774cdb", 0x15}, {&(0x7f0000000380)="162ad740f39668802232088064efc8af88350c7a3cfb133c7b8e0899e756d27499427c91d2c6e395f6cc7cec8bd2fb1a8bf65a3cfe38a9c485919c647045cd5802c5353eb775911dcaa1e47ea02e65e41f3f1464bd56c88a24557571d1d9cd7f5fdb9774361552fa7d1605ff610669ea8b92769074441c8ff7424ac0690b2cd49d7464438b0cebdc6f8a8a3ea7d2abf074ab6c35b7ac87d84691", 0x9a}, {&(0x7f0000000480)="851b7d4ccb90d56b27ac4dea352ffc09691ff019a776ab3f16ea1f908c713ffa92dbc4afed5ad8a87cd7667b73ae84e45a1810523640e71979d2e8e4446d2987da495a9a9b20d18644724da5dd5fe4dd7aaa9ad09bd2d8c601fc487e29f567259dcde95fef573816f9150cd1d314e334b0ac8f7a941b3c29e22bd79e3699b72a6a254721a88da1730b5ca3cd2c8b1f7dc6e3436281aee6211f2192781b1ad36e980a66bff0c5e4e2cc5e6a00bf1690e27eafa216277cdbef79c40a1a2d632fedf5d990573890bf403a56f68d1a584b1dd064a627191a8b7711ae8a96", 0xdc}, {&(0x7f0000000580)="23920e00b131ef8f2561a4cd6c5abbe41c5b13a1bd72bde21e3c2eb2d813c786e92ebbbd751958514712f4bc8b6f9be0c095045a28", 0x35}, {&(0x7f00000005c0)="6c8d40d69f9e5b88a951fad59193c1b91cd3aa492c21299d0cea874c64dc965d02fe48f5ec52e297e868371de6c170eb31b7418c66712cce56ca8a5a7a58d688a701675f7821c5ff6398a048993ef8f565f772ffb9f54a7577c25eb113193aa8e9c16fee39908e8164ed903a7ce486a55ea4251ea72a7f25f6a0ab9f37b4340d5ad58c7e7083169dff1b33168c80154a4f934507f7ad369c1552e46811c0f92c2e5a44e84eda6418c5cded67707258fae73c23adc81fb5a5", 0xb8}, {0x0}], 0x6, &(0x7f0000000940)}, 0x24040850) sendmsg(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x32e8}, 0x45) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0xe100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x5e2c, 0x200, 0xffff, 0x0, 0x2, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x10, 0x2, 0x0) socket$kcm(0x11, 0x200000000000002, 0x300) r1 = socket$kcm(0x11, 0x200000000000002, 0x300) recvmsg(r1, &(0x7f0000007500)={&(0x7f0000006f80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, 0x0, 0x0, 0xffffffffffffffff}, 0x0) r2 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r2, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x2a}, @dev}}}], 0x20}, 0x0) recvmsg(r0, &(0x7f00000007c0)={&(0x7f0000000740)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0xfffffeff, 0x0, 0x0, 0xffffffffffffffff}, 0x100) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x10, 0x2, 0x10) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r4, 0x2402, 0xe43) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="e03f030029000505d25a80308c63940d0424fc60100002400a000a00053582c137153e37040c188000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 05:52:23 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0xa, [@datasec={0x8, 0x2, 0x0, 0xf, 0xfffffffe, [{0x0, 0x4, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x4a, 0xf9, 0x8}, 0x20) 05:52:23 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/40, 0x2a}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:52:23 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000040)="89000000120081ae08060c0f009b00ff7f03e3f70000000000e2ffca1b4e2906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e32ef568027802600123d000200789977a0bdad446b9bbc7a46e39882d3f868fecea4e455366883b180e02d5c5568c4324f72cbeb13", 0x78}], 0x1}, 0x8004) 05:52:23 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:23 executing program 4: perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x800000, 0x4, 0x1}, 0x40) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) [ 547.883622][T28210] Dead loop on virtual device ip6_vti0, fix it urgently! [ 547.891070][T28211] BPF: type_id=0 offset=4 size=4294967292 05:52:23 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000040)="89000000120081ae08060c0f009b00ff7f03e3f70000000000e2ffca1b4e2906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e32ef568027802600123d000200789977a0bdad446b9bbc7a46e39882d3f868fecea4e455366883b180e02d5c5568c4324f72cbeb13", 0x78}], 0x1}, 0x8004) 05:52:23 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:23 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/40, 0x2a}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 547.961411][T28211] BPF: [ 547.980366][T28211] BPF:Invalid type_id [ 548.005073][T28211] BPF: [ 548.005073][T28211] 05:52:24 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000040)="89000000120081ae08060c0f009b00ff7f03e3f70000000000e2ffca1b4e2906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e32ef568027802600123d000200789977a0bdad446b9bbc7a46e39882d3f868fecea4e455366883b180e02d5c5568c4324f72cbeb13", 0x78}], 0x1}, 0x8004) 05:52:24 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0xa, [@datasec={0x8, 0x2, 0x0, 0xf, 0xfffffffe, [{0x0, 0x4, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x4a, 0xf9, 0x8}, 0x20) 05:52:24 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) [ 548.097307][T28218] Dead loop on virtual device ip6_vti0, fix it urgently! [ 548.224855][T28225] BPF: type_id=0 offset=4 size=4294967292 [ 548.259665][T28225] BPF: [ 548.280173][T28225] BPF:Invalid type_id [ 548.297357][T28225] BPF: [ 548.297357][T28225] [ 548.645909][T28232] netlink: 'syz-executor.1': attribute type 11 has an invalid length. [ 548.655626][T28232] netlink: 209848 bytes leftover after parsing attributes in process `syz-executor.1'. 05:52:24 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000040)="89000000120081ae08060c0f009b00ff7f03e3f70000000000e2ffca1b4e2906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e32ef568027802600123d000200789977a0bdad446b9bbc7a46e39882d3f868fecea4e455366883b180e02d5c5568c4324f72cbeb13ad14955f947ee2b49e", 0x81}], 0x1}, 0x8004) 05:52:24 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/40, 0x2a}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:52:24 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x894a, &(0x7f0000000040)={'macsec0\x00', @ifru_map}) 05:52:24 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x800000, 0x4, 0x1}, 0x40) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 05:52:24 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0xa, [@datasec={0x8, 0x2, 0x0, 0xf, 0xfffffffe, [{0x3, 0x0, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x4a, 0xf9, 0x8}, 0x20) 05:52:24 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:24 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/40, 0x2a}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:52:24 executing program 5: mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:24 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000040)="89000000120081ae08060c0f009b00ff7f03e3f70000000000e2ffca1b4e2906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e32ef568027802600123d000200789977a0bdad446b9bbc7a46e39882d3f868fecea4e455366883b180e02d5c5568c4324f72cbeb13ad14955f947ee2b49e", 0x81}], 0x1}, 0x8004) [ 548.831694][T28255] BPF: type_id=243 offset=0 size=783 [ 548.844071][T28255] BPF: [ 548.850754][T28255] BPF:Invalid offset [ 548.867854][T28255] BPF: [ 548.867854][T28255] 05:52:24 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0xa, [@datasec={0x8, 0x2, 0x0, 0xf, 0xfffffffe, [{0x3, 0x0, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x4a, 0xf9, 0x8}, 0x20) 05:52:24 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 05:52:24 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/40, 0x2a}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:52:25 executing program 5: mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:25 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000040)="89000000120081ae08060c0f009b00ff7f03e3f70000000000e2ffca1b4e2906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e32ef568027802600123d000200789977a0bdad446b9bbc7a46e39882d3f868fecea4e455366883b180e02d5c5568c4324f72cbeb13ad14955f947ee2b49e", 0x81}], 0x1}, 0x8004) [ 549.053010][T28266] BPF: type_id=243 offset=0 size=783 [ 549.087515][T28266] BPF: [ 549.121492][T28266] BPF:Invalid offset [ 549.140444][T28266] BPF: [ 549.140444][T28266] 05:52:25 executing program 1: bpf$BPF_LINK_UPDATE(0xe, &(0x7f0000000040), 0xf) 05:52:25 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 05:52:25 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/40, 0x2a}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:52:25 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0xa, [@datasec={0x8, 0x2, 0x0, 0xf, 0xfffffffe, [{0x3, 0x0, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x4a, 0xf9, 0x8}, 0x20) 05:52:25 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000040)="89000000120081ae08060c0f009b00ff7f03e3f70000000000e2ffca1b4e2906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e32ef568027802600123d000200789977a0bdad446b9bbc7a46e39882d3f868fecea4e455366883b180e02d5c5568c4324f72cbeb13ad14955f947ee2b49e3b6f8afa", 0x85}], 0x1}, 0x8004) 05:52:25 executing program 5: mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) [ 549.357714][T28287] BPF: type_id=243 offset=0 size=783 [ 549.376865][T28287] BPF: [ 549.388181][T28287] BPF:Invalid offset 05:52:25 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) [ 549.423472][T28287] BPF: [ 549.423472][T28287] 05:52:25 executing program 5: mkdir(0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:25 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000040)="89000000120081ae08060c0f009b00ff7f03e3f70000000000e2ffca1b4e2906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e32ef568027802600123d000200789977a0bdad446b9bbc7a46e39882d3f868fecea4e455366883b180e02d5c5568c4324f72cbeb13ad14955f947ee2b49e3b6f8afa", 0x85}], 0x1}, 0x8004) 05:52:25 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/40, 0x2a}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:52:25 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0xa, [@datasec={0x8, 0x2, 0x0, 0xf, 0xfffffffe, [{0x3, 0x4}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x4a, 0xf9, 0x8}, 0x20) 05:52:25 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000040)="89000000120081ae08060c0f009b00ff7f03e3f70000000000e2ffca1b4e2906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e32ef568027802600123d000200789977a0bdad446b9bbc7a46e39882d3f868fecea4e455366883b180e02d5c5568c4324f72cbeb13ad14955f947ee2b49e3b6f8afa", 0x85}], 0x1}, 0x8004) [ 549.613350][T28303] BPF: type_id=3 offset=4 size=0 [ 549.630922][T28303] BPF: [ 549.638889][T28303] BPF:Invalid size [ 549.663199][T28303] BPF: [ 549.663199][T28303] 05:52:25 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{}, {}]}]}, {0x0, [0x0]}}, &(0x7f0000000300)=""/241, 0x37, 0xf1, 0x1}, 0x20) 05:52:25 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x800000, 0x4, 0x1}, 0x40) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 05:52:25 executing program 0: r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/40, 0x2a}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:52:25 executing program 5: mkdir(0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:25 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000040)="89000000120081ae08060c0f009b00ff7f03e3f70000000000e2ffca1b4e2906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e32ef568027802600123d000200789977a0bdad446b9bbc7a46e39882d3f868fecea4e455366883b180e02d5c5568c4324f72cbeb13ad14955f947ee2b49e3b6f8afa020d", 0x87}], 0x1}, 0x8004) 05:52:25 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0xa, [@datasec={0x8, 0x2, 0x0, 0xf, 0xfffffffe, [{0x3, 0x4}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x4a, 0xf9, 0x8}, 0x20) 05:52:25 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000040)="89000000120081ae08060c0f009b00ff7f03e3f70000000000e2ffca1b4e2906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e32ef568027802600123d000200789977a0bdad446b9bbc7a46e39882d3f868fecea4e455366883b180e02d5c5568c4324f72cbeb13ad14955f947ee2b49e3b6f8afa020d", 0x87}], 0x1}, 0x8004) 05:52:25 executing program 0: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/40, 0x2a}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 549.879751][T28320] BPF: type_id=3 offset=4 size=0 [ 549.901546][T28320] BPF: [ 549.912521][T28320] BPF:Invalid size [ 549.925931][T28320] BPF: 05:52:25 executing program 5: mkdir(0x0, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:25 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x800000, 0x4, 0x1}, 0x40) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) [ 549.925931][T28320] 05:52:25 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x800000, 0x4, 0x1}, 0x40) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 05:52:25 executing program 0: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/40, 0x2a}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:52:26 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000040)="89000000120081ae08060c0f009b00ff7f03e3f70000000000e2ffca1b4e2906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e32ef568027802600123d000200789977a0bdad446b9bbc7a46e39882d3f868fecea4e455366883b180e02d5c5568c4324f72cbeb13ad14955f947ee2b49e3b6f8afa020d", 0x87}], 0x1}, 0x8004) 05:52:26 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0xa, [@datasec={0x8, 0x2, 0x0, 0xf, 0xfffffffe, [{0x3, 0x4}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x4a, 0xf9, 0x8}, 0x20) 05:52:26 executing program 0: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/40, 0x2a}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:52:26 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x3, 0x4c00}]}, {0x0, [0x61]}}, &(0x7f0000000300)=""/241, 0x2b, 0xf1, 0x1}, 0x20) 05:52:26 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x0, 0x4, 0x1}, 0x40) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) [ 550.231219][T28348] BPF: type_id=3 offset=4 size=0 05:52:26 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x0, 0x4, 0x1}, 0x40) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 05:52:26 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/40, 0x2a}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:52:26 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000040)="89000000120081ae08060c0f009b00ff7f03e3f70000000000e2ffca1b4e2906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e32ef568027802600123d000200789977a0bdad446b9bbc7a46e39882d3f868fecea4e455366883b180e02d5c5568c4324f72cbeb13ad14955f947ee2b49e3b6f8afa020d23", 0x88}], 0x1}, 0x8004) [ 550.272482][T28348] BPF: [ 550.285959][T28348] BPF:Invalid size [ 550.306829][T28348] BPF: [ 550.306829][T28348] 05:52:26 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:26 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/40, 0x2a}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:52:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x9, [@datasec={0x8, 0x1, 0x0, 0xf, 0x1, [{0x3, 0x4, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000380)=""/249, 0x49, 0xf9, 0x8}, 0x20) 05:52:26 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x0, 0x4, 0x1}, 0x40) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) [ 550.495411][T28362] BPF:[1] DATASEC [ 550.507445][T28362] BPF:size=1 vlen=1 [ 550.527894][T28362] BPF: [ 550.540905][T28362] BPF:Invalid name [ 550.558028][T28362] BPF: [ 550.558028][T28362] 05:52:26 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x0, @private}, 0x10, 0x0}, 0x0) 05:52:26 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000040)="89000000120081ae08060c0f009b00ff7f03e3f70000000000e2ffca1b4e2906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e32ef568027802600123d000200789977a0bdad446b9bbc7a46e39882d3f868fecea4e455366883b180e02d5c5568c4324f72cbeb13ad14955f947ee2b49e3b6f8afa020d23", 0x88}], 0x1}, 0x8004) 05:52:26 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/40, 0x2a}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:52:26 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, 0x0, &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:26 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x800000, 0x0, 0x1}, 0x40) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 05:52:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x9, [@datasec={0x8, 0x1, 0x0, 0xf, 0x1, [{0x3, 0x4, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000380)=""/249, 0x49, 0xf9, 0x8}, 0x20) [ 550.718594][T28376] BPF:[1] DATASEC [ 550.736166][T28376] BPF:size=1 vlen=1 [ 550.753739][T28376] BPF: 05:52:26 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000040)="89000000120081ae08060c0f009b00ff7f03e3f70000000000e2ffca1b4e2906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e32ef568027802600123d000200789977a0bdad446b9bbc7a46e39882d3f868fecea4e455366883b180e02d5c5568c4324f72cbeb13ad14955f947ee2b49e3b6f8afa020d23", 0x88}], 0x1}, 0x8004) 05:52:26 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) [ 550.766487][T28376] BPF:Invalid name [ 550.786223][T28376] BPF: [ 550.786223][T28376] 05:52:26 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x800000, 0x0, 0x1}, 0x40) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 05:52:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x9, [@datasec={0x8, 0x1, 0x0, 0xf, 0x1, [{0x3, 0x4, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000380)=""/249, 0x49, 0xf9, 0x8}, 0x20) 05:52:26 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000040)="89000000120081ae08060c0f009b00ff7f03e3f70000000000e2ffca1b4e2906a6bd7c493872f750375ed08a56331dbf64700169381ad6e747033a0093b837dc6cc01e32ef568027802600123d000200789977a0bdad446b9bbc7a46e39882d3f868fecea4e455366883b180e02d5c5568c4324f72cbeb13ad14955f947ee2b49e3b6f8afa020d2347", 0x89}], 0x1}, 0x0) [ 550.929064][T28389] BPF:[1] DATASEC 05:52:26 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/40, 0x2a}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 550.953318][T28389] BPF:size=1 vlen=1 [ 550.960734][T28389] BPF: [ 550.964327][T28389] BPF:Invalid name [ 550.968450][T28389] BPF: [ 550.968450][T28389] 05:52:27 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x48, r1, 0x1, 0x0, 0x0, {}, [{{@pci={{0x8}, {0x11}}, {0x8}}, {0x8}, {0x6}}]}, 0x48}}, 0x0) 05:52:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0xa, [@datasec={0x8, 0x2, 0x0, 0xf, 0xfffffffe, [{0x3, 0x4, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000380)=""/249, 0x4a, 0xf9, 0x8}, 0x20) 05:52:27 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x7, 0x0, 0x0, 0x0, 0x90}, 0x40) 05:52:27 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/40, 0x2a}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:52:27 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x800000, 0x0, 0x1}, 0x40) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 05:52:27 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:27 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000440)={&(0x7f0000000000)={0x2, 0x4e22, @private}, 0x10, 0x0, 0x0, &(0x7f0000000240)=[@ip_ttl={{0x14, 0x0, 0x7}}], 0x18}, 0x0) [ 551.339835][T28412] BPF:[1] DATASEC [ 551.352250][T28412] BPF:size=4294967294 vlen=2 [ 551.368628][T28412] BPF: [ 551.385801][T28412] BPF:Invalid name 05:52:27 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/40, 0x2a}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 551.397289][T28412] BPF: [ 551.397289][T28412] 05:52:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0xa, [@datasec={0x8, 0x2, 0x0, 0xf, 0xfffffffe, [{0x3, 0x4, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000380)=""/249, 0x4a, 0xf9, 0x8}, 0x20) 05:52:27 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:27 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/40, 0x2a}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:52:27 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x800000, 0x4, 0x1}, 0x40) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) [ 551.559404][T28423] BPF:[1] DATASEC [ 551.569461][T28423] BPF:size=4294967294 vlen=2 [ 551.590234][T28423] BPF: [ 551.602957][T28423] BPF:Invalid name [ 551.615137][T28423] BPF: [ 551.615137][T28423] 05:52:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0xa, [@datasec={0x8, 0x2, 0x0, 0xf, 0xfffffffe, [{0x3, 0x4, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000380)=""/249, 0x4a, 0xf9, 0x8}, 0x20) 05:52:27 executing program 1: syz_emit_ethernet(0xfdef, &(0x7f0000000080)={@remote, @random="3e3bc983cfcf", @void, {@ipv4={0x800, @igmp={{0x8, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2, 0x0, @local, @dev, {[@timestamp_prespec={0x44, 0x4}, @ra={0x94, 0x4}, @generic={0x0, 0x2}]}}, {0x0, 0x0, 0x0, @local}}}}}, 0x0) 05:52:27 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:27 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/40, 0x2a}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:52:27 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x800000, 0x4, 0x1}, 0x40) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 05:52:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xf) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000007d40)={&(0x7f0000007c80)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000007d00)={0x0}}, 0x0) 05:52:27 executing program 2: bpf$BPF_LINK_UPDATE(0x16, 0x0, 0x0) 05:52:27 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/40, 0x2a}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 552.015328][T28452] BPF:[1] DATASEC [ 552.027341][T28452] BPF:size=4294967294 vlen=2 [ 552.043477][T28452] BPF: [ 552.051480][T28452] BPF:Invalid name 05:52:28 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) [ 552.067255][T28452] BPF: [ 552.067255][T28452] 05:52:28 executing program 2: bpf$BPF_LINK_UPDATE(0x2, &(0x7f0000000040), 0xf) 05:52:28 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x800000, 0x4, 0x1}, 0x40) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) 05:52:28 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/40, 0x2a}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:52:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x9, [@datasec={0x8, 0x1, 0x0, 0xf, 0x1, [{0x3, 0x4, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x49, 0xf9, 0x8}, 0x20) [ 552.223139][T28466] BPF:[1] DATASEC [ 552.232432][T28466] BPF:size=1 vlen=1 [ 552.240280][T28466] BPF: [ 552.254646][T28466] BPF:Invalid name [ 552.268258][T28466] BPF: [ 552.268258][T28466] [ 552.279967][T28470] Dead loop on virtual device ip6_vti0, fix it urgently! 05:52:28 executing program 1: bpf$BPF_LINK_UPDATE(0x3, 0x0, 0x0) 05:52:28 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:28 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg(r0, &(0x7f0000003700)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000c00)=[{0x10, 0x1, 0x2}], 0x10}}], 0x2, 0x0) 05:52:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x9, [@datasec={0x8, 0x1, 0x0, 0xf, 0x1, [{0x3, 0x4, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x49, 0xf9, 0x8}, 0x20) 05:52:28 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/40, 0x2a}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:52:28 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x800000, 0x4, 0x1}, 0x40) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) [ 552.506650][T28483] BPF:[1] DATASEC [ 552.516231][T28484] Dead loop on virtual device ip6_vti0, fix it urgently! [ 552.523993][T28483] BPF:size=1 vlen=1 [ 552.528103][T28483] BPF: [ 552.531149][T28483] BPF:Invalid name [ 552.545969][T28483] BPF: [ 552.545969][T28483] 05:52:28 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/40, 0x2a}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:52:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x3, 0x7}]}, {0x0, [0x61]}}, &(0x7f0000000300)=""/241, 0x2b, 0xf1, 0x1}, 0x20) 05:52:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x9, [@datasec={0x8, 0x1, 0x0, 0xf, 0x1, [{0x3, 0x4, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x49, 0xf9, 0x8}, 0x20) 05:52:28 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:28 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x800000, 0x4, 0x1}, 0x40) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) [ 552.676195][T28490] Dead loop on virtual device ip6_vti0, fix it urgently! [ 552.693753][T28492] BPF:[1] DATASEC [ 552.706614][T28492] BPF:size=1 vlen=1 05:52:28 executing program 2: r0 = socket(0x200000100000011, 0x803, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000000c0)={'batadv0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @remote}, 0x14) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[], 0x120) [ 552.724552][T28492] BPF: [ 552.734071][T28492] BPF:Invalid name [ 552.749130][T28492] BPF: [ 552.749130][T28492] 05:52:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xc) syz_genetlink_get_family_id$SEG6(&(0x7f0000000000), r0) 05:52:28 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/40, 0x2a}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:52:28 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x9, [@datasec={0x8, 0x1, 0x0, 0xf, 0x1, [{0x3, 0x4, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x49, 0xf9, 0x8}, 0x20) 05:52:28 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x800000, 0x4, 0x1}, 0x40) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) 05:52:28 executing program 2: bpf$BPF_LINK_UPDATE(0x6, &(0x7f0000000040), 0xf) [ 553.058225][T28517] BPF:[1] DATASEC [ 553.068621][T28517] BPF:size=1 vlen=1 [ 553.078738][T28515] Dead loop on virtual device ip6_vti0, fix it urgently! [ 553.101747][T28517] BPF: [ 553.117178][T28517] BPF:Invalid name 05:52:29 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/40, 0x2a}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:52:29 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, 0x0, 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) [ 553.140278][T28517] BPF: [ 553.140278][T28517] 05:52:29 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x800000, 0x4, 0x1}, 0x40) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) 05:52:29 executing program 2: r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_ORIGINATORS(r1, &(0x7f0000001380)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000001340)={0x0}}, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r1, 0x8982, &(0x7f0000000000)={0x0, 'batadv_slave_0\x00', {0x1}, 0x61}) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x8, 0x0, &(0x7f0000000100)) 05:52:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x9, [@datasec={0x8, 0x1, 0x0, 0xf, 0x1, [{0x3, 0x4, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x49, 0xf9, 0x8}, 0x20) [ 553.243231][T28523] Dead loop on virtual device ip6_vti0, fix it urgently! 05:52:29 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/40, 0x2a}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 553.296007][T28532] BPF:[1] DATASEC [ 553.301034][T28529] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 553.311447][T28532] BPF:size=1 vlen=1 [ 553.329382][T28532] BPF: [ 553.344905][T28532] BPF:Invalid name [ 553.360496][T28532] BPF: [ 553.360496][T28532] [ 553.361126][T28529] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 553.401614][T28529] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 553.433056][T28540] Dead loop on virtual device ip6_vti0, fix it urgently! [ 553.444097][T28529] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 553.462669][T28529] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 553.486853][T28529] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 553.503380][T28529] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 553.528940][T28529] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 553.544052][T28529] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 553.564091][T28529] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 05:52:29 executing program 1: bpf$BPF_LINK_UPDATE(0x1b, 0x0, 0x0) 05:52:29 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x800000, 0x4, 0x1}, 0x40) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) 05:52:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x9, [@datasec={0x8, 0x1, 0x0, 0xf, 0x1, [{0x3, 0x4, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x49, 0xf9, 0x8}, 0x20) 05:52:29 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:29 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/40, 0x2a}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:52:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@fwd={0x1}]}, {0x0, [0x5f, 0x636fe57ca2ae3998]}}, &(0x7f0000000040)=""/233, 0x28, 0xe9, 0x1}, 0x20) [ 553.834317][T28558] BPF:[1] DATASEC [ 553.843197][T28557] Dead loop on virtual device ip6_vti0, fix it urgently! [ 553.843434][T28558] BPF:size=1 vlen=1 05:52:29 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet(0x2, 0x3, 0x5) setsockopt$inet_msfilter(r1, 0x0, 0x8, &(0x7f0000000340)=ANY=[@ANYBLOB="cb"], 0x1) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @local}, &(0x7f00000001c0)=0xc) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002b80)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {}, {0xc}}, [@filter_kind_options=@f_basic={{0xa}, {0xc, 0x2, [@TCA_BASIC_CLASSID={0x8}]}}]}, 0x3c}}, 0x0) [ 553.903922][T28558] BPF: 05:52:29 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/40, 0x2a}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 553.930923][T28558] BPF:Invalid name 05:52:29 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x800000, 0x4, 0x1}, 0x40) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) [ 553.964815][T28558] BPF: [ 553.964815][T28558] 05:52:29 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x9, [@datasec={0x8, 0x1, 0x0, 0xf, 0x1, [{0x3, 0x4, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x49, 0xf9, 0x8}, 0x20) 05:52:30 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000040)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private0}}) [ 554.059062][T28572] Dead loop on virtual device ip6_vti0, fix it urgently! [ 554.127274][T28578] BPF:[1] DATASEC [ 554.140726][T28578] BPF:size=1 vlen=1 [ 554.151020][T28578] BPF: [ 554.163039][T28578] BPF:Invalid name [ 554.174470][T28578] BPF: [ 554.174470][T28578] 05:52:30 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x8, 0x3, &(0x7f0000000040)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r0, 0xc0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) 05:52:30 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/40, 0x2a}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:52:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000e00), 0xffffffffffffffff) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000001b00)={0x0, 0x0, &(0x7f0000001ac0)={&(0x7f00000012c0)={0x60, r1, 0x501, 0x0, 0x0, {}, [{{0x8}, {0x44, 0x2, 0x0, 0x1, [{0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}]}, 0x60}}, 0x0) 05:52:30 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x800000, 0x4, 0x1}, 0x40) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x0) 05:52:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x9, [@datasec={0x8, 0x1, 0x0, 0xf, 0x1, [{0x3, 0x4, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x49, 0xf9, 0x8}, 0x20) 05:52:30 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) [ 554.387902][T28595] Dead loop on virtual device ip6_vti0, fix it urgently! [ 554.402879][T28596] BPF:[1] DATASEC [ 554.406716][T28596] BPF:size=1 vlen=1 [ 554.410526][T28596] BPF: 05:52:30 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/40, 0x2a}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 554.484073][T28596] BPF:Invalid name 05:52:30 executing program 2: perf_event_open$cgroup(&(0x7f00000002c0)={0x2, 0x80, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 05:52:30 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) [ 554.513974][T28596] BPF: [ 554.513974][T28596] 05:52:30 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x800000, 0x4, 0x1}, 0x40) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x0) 05:52:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x9, [@datasec={0x8, 0x1, 0x0, 0xf, 0x1, [{0x3, 0x4, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x49, 0xf9, 0x8}, 0x20) [ 554.584860][T28604] Dead loop on virtual device ip6_vti0, fix it urgently! 05:52:30 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/40, 0x2a}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 554.691263][T28611] BPF:[1] DATASEC [ 554.708589][T28611] BPF:size=1 vlen=1 [ 554.740831][T28611] BPF: [ 554.749479][T28611] BPF:Invalid name [ 554.759409][T28611] BPF: [ 554.759409][T28611] 05:52:30 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:30 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x40) 05:52:30 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000100)="1400000052008102a00f80854a36b8ab959916fb", 0x14}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000002c00)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000000280)={&(0x7f0000000000)=@sco={0x1f, @fixed}, 0x80, &(0x7f00000000c0)=[{0x0}], 0x1, &(0x7f00000001c0)=""/139, 0x8b}, 0x0) recvmsg$kcm(r0, &(0x7f0000001b40)={0x0, 0x0, 0x0}, 0x0) 05:52:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x9, [@datasec={0x8, 0x1, 0x0, 0xf, 0x1, [{0x3, 0x4, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x49, 0xf9, 0x8}, 0x20) 05:52:30 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1b, 0x0, 0x0, 0x800000, 0x4, 0x1}, 0x40) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x0) 05:52:30 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x0) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/40, 0x2a}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 555.020208][T28631] BPF:[1] DATASEC [ 555.035085][T28631] BPF:size=1 vlen=1 [ 555.051323][T28631] BPF: [ 555.063505][T28631] BPF:Invalid name 05:52:31 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/40, 0x2a}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:52:31 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) [ 555.079676][T28631] BPF: [ 555.079676][T28631] 05:52:31 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000100)="1400000052008102a00f80854a36b8ab959916fb", 0x14}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000002c00)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000000280)={&(0x7f0000000000)=@sco={0x1f, @fixed}, 0x80, &(0x7f00000000c0)=[{0x0}], 0x1, &(0x7f00000001c0)=""/139, 0x8b}, 0x0) recvmsg$kcm(r0, &(0x7f0000001b40)={0x0, 0x0, 0x0}, 0x0) 05:52:31 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/40, 0x2a}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:52:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x9, [@datasec={0x8, 0x1, 0x0, 0xf, 0x1, [{0x3, 0x4, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x49, 0xf9, 0x8}, 0x20) 05:52:31 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:31 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000100)="1400000052008102a00f80854a36b8ab959916fb", 0x14}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000002c00)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000000280)={&(0x7f0000000000)=@sco={0x1f, @fixed}, 0x80, &(0x7f00000000c0)=[{0x0}], 0x1, &(0x7f00000001c0)=""/139, 0x8b}, 0x0) recvmsg$kcm(r0, &(0x7f0000001b40)={0x0, 0x0, 0x0}, 0x0) [ 555.292725][T28647] BPF:[1] DATASEC [ 555.309432][T28647] BPF:size=1 vlen=1 [ 555.321487][T28647] BPF: [ 555.332612][T28647] BPF:Invalid name [ 555.352612][T28647] BPF: [ 555.352612][T28647] 05:52:31 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x8, 0x3, &(0x7f0000000040)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x15, 0x1, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x5, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x78) 05:52:31 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000100)="1400000052008102a00f80854a36b8ab959916fb", 0x14}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000002c00)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000000280)={&(0x7f0000000000)=@sco={0x1f, @fixed}, 0x80, &(0x7f00000000c0)=[{0x0}], 0x1, &(0x7f00000001c0)=""/139, 0x8b}, 0x0) recvmsg$kcm(r0, &(0x7f0000001b40)={0x0, 0x0, 0x0}, 0x0) 05:52:31 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/40, 0x2a}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:52:31 executing program 4: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000100)="1400000052008102a00f80854a36b8ab959916fb", 0x14}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000002c00)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000000280)={&(0x7f0000000000)=@sco={0x1f, @fixed}, 0x80, &(0x7f00000000c0)=[{0x0}], 0x1, &(0x7f00000001c0)=""/139, 0x8b}, 0x0) recvmsg$kcm(r0, &(0x7f0000001b40)={0x0, 0x0, 0x0}, 0x0) 05:52:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x9, [@datasec={0x8, 0x1, 0x0, 0xf, 0x1, [{0x3, 0x4, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x49, 0xf9, 0x8}, 0x20) 05:52:31 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:31 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001440)={0x18, 0x5, &(0x7f0000000080)=@raw=[@func, @map, @map], &(0x7f00000000c0)='GPL\x00', 0x2, 0x1000, &(0x7f0000000340)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:52:31 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, 0x0, 0x0) [ 555.619675][T28669] BPF:[1] DATASEC [ 555.631130][T28669] BPF:size=1 vlen=1 [ 555.641910][T28669] BPF: [ 555.648435][T28669] BPF:Invalid name [ 555.659403][T28669] BPF: [ 555.659403][T28669] 05:52:31 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xdd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000100)="1400000052008102a00f80854a36b8ab959916fb", 0x14}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000002c00)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000000280)={&(0x7f0000000000)=@sco={0x1f, @fixed}, 0x80, &(0x7f00000000c0)=[{0x0}], 0x1, &(0x7f00000001c0)=""/139, 0x8b}, 0x0) recvmsg$kcm(r0, &(0x7f0000001b40)={0x0, 0x0, 0x0}, 0x0) 05:52:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x9, [@datasec={0x8, 0x1, 0x0, 0xf, 0x1, [{0x3, 0x4, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x49, 0xf9, 0x8}, 0x20) 05:52:31 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, 0x0, 0x0) 05:52:31 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) [ 555.866789][T28684] BPF:[1] DATASEC [ 555.886480][T28684] BPF:size=1 vlen=1 [ 555.902147][T28684] BPF: [ 555.909620][T28684] BPF:Invalid name [ 555.931187][T28684] BPF: [ 555.931187][T28684] 05:52:31 executing program 1: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000002740)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @private1}, 0x80, &(0x7f00000025c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 05:52:31 executing program 4: perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc8440, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:52:31 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000240)={&(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{}, 0x3}}, 0x10, 0x0}, 0x0) 05:52:31 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, 0x0, 0x0) 05:52:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x9, [@datasec={0x8, 0x1, 0x0, 0xf, 0x1, [{0x3, 0x4, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x49, 0xf9, 0x8}, 0x20) 05:52:31 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) [ 556.086256][T28700] BPF:[1] DATASEC [ 556.118223][T28700] BPF:size=1 vlen=1 05:52:32 executing program 4: perf_event_open$cgroup(&(0x7f00000002c0)={0x2, 0x80, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 05:52:32 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/40, 0x28}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 556.140856][T28700] BPF: 05:52:32 executing program 2: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000002740)={&(0x7f0000000080)=@in6={0xa, 0x0, 0x0, @private1}, 0x80, &(0x7f00000025c0)=[{&(0x7f0000000100)="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", 0x1000}, {&(0x7f0000002a40)="83395ca72f87315c4f15623af31eb6300b6d6827f438938e6eb2ed8cecf3ae49507280864304a0bead03610892b6bfbea03b6286fd7325a92480fe7cdfee56a9fda5c3b036ef1b9743a78ad165eb4d6b1130dbbda469c4191cc17d215177b0f93d5bc466972f302671f39ad3d9e3dff2df3b8618906b3108778847c3cf848b66e4cfbffb05c3abfc7626b0a7a074e4b19fe76aee13db4285b48de4ab35956ca676fd3bde75e2db93dd9880295c0bf1c96972570578bf9c33af463c2685b9e668313e4a54f48757d59cbcb3de14c0aa18000966e2d061b5b7a6273bff0f234abd4c1f98be8d41d199373125", 0xeb}, {&(0x7f0000001200)="1a9a787bfc140aacabe17b0f2e6181e73069cf3fe1641d0bb7ab66972296f509f043eab7", 0x24}, {&(0x7f0000001240)="1eedbc9a342a40defb8d5d21ff50ecf4471b3f42a8dc155847f50bfd00e5d1a0dc46d6945046d8d8d2f761f42fb9e22250a5d450426a289c7c83f357f2d2a7f18e9dae8c652df4411ddc736ef037ee7efe2c8ed9032669ed8d080aa74f07c15f2b89d36f88027ddbd867da6b2755faca45230421bde295316ade9b2daca7c9f757c7cf188621bfe33f072e4d5be73a249aa0c2afe5c993c9886ba77e843f7ce31905bcf553a28d00448ce49d40c8bf40d5e930575eb2786bbb4add859d15825119b344c6196a50e40f894779dc66", 0xce}, {&(0x7f0000001340)="9049b0f175568d5ced7cf67e8cba5d492ab761922fc7db067d559d067de798ba0e605a08fac051578b294ab3d5d9b1189c7f25c2ffe1d35b41845b0d40f99bee1e331da061c12cc84215e978c09464de64050cc82aef7ac9eac2abcd0741f268925144b64d9ccc8eca1b95f4030339a1d0046799650c7b3b105ff0e2ff164e025862817c259999f70f997908c8bb28dba55c160b60767e4fc8fc285e7f132ec7527d0b0217712fc96554ce1971a66c4bcb6608c1", 0xb4}, {&(0x7f0000002980)="93737052ec6a47055adec4423d304640e1bbe61da404e5e0e74bd6b2ca7c0d3b545ad092cbef50acbed7a925b96cbe4e7d66de5b4d39051b043c805f8784236b058f23c16590f5bed83143b0f821e2d82bd358cb05424a051ab0960d5ceeec7c3d038df0db2f2ca1c8383e93a417e454c0b1b3ea09adf3e5d3988343369bd759d181e7343c7d3e4c081d143ec1f5ae280f82c73e42757137", 0x98}, {&(0x7f00000014c0)="ba7475fd7ddfa656d59491c09ecac13467c26844149464623ea8e112ed9e490d607218ce83fcf79a5a7658210ff14c369b8a2f5b166c7efa169732ce343bbef396acbd049527553099c9f4bc02441be804f320b8bd745ac5fd0d2f20ef759ee7ce52dbf043272a5a8387fc93f6111f1ba973ea180c1b86cb6224945bd5a2086b2a6f3271631c5429d7559282e30c7624dad833699b445e02209a8c4e7c3591463128374897b558d206b147034a3e085d3e421cb58e4aa1bcd0682f884c85a74acad1b80521e05a20b3b34066e5a5dc5f7bd7f0b875e8e5811230571246a6842d9135311728e1a44ef3b2c8edc8ce04f0e2f5ae0793a3af07854abfce57004de42ea912dabeb156fba3a478d026c82ff30430ca02596b5c9dd5624eee0ac98122c69789444a91e90169bb9079ccfcffa4165b3369250f26424d3050093aac7072f99b6c02b657f0da075791cebc536fdb93f76de9ccd83c3ea95a5d599b664a27b12ee29a82a8360692044f228982c6e29e1beea87e0d42c04e878b3534c71687b40f7f66531d7b76ad623be35d2d048ae75009cc6972b6ce329f10bb5e89688d2f3a4eb2b9634087609fadbb16cfb39d4949996612fd0926eb7757b34f16a5111fbad2b54802baf3a93aaf34e22b4ae988fb18f8e6ddc778c4b798204d307c8f29f7e52b0ccfb9774c028103d11d4faae7fef47f958fc0009c2cb8e3f1054f647866191a0c22c7706c153f7da78943fddc4f8beb05920a2101e6ef7dead65e3d50f31c47405cf84d78058eefb6420714c6de7bde04fb44d40a16ae754d658042dab1338c3aa7f65b7fcb6f9d1257c1ae33ef4a9412381f2f1c7dc8c8b3fe662a4f09f4ebc9722f12d23a1bfc235c9bb1e91973f62fe60a75ae74163dc0d2902754b6ea72a476a79d37a6a89a2681feb112e46a95d2d217910ee030701f1b209b36a4549ef3bea34f97275c12ff79716c8050f30c2614293e9490bf9d31b4b781ef2539dd8e3d578daee80b4ec56e314e8409d2dfd1cfce1d183d9684d7eb967459ba6d7b143b079ecd573a7b2cc45556675d6180706bd1d912d950fe38636481d31e478c35ee61c6b1e3300322fa628da6951ca864aede97d99b9e8c034fd30ecf9455adcb60b3bed5414cd523c735da1540ab922f25de0b7ecf18d4953b6f994af8f6a4c0a9493887d30477435155623888b8c630eaae7ba53e9ac69d5f3cef5846c909466834c3d3944def91e3f26a5a1a0c4e56250f0474202925c5a57f6248735ebd8819e873313feee339bf77a683871f0f81cbb9f5cd87b0e24697f3f74d7ee621edc3ad1fe99faeecc38ef7b493a48d217630fd4ca9f580f77949a0229b63ea75b45d1abb42e4b2481ff897559dddcdb8ead1fda5143a1e4015dbf6e65e046f26fc4c457c7f5421f4b1dc757dc46386d6eeca0a393edd12990594518591b60f1be4b1f23279c09567ceec00aeca6d8559893f144d3e09977f1ac70c8247794a65ab1ea288d288d080b74d395b09e78c3c8b93d877766d629a069f575fd2fa6cb861e89d2b0d00d2e9f2e5e556973e778b3481a9e56440b6f67d93b5cec852a3c5e8f75b1b91e5bc4150e15d183fe431cf9b508a36a9c31238c6ef20425e77614cab4f7388090210e067ccba4640c45162b8cdeef28adfb43b48b9025158b6145ab6772738c13c24c23a074627e69712f85a0df2c99cb26862eb29b946bd888f5694a642cf86c4f2a45414fb8a3c0e591a5cbfd2c9305921731baf1feb0c874f722e926e344bbcd545c1138d08cac99a42f814de535cafc4400fd277ac2219027995911aa1609af012127601d1d584c2362f0def87c2385dc61b856ef0d3034a1397e0ccc3364a575dee4b16918b1a591b34793cbac6690da76b4ec293157763a1789232a5cfb0e98e5e5bf5bfbd337bdc2433c2b0045efe0b4d5667b974decaad7996485bc99544d9f1e0205c63e5fa0774c78f34b62f71bf9123ef2cad9491fd2f4e0e5f78f5983600fcc936820a0a9072895bf15722d7a61bd765043e3668120c020675c58e57f88d9e1b3ada117d444465f2cd765b03c22176f79e6db0a159618fd0c55eeaa1f945de941460c9d6e67ca4aab6f0afeab749d47643fd9acce233443203091e3c5a329356a3732b97d03ee7883cbcfc9f1cdcb50bda86b1ea8805a633c7f30b9c88cf07860a50af3b78a992ddc497e192695bb3999d34c0fa77934ac9316c74817dbeb3db0bcda1bc35e49585e1fd548a6d38e4327495fb40566779f5bb0ee75dbf83e1cc87f69c4d516c82cb7082e24aee23afe18675cd4f608d17653b7099c5ccf74d043126f93853ed8ee3876561145ea0fd6268d5ad4aa626164f62bd87b0290dca7ff9133ad01c9007c684cdda909ed5575c9b30efc26b7910b468f12a0bc98b012dfd42b6c29c94b6e76ab67c85d48b436ce48c7dd7653ca08084b2329d53a37f8f36829f7f3da9ecc57988712268e96620f38bc2158236f02cb4b9008f5184031ab7074ffd84b02137bde3be5a851435e4af5988864e4765204979e1beda2422dcf27299aa4495f770d0795b6d88b2884d4393e006cf1fec6164888985e67e563dd5ac8eda56366614f98a8de79d2dde9fe7931d14eac853cad19ed2994c81c5ecfc3d2f3d396a45cd526bd3276d91fb8deea1f816e3e386242c0a72f45d652581b60b38037f6d7c9f2774ce60e151653ed835700dcf34b9511ad1bdbe03a9b78eee822fc87e1f62d015cbca2e1c78d05d957077dc48afc2ac9635b768effacb1619cfaccbe79f3cc0b9c6f0355820f3baa2dc0d633c32dc11b1fffa5576b4aca0d0ca87854b2dcbd437b324f22e7793ab3dca149cae8bb84c3d6f21a72264b39ca3fd9552880b91e283d690a6ab28ea0759ee70620986b697fd4b3bb6e7242f6fbfc0d6cccbb33a3296a57ca3e0501bc14aa214f20cd465bcceba1b54b366479cae0d69c68373c9a252147241cebaf59a3b6f78710e9b69691d18c7e81a30838112122aed52d2518f86cd3dee76018ca072ae28b742df9e0dc05e085cf6741806de9edc71c075c14abb0d9cdc4f10fec3b67705af97c937ae0b9cf64b1e942d710b79f1a6f165b99b4f6e5b2af6e7dc2c24e9c28530f8151edffc2889b2fd44575331bec848ca7a332f787fa68c9edb528be71f0c59fe047730538bbc2da62424e19c146151ca166377121458f6741714767d142dab617d2e91be634dfff8f78cbf789b312db5523d1918ffbf7d79c04fcd92c001cc98c0f9d3aee25a32ad56e74a0fb10df6bf6e214d79d10f422b9114fb3c973c096b34bee4c942d0475fe05143e922519cf899df4540dd833d1a873a287023ebfd739f7e5c52a3c4c5d2d5aca28a6cfd2130d2264ddb724dfc4f1532db9b997935b7f29a09688c171298de7f120b586d4d394f6f861bcc900e7ec15b99bea5ab90acd725d34592835aa64ed46f44515ce6fdde313898849378fd331405288edc6e452f8b392208a8acbbd4d96a5427fcf076c66889b324951bae8b33f84c48a1accfeea73da16cdc0bb120915dc4eb9e7ad59d2cebfeb36d0e93e4fd5a52a9e4950a1c303434d01702ad030597a546934d0e3292f95cec80c6cf568cfd3654e3e0f062e872d180eeb94890da1e7a5ea7a0085879c0c4e33b7a2568f8c35773ed3fd2d11f2047cf47c4efcb61de83c2e36ad5406b7209bb7048da0b1d1c5786d0dd5444d74e66e8ffe7f0b72a37bdc3abf78e552355ecf94fecafda2e9b13ec7584d8c7d07288925a712cbfd4f3b268642d70ea8940860b6d682e5a292226fe6441b2f61e2aa1707ff7561b70690385281e5a4f29394686613d4f418943", 0xaa0}, {0x0}, {0x0}], 0x9}, 0x0) [ 556.182786][T28700] BPF:Invalid name [ 556.188776][T28700] BPF: [ 556.188776][T28700] 05:52:32 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/40, 0x28}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:52:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x9, [@datasec={0x8, 0x1, 0x0, 0xf, 0x1, [{0x3, 0x4, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x49, 0xf9, 0x8}, 0x20) 05:52:32 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) [ 556.326513][T28712] BPF:[1] DATASEC [ 556.354326][T28712] BPF:size=1 vlen=1 [ 556.370789][T28712] BPF: [ 556.383268][T28712] BPF:Invalid name [ 556.397422][T28712] BPF: [ 556.397422][T28712] 05:52:32 executing program 1: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f0000002740)={0x0, 0x0, 0x0}, 0x0) 05:52:32 executing program 4: socketpair(0x25, 0x0, 0x0, &(0x7f0000001b00)) 05:52:32 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f00000001c0)) 05:52:32 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/40, 0x28}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:52:32 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x9, [@datasec={0x8, 0x1, 0x0, 0xf, 0x1, [{0x3, 0x4, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x49, 0xf9, 0x8}, 0x20) 05:52:32 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg(r0, &(0x7f0000005f40)={0x0, 0x0, 0x0, 0x0, &(0x7f0000003b40)=[{0x60, 0x0, 0x0, "0c85389e4b8c74c68557c51eb078f25e3380ec5c89387882f0be689c219b1255a6ec9ae068e1d78fd7e87497586b7873138963ab859753afddef5d713dfd44a189800ec32594999a5e"}, {0x98, 0x0, 0x0, "84df80a1f0c394c3426820173b15ad322cd93f54ba320c47adfc98a31a7e99aa686ac5e7ff886e424e72f4a447afd01173e3a9ab20481dd7c0fbd70998936083a584c507b93213557e1646e9cc341606b2b322d1ad893e44a9261450f45dd859b4f418993389bb65e4857c9b3a15e3fecba0843921e2631bbaadfad9732aba6c0d"}, {0x1010, 0x0, 0x0, "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"}, {0xf00, 0x0, 0x0, "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"}], 0x2008}, 0x44090) 05:52:32 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000240)={&(0x7f0000000080)=@name={0x2}, 0x10, 0x0}, 0x0) 05:52:32 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:32 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/40, 0x2a}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 556.606046][T28731] BPF:[1] DATASEC [ 556.620623][T28731] BPF:size=1 vlen=1 [ 556.637107][T28731] BPF: [ 556.677615][T28731] BPF:Invalid name [ 556.691171][T28731] BPF: [ 556.691171][T28731] 05:52:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x9, [@datasec={0x8, 0x1, 0x0, 0xf, 0x1, [{0x3, 0x4, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x49, 0xf9, 0x8}, 0x20) 05:52:32 executing program 4: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000001840)={0x0, 0x0, 0x0}, 0x4000052) [ 556.861236][T28744] BPF:[1] DATASEC [ 556.882464][T28744] BPF:size=1 vlen=1 [ 556.886314][T28744] BPF: [ 556.889094][T28744] BPF:Invalid name [ 556.903617][T28744] BPF: [ 556.903617][T28744] 05:52:32 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000040)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x5, 0xbe, &(0x7f0000000100)=""/190, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) close(r0) 05:52:32 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:32 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/40, 0x2a}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:52:32 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000240)={&(0x7f0000000080)=@id, 0x10, 0x0}, 0x0) 05:52:32 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'nr0\x00'}) 05:52:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x9, [@datasec={0x8, 0x1, 0x0, 0xf, 0x1, [{0x3, 0x4, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x49, 0xf9, 0x8}, 0x20) [ 557.062503][T28760] BPF:[1] DATASEC [ 557.074764][T28760] BPF:size=1 vlen=1 [ 557.095582][T28760] BPF: [ 557.104880][T28760] BPF:Invalid name 05:52:33 executing program 4: perf_event_open$cgroup(&(0x7f00000002c0)={0x0, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 05:52:33 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000240)={&(0x7f0000000080)=@name, 0x10, 0x0, 0x0, 0x0, 0x3000000}, 0x0) 05:52:33 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/40, 0x2a}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 557.135129][T28760] BPF: [ 557.135129][T28760] 05:52:33 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:33 executing program 2: perf_event_open$cgroup(&(0x7f00000002c0)={0x2, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 05:52:33 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x9, [@datasec={0x8, 0x1, 0x0, 0xf, 0x1, [{0x3, 0x4, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x49, 0xf9, 0x8}, 0x20) [ 557.373201][T28781] BPF:[1] DATASEC [ 557.394441][T28781] BPF:size=1 vlen=1 [ 557.398385][T28781] BPF: [ 557.401165][T28781] BPF:Invalid name [ 557.408891][T28781] BPF: [ 557.408891][T28781] 05:52:33 executing program 1: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000040)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x5, 0xbe, &(0x7f0000000100)=""/190, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000200)={r0}, 0x10) 05:52:33 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x50}, 0x0) 05:52:33 executing program 4: perf_event_open$cgroup(&(0x7f00000002c0)={0x2, 0x80, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1000001000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 05:52:33 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001440)={0x18, 0x1, &(0x7f0000000080)=@raw=[@func], &(0x7f00000000c0)='GPL\x00', 0x2, 0x1000, &(0x7f0000000340)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:52:33 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:33 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x9, [@datasec={0x8, 0x1, 0x0, 0xf, 0x1, [{0x3, 0x4, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x49, 0xf9, 0x8}, 0x20) 05:52:33 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) [ 557.579600][T28796] BPF:[1] DATASEC [ 557.591923][T28796] BPF:size=1 vlen=1 [ 557.615774][T28796] BPF: 05:52:33 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000340)) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000c80)) [ 557.627642][T28796] BPF:Invalid name 05:52:33 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x50}, 0x0) [ 557.650977][T28796] BPF: [ 557.650977][T28796] 05:52:33 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x600, 0x0) 05:52:33 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x9, [@datasec={0x8, 0x1, 0x0, 0xf, 0x1, [{0x3, 0x4, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x49, 0xf9, 0x8}, 0x20) 05:52:33 executing program 2: r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x3, &(0x7f0000000880)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r0}, 0x10) [ 557.802157][T28808] BPF:[1] DATASEC [ 557.813761][T28808] BPF:size=1 vlen=1 [ 557.817645][T28808] BPF: [ 557.820414][T28808] BPF:Invalid name [ 557.864720][T28808] BPF: [ 557.864720][T28808] 05:52:33 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000240)='syzkaller\x00', 0xfffffff7, 0x1000, &(0x7f0000000740)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:52:33 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:33 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x50}, 0x0) 05:52:33 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000005c0)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd, 0xd, 0x2, [@datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], '['}]}}, &(0x7f0000000500)=""/188, 0x2a, 0xbc, 0x1}, 0x20) 05:52:33 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="30000000000000000100000001000000", @ANYRES32=r0, @ANYRES32], 0x50}, 0x0) 05:52:33 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0xa, [@datasec={0x8, 0x1, 0x0, 0xf, 0x1, [{0x3, 0x4, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, 0x0, 0x4a, 0x0, 0x8}, 0x20) 05:52:34 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:34 executing program 2: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000540)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000340)=@raw=[@jmp={0x5, 0x0, 0x8}, @btf_id, @ldst, @ldst, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}], &(0x7f00000001c0)='GPL\x00', 0x6, 0x98, &(0x7f00000003c0)=""/152, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:52:34 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x50}, 0x0) 05:52:34 executing program 4: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000040)={r0}) 05:52:34 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0xa, [@datasec={0x8, 0x1, 0x0, 0xf, 0x1, [{0x3, 0x4, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, 0x0, 0x4a, 0x0, 0x8}, 0x20) 05:52:34 executing program 2: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) recvmsg(r1, &(0x7f0000006000)={0x0, 0x0, &(0x7f0000005f80)=[{&(0x7f0000003d40)=""/166, 0xa6}], 0x1}, 0x0) 05:52:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) clone(0xa912d700, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) setitimer(0x0, &(0x7f0000000000)={{}, {0x0, 0x2710}}, 0x0) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, 0x0, &(0x7f00000000c0)) clone(0x0, 0x0, 0x0, 0x0, 0x0) 05:52:34 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0xa, [@datasec={0x8, 0x1, 0x0, 0xf, 0x1, [{0x3, 0x4, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, 0x0, 0x4a, 0x0, 0x8}, 0x20) 05:52:34 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x50}, 0x0) 05:52:34 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:34 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$sock(r0, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000001600)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 05:52:34 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0xa, [@datasec={0x8, 0x2, 0x0, 0xf, 0xfffffffe, [{0x3, 0x4, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x4a, 0xf9}, 0x20) 05:52:34 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x50}, 0x0) 05:52:34 executing program 4: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000040), 0x60, 0x0) 05:52:34 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:34 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0xa, [@datasec={0x8, 0x2, 0x0, 0xf, 0xfffffffe, [{0x3, 0x4, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x4a, 0xf9}, 0x20) 05:52:34 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = gettid() sendmsg$unix(r0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000900)=[@cred={{0x1c, 0x1, 0x2, {r1, 0xee01, 0xee01}}}, @cred={{0x1c}}], 0x40}, 0x0) 05:52:35 executing program 2: perf_event_open$cgroup(&(0x7f00000002c0)={0x2, 0x80, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 05:52:35 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{0x0}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:52:35 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0xa, [@datasec={0x8, 0x2, 0x0, 0xf, 0xfffffffe, [{0x3, 0x4, 0xfffffffc}], "f3"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "7794b9"}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000380)=""/249, 0x4a, 0xf9}, 0x20) 05:52:35 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:35 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0x1b, 0x0, 0x0, 0x0, 0x1010}, 0x40) 05:52:35 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f0000003b00)={0x0, 0x0, 0x0}, 0x0) sendmsg(r0, &(0x7f0000002440)={0x0, 0x0, &(0x7f00000023c0)=[{&(0x7f0000000340)="1c", 0x1}], 0x1}, 0x880) 05:52:35 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x2, 0x3, 0x248, 0x0, 0xd0, 0x0, 0xd0, 0xd0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x1b0, 0x3, 0x0, {[{{@ip={@local, @dev, 0x0, 0xffffffff, 'dummy0\x00', 'team_slave_0\x00'}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @dev}}}, {{@uncond, 0x0, 0x98, 0xe0, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp_trap\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2a8) 05:52:35 executing program 2: syz_mount_image$fuse(0x0, &(0x7f0000002240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002280)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee01}}) 05:52:35 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') read$rfkill(r0, &(0x7f00000014c0), 0x8) read$FUSE(r0, &(0x7f0000001500)={0x2020}, 0x2020) 05:52:35 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{0x0}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:52:35 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) [ 559.367013][T28899] ipt_CLUSTERIP: ipt_CLUSTERIP is deprecated and it will removed soon, use xt_cluster instead [ 559.395240][T28899] x_tables: ip_tables: rpfilter match: used from hooks INPUT, but only valid from PREROUTING 05:52:35 executing program 2: r0 = memfd_create(&(0x7f0000000000)='}\'^]\xa4,.%$(:\x00', 0x0) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r0, 0x5450, 0x0) 05:52:35 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/tcp\x00') lseek(r0, 0x9e0, 0x0) 05:52:35 executing program 4: signalfd4(0xffffffffffffffff, &(0x7f0000000100), 0x8, 0x80800) 05:52:35 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{0x0}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:52:35 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:35 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$tcp_congestion(r0, 0x0, 0x0) 05:52:36 executing program 1: openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x40, 0xa) 05:52:36 executing program 4: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x40, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000000c0), 0x0, 0x0, 0x1) 05:52:36 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) recvmmsg$unix(r0, 0x0, 0x0, 0x40002140, 0x0) 05:52:36 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:52:36 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$cgroup_netprio_ifpriomap(r0, 0x0, 0x8) 05:52:36 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:36 executing program 3: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x140, 0x23) 05:52:36 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='fdinfo\x00') mkdirat$cgroup(r0, &(0x7f0000000100)='syz1\x00', 0x1ff) 05:52:36 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:52:36 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:36 executing program 4: shmget$private(0x0, 0x2000, 0x2, &(0x7f0000ffd000/0x2000)=nil) 05:52:36 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000200)) 05:52:37 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r0, &(0x7f0000000140)='asymmetric\x00', &(0x7f0000000180)='\x00') 05:52:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='statm\x00') write$cgroup_netprio_ifpriomap(r0, 0x0, 0xfffffffffffffe29) 05:52:37 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:37 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) fgetxattr(r0, &(0x7f00000016c0)=ANY=[], 0x0, 0x0) 05:52:37 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:52:37 executing program 3: r0 = semget$private(0x0, 0x5, 0x0) semctl$GETZCNT(r0, 0x4, 0xf, &(0x7f0000000040)=""/215) 05:52:37 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='task\x00') read$FUSE(r0, 0x0, 0x0) 05:52:37 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) write$cgroup_subtree(r1, 0x0, 0x0) 05:52:37 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:37 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) recvmmsg$unix(r0, 0x0, 0x0, 0x100, &(0x7f0000005b00)) 05:52:37 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e0000", 0x14}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:52:37 executing program 2: r0 = socket$unix(0x1, 0x5, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) getsockname(r1, 0x0, &(0x7f00000075c0)) 05:52:37 executing program 1: r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000001b80)={@multicast1, @loopback}, 0xb) 05:52:37 executing program 3: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000040)={{0x77359400}}, 0x0) 05:52:37 executing program 2: getgroups(0x2, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff]) setresgid(r0, 0xffffffffffffffff, 0x0) 05:52:37 executing program 4: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8917, &(0x7f0000000040)) 05:52:37 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e0000", 0x14}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:52:37 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:37 executing program 4: add_key(&(0x7f0000000140)='asymmetric\x00', 0x0, &(0x7f00000001c0)='_+', 0x2, 0xfffffffffffffffc) 05:52:37 executing program 3: keyctl$unlink(0x11, 0x0, 0xfffffffffffffffd) 05:52:37 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$user(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, &(0x7f0000000200)="12", 0x1, r0) keyctl$search(0x6, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x1}, 0x0) 05:52:37 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e0000", 0x14}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:52:37 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:37 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet(r0, &(0x7f000000b8c0)={&(0x7f0000000000)={0x2, 0x4e25, @loopback}, 0x10, 0x0}, 0x20044850) 05:52:37 executing program 1: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8982, &(0x7f0000000040)) 05:52:37 executing program 4: r0 = socket$inet(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000000)={@rand_addr, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) 05:52:37 executing program 2: r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0xc, &(0x7f0000001b80)={@multicast1, @loopback}, 0xc) 05:52:37 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/30, 0x1e}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:52:37 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x0) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:37 executing program 3: keyctl$search(0x14, 0x0, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000280)={'syz', 0x1}, 0x0) 05:52:38 executing program 2: add_key$keyring(&(0x7f0000000380), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) 05:52:38 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x1e, r0, r1, 0x0, 0x0) 05:52:38 executing program 3: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8970, &(0x7f0000000040)) 05:52:38 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/30, 0x1e}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:52:38 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x0) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:38 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000c40)={&(0x7f0000000740)={0x14, r1, 0x1}, 0x14}}, 0x0) 05:52:38 executing program 1: r0 = socket$inet(0x2, 0x5, 0x0) sendmsg$inet(r0, &(0x7f0000001700)={&(0x7f0000000000)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, &(0x7f0000001600)=[{&(0x7f0000000040)="af", 0x1}], 0x1}, 0xc851) 05:52:38 executing program 4: socketpair(0x25, 0x3, 0x7fffffff, &(0x7f0000000000)) 05:52:38 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001440), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_RINGS_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 05:52:38 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x0) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:38 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/30, 0x1e}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:52:38 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0xc0189436, 0x0) 05:52:38 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000005780)=[{{&(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10, 0x0, 0x0, &(0x7f0000000180)=[@ip_ttl={{0x14, 0x0, 0x2, 0x80}}], 0x18}}, {{0x0, 0x0, &(0x7f0000001400)=[{&(0x7f00000001c0)="6c567cfba811d5184ca4a063e18bedbaf85797bad40b441130492ebd3a1b8e12a4b77564ba6997a8372b01a8834c2ae5809787bddc2c98c9322812b8a4d1b5037bc1aff05467c284a662892b93efd6f80058769c51d6ac7dde30b05f23b4ade093ddd7f2091a9286cf304dd7f434fd98de63ffe6ef4de9f5a4518b9ae80757cb3e0bbb881c2ddcf17f3aaee332a7371cac4828391e2f6b3b26fae16ecbe7c590c1feaa1f422bc4e0300f04b89a9a6d4d42e382501dfce4da4ea61a5685255a1409a622fee2fe90a113de5b7535484f9a8833fd047d37b36d39", 0xd9}, {&(0x7f00000002c0)="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", 0xf27}], 0x2}}, {{0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000014c0)="d8", 0x1}], 0x1}}], 0x3, 0x8800) 05:52:38 executing program 2: r0 = socket$inet(0x2, 0x80003, 0x6) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x5450, 0x0) 05:52:38 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/35, 0x23}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:52:38 executing program 4: r0 = socket$inet(0x2, 0x3, 0x1) sendmsg$inet(r0, &(0x7f0000000340)={&(0x7f0000000080)={0x2, 0x0, @empty}, 0x10, &(0x7f00000006c0)=[{&(0x7f00000000c0)="bae8", 0x2}, {&(0x7f00000023c0)="7f777301a5f3", 0x6}], 0x2}, 0x0) recvmmsg(r0, &(0x7f0000000d40)=[{{0x0, 0x0, &(0x7f0000000440)=[{&(0x7f00000001c0)=""/217, 0xd9}], 0x1}}, {{0x0, 0x0, 0x0}}], 0x2, 0x10000, 0x0) 05:52:38 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, 0x0, &(0x7f0000000740), 0x4, 0x0) [ 562.722243][ T3254] ieee802154 phy0 wpan0: encryption failed: -22 [ 562.728634][ T3254] ieee802154 phy1 wpan1: encryption failed: -22 05:52:38 executing program 2: timer_create(0x0, 0x0, &(0x7f0000002380)) timer_settime(0x0, 0x0, &(0x7f0000000100), 0x0) 05:52:39 executing program 1: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8919, &(0x7f0000000040)) 05:52:39 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000140)=@framed, &(0x7f0000000180)='GPL\x00', 0x3, 0xb5, &(0x7f00000001c0)=""/181, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:52:39 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/35, 0x23}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:52:39 executing program 3: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8953, &(0x7f0000000040)) 05:52:39 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, 0x0, &(0x7f0000000740), 0x4, 0x0) 05:52:39 executing program 2: r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0xf, 0x0, 0x0) 05:52:39 executing program 2: r0 = socket$inet(0x2, 0x5, 0x0) sendmsg$inet(r0, &(0x7f0000001700)={&(0x7f0000000000)={0x2, 0x0, @rand_addr=0x64010102}, 0x10, &(0x7f0000001600)=[{&(0x7f0000000040)="afa2210b7e3cd02d19ef18f17c5a107636241e7d0ed2d90f9cb69002cd30d0195fe378bf5448d27ff99df568f49c81aadab2c205b69a28b927ed6c830bb2d85428d629b406ca8b9c6054f603ac7aa061d571e0c8112ecdcce5537df96b225ec073581c587be64fcdca1c853a0c997560e8d4851c9b02a44969a781477b3c30789f6415fea226dfe6f045ae3d047aff6bc2231ecd2944cc88c7d84a65ab8d12b575f4922cb7de6b6c477a72680888e67d", 0xb0}, {&(0x7f0000000100)="1692d62aa7eee2c980a16b0597af095ee178ec8ca66eaacc66b65750b220c58d2ac08c14cab885d4f3f307705fcebfe6d87de0213a9cdfcb1b065cf52bf2ac88242ede174322d521dcb9e3", 0x4b}, {&(0x7f0000000180)="3e19fe6f24fe540f0754b9979da22034e659d911453a9c2969a5fcb8d41c113c08b708b6c764b2773791ae", 0x2b}, {&(0x7f00000001c0)="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", 0x3be}], 0x4}, 0xc851) 05:52:39 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet(r0, &(0x7f0000007a00)=[{{&(0x7f0000000000)={0x2, 0x0, @private=0xa010100}, 0x10, &(0x7f00000013c0)=[{&(0x7f0000000240)="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", 0x4d0}], 0x1}}], 0x1, 0x48040) 05:52:39 executing program 4: bpf$BPF_PROG_GET_NEXT_ID(0xe, 0x0, 0x0) 05:52:39 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, 0x0, &(0x7f0000000740), 0x4, 0x0) 05:52:39 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/35, 0x23}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:52:39 executing program 3: r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x20, 0x0, 0xf) 05:52:39 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET_STATS_CPU(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, 0x3, 0x2, 0x801}, 0x14}}, 0x0) 05:52:39 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/38, 0x26}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:52:39 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001f40)=[{{&(0x7f0000000000)={0xa, 0x4e22, 0x0, @empty}, 0x1c, 0x0, 0x0, &(0x7f0000000140)=[@rthdr={{0x18, 0x29, 0x3b}}], 0x18}}], 0x1, 0x0) 05:52:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x20, r1, 0x111, 0x0, 0x0, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xfda2, 0x9, @multicast}]}, 0x20}}, 0x0) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(0xffffffffffffffff, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) 05:52:39 executing program 3: r0 = add_key$user(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="c6", 0x1, 0xffffffffffffffff) keyctl$unlink(0x2, r0, 0xfffffffffffffffd) 05:52:39 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', 0x0, 0x4, 0x0) [ 563.530762][T29134] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 05:52:39 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/38, 0x26}], 0x1, 0x0, 0x0, 0x50}, 0x0) [ 563.579803][T29140] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 05:52:39 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', 0x0, 0x4, 0x0) 05:52:39 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$search(0xa, r0, &(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0) 05:52:39 executing program 3: r0 = socket(0x23, 0x2, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000600), r0) 05:52:39 executing program 4: r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x28, &(0x7f0000001b80)={@multicast1, @loopback}, 0xc) 05:52:39 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/38, 0x26}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:52:39 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x541b, &(0x7f0000000000)) 05:52:39 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', 0x0, 0x4, 0x0) 05:52:39 executing program 3: r0 = mq_open(&(0x7f0000000000)='(\x00', 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) mq_timedreceive(r0, &(0x7f0000000080)=""/224, 0xe0, 0x0, &(0x7f00000001c0)={r1, r2+10000000}) 05:52:39 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @private0}, 0x2000011c) 05:52:39 executing program 2: timer_create(0x2, 0x0, &(0x7f0000000200)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{}, {0x0, 0x3938700}}, 0x0) 05:52:39 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/39, 0x27}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:52:40 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/39, 0x27}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:52:40 executing program 2: r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$inet_mreqn(r0, 0x84, 0xb, 0x0, 0x0) 05:52:40 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x0, 0x0) 05:52:40 executing program 3: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8924, &(0x7f0000000040)) 05:52:40 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f0000001f40)=[{{&(0x7f0000000000)={0xa, 0x4e22, 0x0, @empty, 0x3f}, 0x1c, 0x0, 0x0, &(0x7f0000000140)=[@rthdr={{0x18}}], 0x18}}], 0x1, 0x0) 05:52:40 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @private0}, 0x1b) 05:52:40 executing program 1: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x4020940d, 0x0) 05:52:40 executing program 3: keyctl$KEYCTL_MOVE(0x18, 0x0, 0x0, 0x0, 0x0) 05:52:40 executing program 4: r0 = socket$inet(0x2, 0x3, 0x2) recvmmsg(r0, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x61, 0x0) 05:52:40 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@l2={0x1f, 0xffffdd86}, 0x80, 0x0}, 0x0) r0 = socket$kcm(0x11, 0x3, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r1, 0x8912, 0x400308) sendmsg$kcm(r0, &(0x7f0000000100)={&(0x7f0000000040)=@nfc={0x7, 0x7}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000180)="0500001500112c00fe80000000000000020e00"/39, 0x27}], 0x1, 0x0, 0x0, 0x50}, 0x0) 05:52:40 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f00000003c0)=[{{&(0x7f0000000000), 0x10, &(0x7f0000001200)=[{&(0x7f0000000080)="f1f0", 0x2}], 0x1}}, {{&(0x7f0000000040)={0x2, 0x0, @local}, 0x10, 0x0, 0x0, &(0x7f0000000440)=[@ip_retopts={{0x24}}], 0x10}}], 0x2, 0x0) 05:52:40 executing program 5: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) 05:52:40 executing program 5: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f00000003c0)=[{{&(0x7f0000000000), 0x10, &(0x7f0000001200)=[{&(0x7f0000000080)="f1f0", 0x2}], 0x1}}, {{&(0x7f0000000040)={0x2, 0x0, @local}, 0x10, 0x0, 0x0, &(0x7f0000000440)=[@ip_retopts={{0x10, 0x0, 0x2}}], 0x10}}], 0x2, 0x0) 05:52:40 executing program 4: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8971, &(0x7f0000000040)) 05:52:40 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TYPE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0xd, 0x6, 0x401}, 0x14}}, 0x0) 05:52:40 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r0, &(0x7f000000a4c0)=[{{&(0x7f0000000000)={0xa, 0x4e22, 0x0, @mcast1, 0x2}, 0x1c, 0x0}}], 0x1, 0x0) 05:52:40 executing program 2: r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x14, 0x0, 0x0) 05:52:40 executing program 5: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x890d, 0x0) 05:52:40 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_SET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000380)={0x44, r1, 0x1, 0x0, 0x0, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x6, 0x4, 0x1}}]}, 0x44}}, 0x0) 05:52:40 executing program 4: r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0xd, 0x0, 0x0) 05:52:40 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x1600bd74, &(0x7f0000001b80)={@multicast1, @loopback}, 0xc) 05:52:40 executing program 2: timer_create(0x0, 0x0, &(0x7f0000002380)) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{}, {0x0, 0x3938700}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000500)={{0x77359400}}, &(0x7f0000000540)) 05:52:40 executing program 3: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x89b0, &(0x7f0000000040)) 05:52:40 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x1a, 0x0, 0x0) 05:52:40 executing program 2: r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$inet_mreqn(r0, 0x84, 0x0, 0x0, 0x0) 05:52:40 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x11, 0x0, 0x0, 0x300) 05:52:41 executing program 3: r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x8, &(0x7f0000001b80)={@multicast1, @loopback}, 0xc) 05:52:41 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg$inet(r0, &(0x7f0000001a40)=[{{&(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x12}}, 0x10, &(0x7f0000000200)=[{&(0x7f0000000080)="a4", 0x34000}], 0x1}}], 0x1, 0x0) 05:52:41 executing program 0: r0 = inotify_init1(0x0) inotify_add_watch(r0, 0x0, 0xa1000040) 05:52:41 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$KEYCTL_MOVE(0x1e, r0, r1, r2, 0x0) 05:52:41 executing program 1: r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x1a, &(0x7f0000001b80)={@multicast1, @loopback}, 0xc) 05:52:41 executing program 2: r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x19, 0x0, 0x0) 05:52:41 executing program 3: r0 = fsopen(&(0x7f0000000040)='autofs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 05:52:41 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000002c0)="eb3c906d6b66732e66617400020101000240008000f8", 0x16}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000000180)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x8050}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 05:52:41 executing program 0: r0 = socket$inet(0x2, 0x3, 0x1) sendmsg$inet(r0, &(0x7f0000000340)={&(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10, &(0x7f00000002c0)=[{&(0x7f00000000c0)="cee8", 0x2}], 0x1}, 0x16) 05:52:41 executing program 4: r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x6, &(0x7f0000001b80)={@multicast1, @loopback}, 0xc) 05:52:41 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000080)=""/111) 05:52:41 executing program 4: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f00000003c0)=[{{&(0x7f0000000000), 0x10, &(0x7f0000001200)=[{&(0x7f0000000080)="f1f0", 0x2}], 0x1}}, {{&(0x7f0000000040)={0x3, 0x0, @local}, 0x10, 0x0}}], 0x2, 0x0) 05:52:41 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000001900)={0x28, 0x8, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x28}}, 0x0) [ 565.442808][T29266] autofs4:pid:29266:autofs_fill_super: called with bogus options [ 565.447508][T29265] loop5: detected capacity change from 0 to 16 05:52:41 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000001740)={0x28, 0x0, 0x0, @local}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f0000000100), 0x8) 05:52:41 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet(r0, &(0x7f0000005780)=[{{&(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000040)='r', 0x1}], 0x1, &(0x7f0000000180)=[@ip_ttl={{0x14, 0x0, 0x2, 0x80}}], 0x18}}, {{0x0, 0x0, &(0x7f0000001400)=[{&(0x7f00000001c0)="6c567cfba811d5184ca4a063e18bedbaf85797bad40b441130492ebd3a1b8e12a4b77564ba6997a8372b01a8834c2ae5809787bddc2c98c9322812b8a4d1b5037bc1aff05467c284a662892b93efd6f80058769c51d6ac7dde30b05f23b4ade093ddd7f2091a9286cf304dd7f434fd98de63ffe6ef4de9f5a4518b9ae80757cb3e0bbb881c2ddcf17f3aaee332a7371cac4828391e2f6b3b26fae16ecbe7c590c1feaa1f422bc4e0300f04b89a9a6d4d42e382501dfce4da4ea61a5685255a1409a622fee2fe90a113de5b7535484f9a8833fd047d37b36d39", 0xd9}, {&(0x7f00000002c0)="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", 0xf27}], 0x2}}, {{0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f00000014c0)="d8", 0x1}], 0x1}}], 0x3, 0x8800) [ 565.513934][T29265] FAT-fs (loop5): bogus number of FAT sectors [ 565.531487][T29265] FAT-fs (loop5): Can't find a valid FAT filesystem 05:52:41 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x9, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 05:52:42 executing program 1: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x5451, 0x0) 05:52:42 executing program 4: r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0xa, &(0x7f0000001b80)={@multicast1, @loopback}, 0xc) 05:52:42 executing program 3: keyctl$unlink(0xb, 0x0, 0xfffffffffffffffd) [ 566.234917][T29265] loop5: detected capacity change from 0 to 16 [ 566.239800][T29265] FAT-fs (loop5): bogus number of FAT sectors [ 566.259384][T29265] FAT-fs (loop5): Can't find a valid FAT filesystem 05:52:42 executing program 5: r0 = add_key$user(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)="c6", 0x1, 0xffffffffffffffff) keyctl$unlink(0x1d, r0, 0xfffffffffffffffd) 05:52:42 executing program 0: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc2}, &(0x7f0000000140)={0x0, "366e2e1d47b319231fa4e96896f5a9287b0ec99a09e7380e39768a85fe2f2d84b9beb60e84ed9d4c017fb68cf7fd71ebaa7ba67415c705b2adf39968cd0f75ff"}, 0x48, 0xfffffffffffffffe) 05:52:42 executing program 2: r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x6, 0x0, 0x0) 05:52:42 executing program 3: r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0xc, 0x0, 0x0) 05:52:42 executing program 4: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x2, &(0x7f0000000180)='rxrpc\x00', &(0x7f00000001c0), 0x0) 05:52:42 executing program 3: r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000001b80)={@multicast1, @loopback}, 0xc) 05:52:42 executing program 2: bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0}, 0x20) 05:52:42 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000004600)=[{{&(0x7f0000000000)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/4096, 0x1000}], 0x1, &(0x7f0000002400)=""/4096, 0x1000}}], 0x1, 0x2, &(0x7f0000004680)={0x0, 0x989680}) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000280)={0x14, 0x9, 0x6, 0x3}, 0x14}}, 0x0) 05:52:42 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0xa, 0x4e24, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000000200)=[@hoplimit_2292={{0x14}}], 0x18}, 0x0) 05:52:42 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmmsg$inet(r0, &(0x7f0000001a40)=[{{&(0x7f0000000040)={0x2, 0x0, @dev}, 0x10, &(0x7f0000000200)=[{&(0x7f0000000080)="a4", 0x1}], 0x1}}], 0x1, 0x0) getsockname$unix(r0, 0x0, &(0x7f0000000000)) 05:52:42 executing program 5: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$unlink(0x1d, r0, 0x0) 05:52:42 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r1) keyctl$link(0x8, r2, r2) 05:52:42 executing program 2: getgroups(0x2, &(0x7f00000002c0)=[0x0, 0xee00]) setresgid(r0, 0xffffffffffffffff, 0x0) 05:52:42 executing program 4: r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x10, 0x0, 0x0) 05:52:42 executing program 0: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x891e, &(0x7f0000000040)) 05:52:42 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000000)=0x1, 0x4) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x10) syz_emit_ethernet(0x76, &(0x7f0000000600)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x15, 0x2, 0x0, 0x0, 0x0, {[@window={0x22, 0x3}, @mptcp=@remove_addr={0x1e, 0xc, 0x0, 0x0, "91322cd95887277910"}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "8d8b36b3b9a1fc281838019645066dac"}, @md5sig={0x13, 0x12, "91d785d56854605c802ac99f965fe399"}]}}}}}}}, 0x0) 05:52:42 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$unlink(0xb, r0, 0xfffffffffffffffd) 05:52:42 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$unlink(0x11, r0, 0x0) 05:52:42 executing program 5: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8943, &(0x7f0000000040)) 05:52:42 executing program 0: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f0000001880)=[{{&(0x7f0000000000), 0x10, &(0x7f00000001c0)=[{&(0x7f0000000080)="f1f0", 0x2}], 0x1}}, {{&(0x7f0000000040)={0x2, 0x0, @empty}, 0x10, 0x0}}], 0x2, 0x0) 05:52:42 executing program 4: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8937, &(0x7f0000000040)) 05:52:43 executing program 1: socket(0x11, 0xa, 0x40) 05:52:43 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet(r0, &(0x7f0000007a00)=[{{&(0x7f0000000000)={0x2, 0x0, @private=0xa010100}, 0x10, &(0x7f00000013c0)=[{&(0x7f0000000240)="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", 0x4d1}], 0x1}}, {{&(0x7f0000001580)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10, &(0x7f0000001840)=[{&(0x7f00000015c0)="8e", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000001900)=[{&(0x7f00000018c0)="c1", 0x1}], 0x1}}], 0x3, 0x48040) 05:52:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000000)=0x1, 0x4) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x10) syz_emit_ethernet(0x76, &(0x7f0000000600)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x15, 0x2, 0x0, 0x0, 0x0, {[@window={0x22, 0x3}, @mptcp=@remove_addr={0x1e, 0xc, 0x0, 0x0, "91322cd95887277910"}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "8d8b36b3b9a1fc281838019645066dac"}, @md5sig={0x13, 0x12, "91d785d56854605c802ac99f965fe399"}]}}}}}}}, 0x0) 05:52:43 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$inet(r0, &(0x7f000000b8c0)={&(0x7f000000a300)={0x2, 0x4e22, @private}, 0x10, 0x0, 0x0, &(0x7f000000b7c0)=[@ip_retopts={{0x10, 0x4}}], 0x10}, 0x0) 05:52:43 executing program 0: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8915, &(0x7f0000000040)) 05:52:43 executing program 4: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8993, &(0x7f0000000040)) 05:52:43 executing program 2: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x541b, &(0x7f0000000040)) 05:52:43 executing program 5: r0 = fsopen(&(0x7f0000000000)='devpts\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f0000000040)='nolazytime\x00', 0x0, 0x0) 05:52:43 executing program 0: r0 = fsopen(&(0x7f0000000040)='pipefs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 05:52:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000000)=0x1, 0x4) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x10) syz_emit_ethernet(0x76, &(0x7f0000000600)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x15, 0x2, 0x0, 0x0, 0x0, {[@window={0x22, 0x3}, @mptcp=@remove_addr={0x1e, 0xc, 0x0, 0x0, "91322cd95887277910"}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "8d8b36b3b9a1fc281838019645066dac"}, @md5sig={0x13, 0x12, "91d785d56854605c802ac99f965fe399"}]}}}}}}}, 0x0) 05:52:43 executing program 4: r0 = socket$inet(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f00000003c0)=[{{&(0x7f0000000000), 0x10, &(0x7f0000001200)=[{&(0x7f0000000080)="f1f0", 0x2}], 0x1}}, {{&(0x7f0000000040)={0x2, 0x0, @local}, 0x10, 0x0, 0x0, &(0x7f0000000440)=[@ip_retopts={{0x10, 0x0, 0x8}}], 0x10}}], 0x2, 0x0) 05:52:43 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) recvmmsg(r0, &(0x7f0000004600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000280)={0x14, 0x9, 0x6, 0x3}, 0x14}}, 0x0) 05:52:43 executing program 1: r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x1e, r1, r0, r0, 0x0) 05:52:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 05:52:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000000)=0x1, 0x4) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x10) syz_emit_ethernet(0x76, &(0x7f0000000600)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x15, 0x2, 0x0, 0x0, 0x0, {[@window={0x22, 0x3}, @mptcp=@remove_addr={0x1e, 0xc, 0x0, 0x0, "91322cd95887277910"}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "8d8b36b3b9a1fc281838019645066dac"}, @md5sig={0x13, 0x12, "91d785d56854605c802ac99f965fe399"}]}}}}}}}, 0x0) 05:52:43 executing program 4: add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) prctl$PR_SET_KEEPCAPS(0x8, 0x0) 05:52:43 executing program 0: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8942, &(0x7f0000000040)) 05:52:43 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x8, 0x6, 0x201}, 0x14}}, 0x0) 05:52:43 executing program 2: bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000)={0x0, 0x0}, 0x8) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={r0}, 0xc) 05:52:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000000)=0x1, 0x4) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) syz_emit_ethernet(0x76, &(0x7f0000000600)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x15, 0x2, 0x0, 0x0, 0x0, {[@window={0x22, 0x3}, @mptcp=@remove_addr={0x1e, 0xc, 0x0, 0x0, "91322cd95887277910"}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "8d8b36b3b9a1fc281838019645066dac"}, @md5sig={0x13, 0x12, "91d785d56854605c802ac99f965fe399"}]}}}}}}}, 0x0) 05:52:43 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={@dev, @dev, @rand_addr=' \x01\x00', 0x0, 0x100, 0x0, 0x0, 0x0, 0x1800000}) 05:52:43 executing program 4: r0 = fsopen(&(0x7f0000000080)='devpts\x00', 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f0000000040)='silent\x00', 0x0, 0x0) 05:52:43 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000000)=0x1, 0x4) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) syz_emit_ethernet(0x76, &(0x7f0000000600)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x15, 0x2, 0x0, 0x0, 0x0, {[@window={0x22, 0x3}, @mptcp=@remove_addr={0x1e, 0xc, 0x0, 0x0, "91322cd95887277910"}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "8d8b36b3b9a1fc281838019645066dac"}, @md5sig={0x13, 0x12, "91d785d56854605c802ac99f965fe399"}]}}}}}}}, 0x0) 05:52:43 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000240), 0x0, &(0x7f00000002c0)={0x0, 0x0, @d}, 0x18, 0xfffffffffffffffd) 05:52:44 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000003a00)={'wlan1\x00'}) 05:52:44 executing program 5: sendmsg$L2TP_CMD_TUNNEL_DELETE(0xffffffffffffffff, 0x0, 0x0) 05:52:44 executing program 0: r0 = socket$inet(0x2, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x89a1, &(0x7f0000000040)) 05:52:44 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r0, &(0x7f0000001740)={0x28, 0x0, 0x0, @my=0x0}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000040)=0xfffffffffffff000, 0x8) 05:52:44 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000000)=0x1, 0x4) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) syz_emit_ethernet(0x76, &(0x7f0000000600)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x15, 0x2, 0x0, 0x0, 0x0, {[@window={0x22, 0x3}, @mptcp=@remove_addr={0x1e, 0xc, 0x0, 0x0, "91322cd95887277910"}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "8d8b36b3b9a1fc281838019645066dac"}, @md5sig={0x13, 0x12, "91d785d56854605c802ac99f965fe399"}]}}}}}}}, 0x0) 05:52:44 executing program 2: syz_genetlink_get_family_id$l2tp(&(0x7f0000000300), 0xffffffffffffffff) syz_open_dev$binderN(&(0x7f0000002d40), 0x0, 0x400) syz_open_dev$binderN(&(0x7f0000002d80), 0x0, 0x0) 05:52:44 executing program 1: syz_open_dev$binderN(&(0x7f0000002d40), 0x0, 0x0) syz_open_dev$binderN(&(0x7f0000002d80), 0x0, 0x0) 05:52:44 executing program 0: userfaultfd(0x80800) 05:52:44 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000000)=0x1, 0x4) listen(r0, 0x10) syz_emit_ethernet(0x76, &(0x7f0000000600)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x15, 0x2, 0x0, 0x0, 0x0, {[@window={0x22, 0x3}, @mptcp=@remove_addr={0x1e, 0xc, 0x0, 0x0, "91322cd95887277910"}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "8d8b36b3b9a1fc281838019645066dac"}, @md5sig={0x13, 0x12, "91d785d56854605c802ac99f965fe399"}]}}}}}}}, 0x0) 05:52:44 executing program 4: openat$mixer(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) syz_genetlink_get_family_id$smc(0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000001d80)={'syztnl0\x00', 0x0}) 05:52:45 executing program 2: openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001600), 0xffffffffffffffff) 05:52:45 executing program 5: syz_open_dev$binderN(&(0x7f0000002d40), 0x0, 0x400) 05:52:45 executing program 0: openat$pfkey(0xffffffffffffff9c, &(0x7f0000001600), 0x0, 0x0) 05:52:45 executing program 2: sendmsg$NLBL_CALIPSO_C_REMOVE(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001340), 0xffffffffffffffff) 05:52:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000000)=0x1, 0x4) listen(r0, 0x10) syz_emit_ethernet(0x76, &(0x7f0000000600)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x15, 0x2, 0x0, 0x0, 0x0, {[@window={0x22, 0x3}, @mptcp=@remove_addr={0x1e, 0xc, 0x0, 0x0, "91322cd95887277910"}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "8d8b36b3b9a1fc281838019645066dac"}, @md5sig={0x13, 0x12, "91d785d56854605c802ac99f965fe399"}]}}}}}}}, 0x0) 05:52:45 executing program 5: sendmsg$NLBL_CALIPSO_C_REMOVE(0xffffffffffffffff, 0x0, 0x0) socketpair(0x2a, 0x0, 0x0, 0x0) 05:52:45 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f00000013c0), 0x0, 0x0) 05:52:45 executing program 2: syz_genetlink_get_family_id$l2tp(&(0x7f0000001900), 0xffffffffffffffff) 05:52:45 executing program 1: clock_getres(0x0, &(0x7f0000000000)) syz_open_dev$dri(&(0x7f0000000140), 0xa6, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000001900), 0xffffffffffffffff) 05:52:45 executing program 5: syz_open_dev$binderN(0x0, 0x0, 0x0) 05:52:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000000)=0x1, 0x4) listen(r0, 0x10) syz_emit_ethernet(0x76, &(0x7f0000000600)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x15, 0x2, 0x0, 0x0, 0x0, {[@window={0x22, 0x3}, @mptcp=@remove_addr={0x1e, 0xc, 0x0, 0x0, "91322cd95887277910"}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "8d8b36b3b9a1fc281838019645066dac"}, @md5sig={0x13, 0x12, "91d785d56854605c802ac99f965fe399"}]}}}}}}}, 0x0) 05:52:45 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 05:52:45 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ptrace$cont(0xffffffffffffffff, r0, 0x0, 0x0) 05:52:45 executing program 2: clock_getres(0x0, &(0x7f0000000000)) syz_open_dev$dri(0x0, 0x0, 0x0) 05:52:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x10) syz_emit_ethernet(0x76, &(0x7f0000000600)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x15, 0x2, 0x0, 0x0, 0x0, {[@window={0x22, 0x3}, @mptcp=@remove_addr={0x1e, 0xc, 0x0, 0x0, "91322cd95887277910"}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "8d8b36b3b9a1fc281838019645066dac"}, @md5sig={0x13, 0x12, "91d785d56854605c802ac99f965fe399"}]}}}}}}}, 0x0) 05:52:45 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/mcfilter6\x00') read$rfkill(r0, &(0x7f00000014c0), 0x8) read$FUSE(r0, 0x0, 0x0) 05:52:45 executing program 0: r0 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0xb, 0x4, @tid=r0}, &(0x7f0000000240)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000000300)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x4c) accept4(r1, 0x0, 0x0, 0x0) 05:52:45 executing program 5: openat$vfio(0xffffffffffffff9c, &(0x7f0000000000), 0x240003, 0x0) 05:52:45 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f00000013c0), 0x42, 0x0) 05:52:45 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x10) syz_emit_ethernet(0x76, &(0x7f0000000600)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x15, 0x2, 0x0, 0x0, 0x0, {[@window={0x22, 0x3}, @mptcp=@remove_addr={0x1e, 0xc, 0x0, 0x0, "91322cd95887277910"}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "8d8b36b3b9a1fc281838019645066dac"}, @md5sig={0x13, 0x12, "91d785d56854605c802ac99f965fe399"}]}}}}}}}, 0x0) 05:52:46 executing program 1: r0 = socket$inet6(0x18, 0x3, 0x0) close(r0) connect$inet6(r0, 0x0, 0x0) 05:52:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f00000013c0), 0x42, 0x0) accept(r0, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000003a00)={'wlan1\x00'}) 05:52:46 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000040)={'batadv_slave_1\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, r1}) 05:52:46 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000000cc0), 0x1, 0x40000041, 0x0) 05:52:46 executing program 4: mlock(&(0x7f0000c00000/0x400000)=nil, 0x400000) madvise(&(0x7f0000ffa000/0x2000)=nil, 0x2000, 0x4) 05:52:46 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x10) syz_emit_ethernet(0x76, &(0x7f0000000600)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x15, 0x2, 0x0, 0x0, 0x0, {[@window={0x22, 0x3}, @mptcp=@remove_addr={0x1e, 0xc, 0x0, 0x0, "91322cd95887277910"}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "8d8b36b3b9a1fc281838019645066dac"}, @md5sig={0x13, 0x12, "91d785d56854605c802ac99f965fe399"}]}}}}}}}, 0x0) 05:52:46 executing program 4: r0 = socket$inet6(0x18, 0x3, 0x0) r1 = getpid() fcntl$setown(r0, 0x6, r1) close(r0) 05:52:46 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000000000)=0x1, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(0xffffffffffffffff, 0x10) syz_emit_ethernet(0x76, &(0x7f0000000600)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x15, 0x2, 0x0, 0x0, 0x0, {[@window={0x22, 0x3}, @mptcp=@remove_addr={0x1e, 0xc, 0x0, 0x0, "91322cd95887277910"}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "8d8b36b3b9a1fc281838019645066dac"}, @md5sig={0x13, 0x12, "91d785d56854605c802ac99f965fe399"}]}}}}}}}, 0x0) 05:52:46 executing program 2: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read$FUSE(r0, &(0x7f0000000040)={0x2020}, 0x2020) 05:52:46 executing program 0: mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) madvise(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0) madvise(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) 05:52:46 executing program 5: mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x30, 0xffffffffffffffff, 0x10000000) 05:52:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ifreq(r0, 0x8947, &(0x7f0000000000)={'ip6_vti0\x00', @ifru_data=0x0}) 05:52:46 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:52:46 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000000000)=0x1, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(0xffffffffffffffff, 0x10) syz_emit_ethernet(0x76, &(0x7f0000000600)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x15, 0x2, 0x0, 0x0, 0x0, {[@window={0x22, 0x3}, @mptcp=@remove_addr={0x1e, 0xc, 0x0, 0x0, "91322cd95887277910"}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "8d8b36b3b9a1fc281838019645066dac"}, @md5sig={0x13, 0x12, "91d785d56854605c802ac99f965fe399"}]}}}}}}}, 0x0) 05:52:46 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)={[{@size={'size', 0x3d, [0x0]}}]}) 05:52:46 executing program 5: r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$inet_mreqn(r0, 0x84, 0x12, 0x0, 0x0) 05:52:46 executing program 0: pselect6(0x40, &(0x7f0000000280), &(0x7f00000002c0), 0x0, &(0x7f0000000340)={0x0, 0x989680}, &(0x7f00000003c0)={&(0x7f0000000380), 0x8}) 05:52:46 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:46 executing program 3: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000000000)=0x1, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(0xffffffffffffffff, 0x10) syz_emit_ethernet(0x76, &(0x7f0000000600)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x15, 0x2, 0x0, 0x0, 0x0, {[@window={0x22, 0x3}, @mptcp=@remove_addr={0x1e, 0xc, 0x0, 0x0, "91322cd95887277910"}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "8d8b36b3b9a1fc281838019645066dac"}, @md5sig={0x13, 0x12, "91d785d56854605c802ac99f965fe399"}]}}}}}}}, 0x0) 05:52:46 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:52:46 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) [ 570.790600][T29558] tmpfs: Bad value for 'size' 05:52:46 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) [ 570.833024][T29558] tmpfs: Bad value for 'size' 05:52:46 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000000000)=0x1, 0x4) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x10) syz_emit_ethernet(0x76, &(0x7f0000000600)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x15, 0x2, 0x0, 0x0, 0x0, {[@window={0x22, 0x3}, @mptcp=@remove_addr={0x1e, 0xc, 0x0, 0x0, "91322cd95887277910"}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "8d8b36b3b9a1fc281838019645066dac"}, @md5sig={0x13, 0x12, "91d785d56854605c802ac99f965fe399"}]}}}}}}}, 0x0) 05:52:46 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:52:48 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x0, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:52:48 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:52:48 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:48 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000000000)=0x1, 0x4) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x10) syz_emit_ethernet(0x76, &(0x7f0000000600)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x15, 0x2, 0x0, 0x0, 0x0, {[@window={0x22, 0x3}, @mptcp=@remove_addr={0x1e, 0xc, 0x0, 0x0, "91322cd95887277910"}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "8d8b36b3b9a1fc281838019645066dac"}, @md5sig={0x13, 0x12, "91d785d56854605c802ac99f965fe399"}]}}}}}}}, 0x0) 05:52:48 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:52:48 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:52:48 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1b, &(0x7f0000000000)=0x1, 0x4) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x10) syz_emit_ethernet(0x76, &(0x7f0000000600)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x15, 0x2, 0x0, 0x0, 0x0, {[@window={0x22, 0x3}, @mptcp=@remove_addr={0x1e, 0xc, 0x0, 0x0, "91322cd95887277910"}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "8d8b36b3b9a1fc281838019645066dac"}, @md5sig={0x13, 0x12, "91d785d56854605c802ac99f965fe399"}]}}}}}}}, 0x0) 05:52:48 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:48 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000000)=0x1, 0x4) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x10) syz_emit_ethernet(0x76, &(0x7f0000000600)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x15, 0x2, 0x0, 0x0, 0x0, {[@window={0x22, 0x3}, @mptcp=@remove_addr={0x1e, 0xc, 0x0, 0x0, "91322cd95887277910"}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "8d8b36b3b9a1fc281838019645066dac"}, @md5sig={0x13, 0x12, "91d785d56854605c802ac99f965fe399"}]}}}}}}}, 0x0) 05:52:49 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:49 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:52:49 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:52:49 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x0, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:52:49 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000000)=0x1, 0x4) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x10) syz_emit_ethernet(0x76, &(0x7f0000000600)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x15, 0x2, 0x0, 0x0, 0x0, {[@window={0x22, 0x3}, @mptcp=@remove_addr={0x1e, 0xc, 0x0, 0x0, "91322cd95887277910"}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "8d8b36b3b9a1fc281838019645066dac"}, @md5sig={0x13, 0x12, "91d785d56854605c802ac99f965fe399"}]}}}}}}}, 0x0) 05:52:49 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x6}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:52:49 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:49 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:52:49 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:52:50 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000000)=0x1, 0x4) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x10) syz_emit_ethernet(0x76, &(0x7f0000000600)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x15, 0x2, 0x0, 0x0, 0x0, {[@window={0x22, 0x3}, @mptcp=@remove_addr={0x1e, 0xc, 0x0, 0x0, "91322cd95887277910"}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "8d8b36b3b9a1fc281838019645066dac"}, @md5sig={0x13, 0x12, "91d785d56854605c802ac99f965fe399"}]}}}}}}}, 0x0) 05:52:50 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:50 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:52:50 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1b, 0x0, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x10) syz_emit_ethernet(0x76, &(0x7f0000000600)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x15, 0x2, 0x0, 0x0, 0x0, {[@window={0x22, 0x3}, @mptcp=@remove_addr={0x1e, 0xc, 0x0, 0x0, "91322cd95887277910"}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "8d8b36b3b9a1fc281838019645066dac"}, @md5sig={0x13, 0x12, "91d785d56854605c802ac99f965fe399"}]}}}}}}}, 0x0) 05:52:50 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:50 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:52:51 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0x0, 0x0, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {}, 0x0, 0x0, 0x0, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:52:51 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:52:51 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1b, 0x0, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x10) syz_emit_ethernet(0x76, &(0x7f0000000600)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x15, 0x2, 0x0, 0x0, 0x0, {[@window={0x22, 0x3}, @mptcp=@remove_addr={0x1e, 0xc, 0x0, 0x0, "91322cd95887277910"}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "8d8b36b3b9a1fc281838019645066dac"}, @md5sig={0x13, 0x12, "91d785d56854605c802ac99f965fe399"}]}}}}}}}, 0x0) 05:52:51 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:51 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x2, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:52:51 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:52:51 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1b, 0x0, 0x0) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x10) syz_emit_ethernet(0x76, &(0x7f0000000600)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x15, 0x2, 0x0, 0x0, 0x0, {[@window={0x22, 0x3}, @mptcp=@remove_addr={0x1e, 0xc, 0x0, 0x0, "91322cd95887277910"}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "8d8b36b3b9a1fc281838019645066dac"}, @md5sig={0x13, 0x12, "91d785d56854605c802ac99f965fe399"}]}}}}}}}, 0x0) 05:52:51 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:52 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000000), 0x4) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x10) syz_emit_ethernet(0x76, &(0x7f0000000600)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x15, 0x2, 0x0, 0x0, 0x0, {[@window={0x22, 0x3}, @mptcp=@remove_addr={0x1e, 0xc, 0x0, 0x0, "91322cd95887277910"}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "8d8b36b3b9a1fc281838019645066dac"}, @md5sig={0x13, 0x12, "91d785d56854605c802ac99f965fe399"}]}}}}}}}, 0x0) 05:52:52 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:52 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) ioctl$TUNSETLINK(0xffffffffffffffff, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:52 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000000), 0x4) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x10) syz_emit_ethernet(0x76, &(0x7f0000000600)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x15, 0x2, 0x0, 0x0, 0x0, {[@window={0x22, 0x3}, @mptcp=@remove_addr={0x1e, 0xc, 0x0, 0x0, "91322cd95887277910"}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "8d8b36b3b9a1fc281838019645066dac"}, @md5sig={0x13, 0x12, "91d785d56854605c802ac99f965fe399"}]}}}}}}}, 0x0) 05:52:52 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x2, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:52:52 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:52 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:52:52 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x2, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:52:52 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000000), 0x4) bind$inet(r0, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x10) syz_emit_ethernet(0x76, &(0x7f0000000600)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x15, 0x2, 0x0, 0x0, 0x0, {[@window={0x22, 0x3}, @mptcp=@remove_addr={0x1e, 0xc, 0x0, 0x0, "91322cd95887277910"}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "8d8b36b3b9a1fc281838019645066dac"}, @md5sig={0x13, 0x12, "91d785d56854605c802ac99f965fe399"}]}}}}}}}, 0x0) 05:52:52 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x2, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:52:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000000)=0x1, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x10) syz_emit_ethernet(0x76, &(0x7f0000000600)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x15, 0x2, 0x0, 0x0, 0x0, {[@window={0x22, 0x3}, @mptcp=@remove_addr={0x1e, 0xc, 0x0, 0x0, "91322cd95887277910"}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "8d8b36b3b9a1fc281838019645066dac"}, @md5sig={0x13, 0x12, "91d785d56854605c802ac99f965fe399"}]}}}}}}}, 0x0) 05:52:53 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000000)=0x1, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x10) syz_emit_ethernet(0x76, &(0x7f0000000600)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x15, 0x2, 0x0, 0x0, 0x0, {[@window={0x22, 0x3}, @mptcp=@remove_addr={0x1e, 0xc, 0x0, 0x0, "91322cd95887277910"}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "8d8b36b3b9a1fc281838019645066dac"}, @md5sig={0x13, 0x12, "91d785d56854605c802ac99f965fe399"}]}}}}}}}, 0x0) 05:52:53 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:53 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000000)=0x1, 0x4) bind$inet(0xffffffffffffffff, &(0x7f0000000380)={0x2, 0x4e22}, 0x10) listen(r0, 0x10) syz_emit_ethernet(0x76, &(0x7f0000000600)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x15, 0x2, 0x0, 0x0, 0x0, {[@window={0x22, 0x3}, @mptcp=@remove_addr={0x1e, 0xc, 0x0, 0x0, "91322cd95887277910"}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "8d8b36b3b9a1fc281838019645066dac"}, @md5sig={0x13, 0x12, "91d785d56854605c802ac99f965fe399"}]}}}}}}}, 0x0) 05:52:53 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x2, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x0, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4=@rand_addr=0x64010102, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:52:54 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x2, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4=@rand_addr=0x64010102, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:52:54 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x0, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:52:54 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x2, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4, @icmp_id, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:52:54 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:54 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000000)=0x1, 0x4) bind$inet(r0, 0x0, 0x0) listen(r0, 0x10) syz_emit_ethernet(0x76, &(0x7f0000000600)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x15, 0x2, 0x0, 0x0, 0x0, {[@window={0x22, 0x3}, @mptcp=@remove_addr={0x1e, 0xc, 0x0, 0x0, "91322cd95887277910"}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "8d8b36b3b9a1fc281838019645066dac"}, @md5sig={0x13, 0x12, "91d785d56854605c802ac99f965fe399"}]}}}}}}}, 0x0) 05:52:54 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x2, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4=@rand_addr=0x64010102, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x81}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) 05:52:54 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000000)=0x1, 0x4) bind$inet(r0, 0x0, 0x0) listen(r0, 0x10) syz_emit_ethernet(0x76, &(0x7f0000000600)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x15, 0x2, 0x0, 0x0, 0x0, {[@window={0x22, 0x3}, @mptcp=@remove_addr={0x1e, 0xc, 0x0, 0x0, "91322cd95887277910"}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "8d8b36b3b9a1fc281838019645066dac"}, @md5sig={0x13, 0x12, "91d785d56854605c802ac99f965fe399"}]}}}}}}}, 0x0) 05:52:54 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:55 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000940)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x5890, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) mount$bpf(0x0, &(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000740), 0x4, 0x0) 05:52:55 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000000)=0x1, 0x4) bind$inet(r0, 0x0, 0x0) listen(r0, 0x10) syz_emit_ethernet(0x76, &(0x7f0000000600)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x15, 0x2, 0x0, 0x0, 0x0, {[@window={0x22, 0x3}, @mptcp=@remove_addr={0x1e, 0xc, 0x0, 0x0, "91322cd95887277910"}, @timestamp={0x8, 0xa}, @md5sig={0x13, 0x12, "8d8b36b3b9a1fc281838019645066dac"}, @md5sig={0x13, 0x12, "91d785d56854605c802ac99f965fe399"}]}}}}}}}, 0x0) 05:52:55 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xfffffffffffffed3, &(0x7f0000000080)=[{&(0x7f0000000040)="44f000002200050ad25a80648c63940d7e24fc6010003e4025090a00053582c137153e370248038047000000d1bd", 0x33fe0}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) 05:52:55 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000440)='./file0\x00') chdir(&(0x7f00000000c0)='./bus\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0xce141, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000500)=@nat={'nat\x00', 0x1b, 0x5, 0x468, 0xd0, 0x0, 0xffffffff, 0x2d8, 0x2d8, 0x3c0, 0x3c0, 0xffffffff, 0x3c0, 0x3c0, 0x5, 0x0, {[{{@ipv6={@remote, @local, [0x0, 0xff000000, 0xff], [0xff000000, 0xff, 0xffffff00], 'veth1_vlan\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2f, 0x0, 0x6, 0x59}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x2, @ipv4=@broadcast, @ipv4=@remote, @icmp_id=0x66, @gre_key=0x86}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x11, @ipv6=@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4=@rand_addr=0x64010102, @icmp_id=0x66, @port=0x4e24}}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x0, {0xffffffffffffff81}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x4c8) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x401ffc000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x80019c) [ 579.588367][T29773] netlink: 'syz-executor.4': attribute type 62 has an invalid length. [ 579.603745][T29773] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 579.626212][T29773] netlink: 43036 bytes leftover after parsing attributes in process `syz-executor.4'. [ 579.729957][T29773] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 579.766223][T29773] platform regulatory.0: Falling back to sysfs fallback for: regulatory.db [ 579.808768][T29773] ==================================================================