0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000300), &(0x7f0000000340)=ANY=[@ANYBLOB="02fbee013f1b471461a825e1cc3f08d905b6dfcbf7cb44c521d674b75cd5e0a42d854adb53623c3c6bae87c80c2a2d69e0c3194d26b4ef62c11e1182a46651e44083ad6e7c622e79db8b5973d8a79e7c93c73c795a0a3b9a9015cc0e5d549b4a408a08e3f3aac65aed8250d834a87cda0f19c0bc1b600e0379f471a8840482c074b683b02f7302de327f69323eb63d2e9f225cc67e06f9e1abef68460efa00"/174], 0xee, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0x20, 0x70bd29, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, 0x21801, 0x46000}, [@IFLA_GSO_MAX_SEGS={0x8, 0x28, 0xe30a}]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40851) r3 = getpid() preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sched_setscheduler(r3, 0x5, &(0x7f00000001c0)) r4 = inotify_init() inotify_add_watch(r4, &(0x7f0000000000)='.\x00', 0x400017e) r5 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x8) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r5, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x556800}}, './file0\x00'}) ioctl$KVM_GET_MP_STATE(r6, 0x8004ae98, &(0x7f0000000100)) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) ioctl$F2FS_IOC_GET_FEATURES(r5, 0x8004f50c, &(0x7f0000000080)) 02:46:25 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x7a, 0x15, 0x0, 0x0, 0x0, 0x0, 0x1, 0x824b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000300), &(0x7f0000000340)=ANY=[@ANYBLOB="02fbee013f1b471461a825e1cc3f08d905b6dfcbf7cb44c521d674b75cd5e0a42d854adb53623c3c6bae87c80c2a2d69e0c3194d26b4ef62c11e1182a46651e44083ad6e7c622e79db8b5973d8a79e7c93c73c795a0a3b9a9015cc0e5d549b4a408a08e3f3aac65aed8250d834a87cda0f19c0bc1b600e0379f471a8840482c074b683b02f7302de327f69323eb63d2e9f225cc67e06f9e1abef68460efa00"/174], 0xee, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0x20, 0x70bd29, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, 0x21801, 0x46000}, [@IFLA_GSO_MAX_SEGS={0x8, 0x28, 0xe30a}]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40851) r3 = getpid() preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sched_setscheduler(r3, 0x5, &(0x7f00000001c0)) r4 = inotify_init() inotify_add_watch(r4, &(0x7f0000000000)='.\x00', 0x400017e) r5 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x8) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r5, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x556800}}, './file0\x00'}) ioctl$KVM_GET_MP_STATE(r6, 0x8004ae98, &(0x7f0000000100)) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) ioctl$F2FS_IOC_GET_FEATURES(r5, 0x8004f50c, &(0x7f0000000080)) 02:46:25 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x7a, 0x15, 0x0, 0x0, 0x0, 0x0, 0x1, 0x824b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000300), &(0x7f0000000340)=ANY=[@ANYBLOB="02fbee013f1b471461a825e1cc3f08d905b6dfcbf7cb44c521d674b75cd5e0a42d854adb53623c3c6bae87c80c2a2d69e0c3194d26b4ef62c11e1182a46651e44083ad6e7c622e79db8b5973d8a79e7c93c73c795a0a3b9a9015cc0e5d549b4a408a08e3f3aac65aed8250d834a87cda0f19c0bc1b600e0379f471a8840482c074b683b02f7302de327f69323eb63d2e9f225cc67e06f9e1abef68460efa00"/174], 0xee, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0x20, 0x70bd29, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, 0x21801, 0x46000}, [@IFLA_GSO_MAX_SEGS={0x8, 0x28, 0xe30a}]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40851) r3 = getpid() preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sched_setscheduler(r3, 0x5, &(0x7f00000001c0)) r4 = inotify_init() inotify_add_watch(r4, &(0x7f0000000000)='.\x00', 0x400017e) r5 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x8) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r5, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x556800}}, './file0\x00'}) ioctl$KVM_GET_MP_STATE(r6, 0x8004ae98, &(0x7f0000000100)) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) ioctl$F2FS_IOC_GET_FEATURES(r5, 0x8004f50c, &(0x7f0000000080)) 02:46:25 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x7a, 0x15, 0x0, 0x0, 0x0, 0x0, 0x1, 0x824b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000300), &(0x7f0000000340)=ANY=[@ANYBLOB="02fbee013f1b471461a825e1cc3f08d905b6dfcbf7cb44c521d674b75cd5e0a42d854adb53623c3c6bae87c80c2a2d69e0c3194d26b4ef62c11e1182a46651e44083ad6e7c622e79db8b5973d8a79e7c93c73c795a0a3b9a9015cc0e5d549b4a408a08e3f3aac65aed8250d834a87cda0f19c0bc1b600e0379f471a8840482c074b683b02f7302de327f69323eb63d2e9f225cc67e06f9e1abef68460efa00"/174], 0xee, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0x20, 0x70bd29, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, 0x21801, 0x46000}, [@IFLA_GSO_MAX_SEGS={0x8, 0x28, 0xe30a}]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40851) r3 = getpid() preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sched_setscheduler(r3, 0x5, &(0x7f00000001c0)) r4 = inotify_init() inotify_add_watch(r4, &(0x7f0000000000)='.\x00', 0x400017e) r5 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x8) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r5, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x556800}}, './file0\x00'}) ioctl$KVM_GET_MP_STATE(r6, 0x8004ae98, &(0x7f0000000100)) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) ioctl$F2FS_IOC_GET_FEATURES(r5, 0x8004f50c, &(0x7f0000000080)) 02:46:26 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x7a, 0x15, 0x0, 0x0, 0x0, 0x0, 0x1, 0x824b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000300), &(0x7f0000000340)=ANY=[@ANYBLOB="02fbee013f1b471461a825e1cc3f08d905b6dfcbf7cb44c521d674b75cd5e0a42d854adb53623c3c6bae87c80c2a2d69e0c3194d26b4ef62c11e1182a46651e44083ad6e7c622e79db8b5973d8a79e7c93c73c795a0a3b9a9015cc0e5d549b4a408a08e3f3aac65aed8250d834a87cda0f19c0bc1b600e0379f471a8840482c074b683b02f7302de327f69323eb63d2e9f225cc67e06f9e1abef68460efa00"/174], 0xee, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0x20, 0x70bd29, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, 0x21801, 0x46000}, [@IFLA_GSO_MAX_SEGS={0x8, 0x28, 0xe30a}]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40851) r3 = getpid() preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sched_setscheduler(r3, 0x5, &(0x7f00000001c0)) r4 = inotify_init() inotify_add_watch(r4, &(0x7f0000000000)='.\x00', 0x400017e) r5 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x8) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r5, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x556800}}, './file0\x00'}) ioctl$KVM_GET_MP_STATE(r6, 0x8004ae98, &(0x7f0000000100)) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) ioctl$F2FS_IOC_GET_FEATURES(r5, 0x8004f50c, &(0x7f0000000080)) 02:46:26 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x7a, 0x15, 0x0, 0x0, 0x0, 0x0, 0x1, 0x824b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000300), &(0x7f0000000340)=ANY=[@ANYBLOB="02fbee013f1b471461a825e1cc3f08d905b6dfcbf7cb44c521d674b75cd5e0a42d854adb53623c3c6bae87c80c2a2d69e0c3194d26b4ef62c11e1182a46651e44083ad6e7c622e79db8b5973d8a79e7c93c73c795a0a3b9a9015cc0e5d549b4a408a08e3f3aac65aed8250d834a87cda0f19c0bc1b600e0379f471a8840482c074b683b02f7302de327f69323eb63d2e9f225cc67e06f9e1abef68460efa00"/174], 0xee, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0x20, 0x70bd29, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, 0x21801, 0x46000}, [@IFLA_GSO_MAX_SEGS={0x8, 0x28, 0xe30a}]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40851) r3 = getpid() preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sched_setscheduler(r3, 0x5, &(0x7f00000001c0)) r4 = inotify_init() inotify_add_watch(r4, &(0x7f0000000000)='.\x00', 0x400017e) r5 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x8) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r5, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x556800}}, './file0\x00'}) ioctl$KVM_GET_MP_STATE(r6, 0x8004ae98, &(0x7f0000000100)) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) ioctl$F2FS_IOC_GET_FEATURES(r5, 0x8004f50c, &(0x7f0000000080)) [ 871.299934] ieee802154 phy0 wpan0: encryption failed: -22 [ 871.305556] ieee802154 phy1 wpan1: encryption failed: -22 02:46:28 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x7a, 0x15, 0x0, 0x0, 0x0, 0x0, 0x1, 0x824b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000300), &(0x7f0000000340)=ANY=[@ANYBLOB="02fbee013f1b471461a825e1cc3f08d905b6dfcbf7cb44c521d674b75cd5e0a42d854adb53623c3c6bae87c80c2a2d69e0c3194d26b4ef62c11e1182a46651e44083ad6e7c622e79db8b5973d8a79e7c93c73c795a0a3b9a9015cc0e5d549b4a408a08e3f3aac65aed8250d834a87cda0f19c0bc1b600e0379f471a8840482c074b683b02f7302de327f69323eb63d2e9f225cc67e06f9e1abef68460efa00"/174], 0xee, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0x20, 0x70bd29, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, 0x21801, 0x46000}, [@IFLA_GSO_MAX_SEGS={0x8, 0x28, 0xe30a}]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40851) r3 = getpid() preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sched_setscheduler(r3, 0x5, &(0x7f00000001c0)) r4 = inotify_init() inotify_add_watch(r4, &(0x7f0000000000)='.\x00', 0x400017e) r5 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x8) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r5, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x556800}}, './file0\x00'}) ioctl$KVM_GET_MP_STATE(r6, 0x8004ae98, &(0x7f0000000100)) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) ioctl$F2FS_IOC_GET_FEATURES(r5, 0x8004f50c, &(0x7f0000000080)) 02:46:28 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x7a, 0x15, 0x0, 0x0, 0x0, 0x0, 0x1, 0x824b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000300), &(0x7f0000000340)=ANY=[@ANYBLOB="02fbee013f1b471461a825e1cc3f08d905b6dfcbf7cb44c521d674b75cd5e0a42d854adb53623c3c6bae87c80c2a2d69e0c3194d26b4ef62c11e1182a46651e44083ad6e7c622e79db8b5973d8a79e7c93c73c795a0a3b9a9015cc0e5d549b4a408a08e3f3aac65aed8250d834a87cda0f19c0bc1b600e0379f471a8840482c074b683b02f7302de327f69323eb63d2e9f225cc67e06f9e1abef68460efa00"/174], 0xee, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0x20, 0x70bd29, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, 0x21801, 0x46000}, [@IFLA_GSO_MAX_SEGS={0x8, 0x28, 0xe30a}]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40851) r3 = getpid() preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sched_setscheduler(r3, 0x5, &(0x7f00000001c0)) r4 = inotify_init() inotify_add_watch(r4, &(0x7f0000000000)='.\x00', 0x400017e) r5 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x8) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r5, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x556800}}, './file0\x00'}) ioctl$KVM_GET_MP_STATE(r6, 0x8004ae98, &(0x7f0000000100)) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) ioctl$F2FS_IOC_GET_FEATURES(r5, 0x8004f50c, &(0x7f0000000080)) 02:46:29 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x7a, 0x15, 0x0, 0x0, 0x0, 0x0, 0x1, 0x824b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000300), &(0x7f0000000340)=ANY=[@ANYBLOB="02fbee013f1b471461a825e1cc3f08d905b6dfcbf7cb44c521d674b75cd5e0a42d854adb53623c3c6bae87c80c2a2d69e0c3194d26b4ef62c11e1182a46651e44083ad6e7c622e79db8b5973d8a79e7c93c73c795a0a3b9a9015cc0e5d549b4a408a08e3f3aac65aed8250d834a87cda0f19c0bc1b600e0379f471a8840482c074b683b02f7302de327f69323eb63d2e9f225cc67e06f9e1abef68460efa00"/174], 0xee, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0x20, 0x70bd29, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, 0x21801, 0x46000}, [@IFLA_GSO_MAX_SEGS={0x8, 0x28, 0xe30a}]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40851) r3 = getpid() preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sched_setscheduler(r3, 0x5, &(0x7f00000001c0)) r4 = inotify_init() inotify_add_watch(r4, &(0x7f0000000000)='.\x00', 0x400017e) r5 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x8) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r5, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x556800}}, './file0\x00'}) ioctl$KVM_GET_MP_STATE(r6, 0x8004ae98, &(0x7f0000000100)) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) ioctl$F2FS_IOC_GET_FEATURES(r5, 0x8004f50c, &(0x7f0000000080)) 02:46:29 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x7a, 0x15, 0x0, 0x0, 0x0, 0x0, 0x1, 0x824b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000300), &(0x7f0000000340)=ANY=[@ANYBLOB="02fbee013f1b471461a825e1cc3f08d905b6dfcbf7cb44c521d674b75cd5e0a42d854adb53623c3c6bae87c80c2a2d69e0c3194d26b4ef62c11e1182a46651e44083ad6e7c622e79db8b5973d8a79e7c93c73c795a0a3b9a9015cc0e5d549b4a408a08e3f3aac65aed8250d834a87cda0f19c0bc1b600e0379f471a8840482c074b683b02f7302de327f69323eb63d2e9f225cc67e06f9e1abef68460efa00"/174], 0xee, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0x20, 0x70bd29, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, 0x21801, 0x46000}, [@IFLA_GSO_MAX_SEGS={0x8, 0x28, 0xe30a}]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40851) r3 = getpid() preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sched_setscheduler(r3, 0x5, &(0x7f00000001c0)) r4 = inotify_init() inotify_add_watch(r4, &(0x7f0000000000)='.\x00', 0x400017e) r5 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x8) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r5, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x556800}}, './file0\x00'}) ioctl$KVM_GET_MP_STATE(r6, 0x8004ae98, &(0x7f0000000100)) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) ioctl$F2FS_IOC_GET_FEATURES(r5, 0x8004f50c, &(0x7f0000000080)) 02:46:29 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x7a, 0x15, 0x0, 0x0, 0x0, 0x0, 0x1, 0x824b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000300), &(0x7f0000000340)=ANY=[@ANYBLOB="02fbee013f1b471461a825e1cc3f08d905b6dfcbf7cb44c521d674b75cd5e0a42d854adb53623c3c6bae87c80c2a2d69e0c3194d26b4ef62c11e1182a46651e44083ad6e7c622e79db8b5973d8a79e7c93c73c795a0a3b9a9015cc0e5d549b4a408a08e3f3aac65aed8250d834a87cda0f19c0bc1b600e0379f471a8840482c074b683b02f7302de327f69323eb63d2e9f225cc67e06f9e1abef68460efa00"/174], 0xee, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0x20, 0x70bd29, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, 0x21801, 0x46000}, [@IFLA_GSO_MAX_SEGS={0x8, 0x28, 0xe30a}]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40851) r3 = getpid() preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sched_setscheduler(r3, 0x5, &(0x7f00000001c0)) r4 = inotify_init() inotify_add_watch(r4, &(0x7f0000000000)='.\x00', 0x400017e) r5 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x8) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r5, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x556800}}, './file0\x00'}) ioctl$KVM_GET_MP_STATE(r6, 0x8004ae98, &(0x7f0000000100)) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) ioctl$F2FS_IOC_GET_FEATURES(r5, 0x8004f50c, &(0x7f0000000080)) 02:46:29 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x7a, 0x15, 0x0, 0x0, 0x0, 0x0, 0x1, 0x824b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000300), &(0x7f0000000340)=ANY=[@ANYBLOB="02fbee013f1b471461a825e1cc3f08d905b6dfcbf7cb44c521d674b75cd5e0a42d854adb53623c3c6bae87c80c2a2d69e0c3194d26b4ef62c11e1182a46651e44083ad6e7c622e79db8b5973d8a79e7c93c73c795a0a3b9a9015cc0e5d549b4a408a08e3f3aac65aed8250d834a87cda0f19c0bc1b600e0379f471a8840482c074b683b02f7302de327f69323eb63d2e9f225cc67e06f9e1abef68460efa00"/174], 0xee, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0x20, 0x70bd29, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, 0x21801, 0x46000}, [@IFLA_GSO_MAX_SEGS={0x8, 0x28, 0xe30a}]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40851) r3 = getpid() preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sched_setscheduler(r3, 0x5, &(0x7f00000001c0)) r4 = inotify_init() inotify_add_watch(r4, &(0x7f0000000000)='.\x00', 0x400017e) r5 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x8) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r5, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x556800}}, './file0\x00'}) ioctl$KVM_GET_MP_STATE(r6, 0x8004ae98, &(0x7f0000000100)) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) ioctl$F2FS_IOC_GET_FEATURES(r5, 0x8004f50c, &(0x7f0000000080)) 02:46:32 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x7a, 0x15, 0x0, 0x0, 0x0, 0x0, 0x1, 0x824b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000300), &(0x7f0000000340)=ANY=[@ANYBLOB="02fbee013f1b471461a825e1cc3f08d905b6dfcbf7cb44c521d674b75cd5e0a42d854adb53623c3c6bae87c80c2a2d69e0c3194d26b4ef62c11e1182a46651e44083ad6e7c622e79db8b5973d8a79e7c93c73c795a0a3b9a9015cc0e5d549b4a408a08e3f3aac65aed8250d834a87cda0f19c0bc1b600e0379f471a8840482c074b683b02f7302de327f69323eb63d2e9f225cc67e06f9e1abef68460efa00"/174], 0xee, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0x20, 0x70bd29, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, 0x21801, 0x46000}, [@IFLA_GSO_MAX_SEGS={0x8, 0x28, 0xe30a}]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40851) r3 = getpid() preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sched_setscheduler(r3, 0x5, &(0x7f00000001c0)) r4 = inotify_init() inotify_add_watch(r4, &(0x7f0000000000)='.\x00', 0x400017e) r5 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x8) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r5, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x556800}}, './file0\x00'}) ioctl$KVM_GET_MP_STATE(r6, 0x8004ae98, &(0x7f0000000100)) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) ioctl$F2FS_IOC_GET_FEATURES(r5, 0x8004f50c, &(0x7f0000000080)) 02:46:32 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x7a, 0x15, 0x0, 0x0, 0x0, 0x0, 0x1, 0x824b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000300), &(0x7f0000000340)=ANY=[@ANYBLOB="02fbee013f1b471461a825e1cc3f08d905b6dfcbf7cb44c521d674b75cd5e0a42d854adb53623c3c6bae87c80c2a2d69e0c3194d26b4ef62c11e1182a46651e44083ad6e7c622e79db8b5973d8a79e7c93c73c795a0a3b9a9015cc0e5d549b4a408a08e3f3aac65aed8250d834a87cda0f19c0bc1b600e0379f471a8840482c074b683b02f7302de327f69323eb63d2e9f225cc67e06f9e1abef68460efa00"/174], 0xee, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0x20, 0x70bd29, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, 0x21801, 0x46000}, [@IFLA_GSO_MAX_SEGS={0x8, 0x28, 0xe30a}]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40851) r3 = getpid() preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sched_setscheduler(r3, 0x5, &(0x7f00000001c0)) r4 = inotify_init() inotify_add_watch(r4, &(0x7f0000000000)='.\x00', 0x400017e) r5 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x8) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r5, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x556800}}, './file0\x00'}) ioctl$KVM_GET_MP_STATE(r6, 0x8004ae98, &(0x7f0000000100)) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) ioctl$F2FS_IOC_GET_FEATURES(r5, 0x8004f50c, &(0x7f0000000080)) 02:46:32 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x7a, 0x15, 0x0, 0x0, 0x0, 0x0, 0x1, 0x824b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000300), &(0x7f0000000340)=ANY=[@ANYBLOB="02fbee013f1b471461a825e1cc3f08d905b6dfcbf7cb44c521d674b75cd5e0a42d854adb53623c3c6bae87c80c2a2d69e0c3194d26b4ef62c11e1182a46651e44083ad6e7c622e79db8b5973d8a79e7c93c73c795a0a3b9a9015cc0e5d549b4a408a08e3f3aac65aed8250d834a87cda0f19c0bc1b600e0379f471a8840482c074b683b02f7302de327f69323eb63d2e9f225cc67e06f9e1abef68460efa00"/174], 0xee, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0x20, 0x70bd29, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, 0x21801, 0x46000}, [@IFLA_GSO_MAX_SEGS={0x8, 0x28, 0xe30a}]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40851) r3 = getpid() preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sched_setscheduler(r3, 0x5, &(0x7f00000001c0)) r4 = inotify_init() inotify_add_watch(r4, &(0x7f0000000000)='.\x00', 0x400017e) r5 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x8) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r5, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x556800}}, './file0\x00'}) ioctl$KVM_GET_MP_STATE(r6, 0x8004ae98, &(0x7f0000000100)) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) ioctl$F2FS_IOC_GET_FEATURES(r5, 0x8004f50c, &(0x7f0000000080)) 02:46:32 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x7a, 0x15, 0x0, 0x0, 0x0, 0x0, 0x1, 0x824b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000300), &(0x7f0000000340)=ANY=[@ANYBLOB="02fbee013f1b471461a825e1cc3f08d905b6dfcbf7cb44c521d674b75cd5e0a42d854adb53623c3c6bae87c80c2a2d69e0c3194d26b4ef62c11e1182a46651e44083ad6e7c622e79db8b5973d8a79e7c93c73c795a0a3b9a9015cc0e5d549b4a408a08e3f3aac65aed8250d834a87cda0f19c0bc1b600e0379f471a8840482c074b683b02f7302de327f69323eb63d2e9f225cc67e06f9e1abef68460efa00"/174], 0xee, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0x20, 0x70bd29, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, 0x21801, 0x46000}, [@IFLA_GSO_MAX_SEGS={0x8, 0x28, 0xe30a}]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40851) r3 = getpid() preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sched_setscheduler(r3, 0x5, &(0x7f00000001c0)) r4 = inotify_init() inotify_add_watch(r4, &(0x7f0000000000)='.\x00', 0x400017e) r5 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x8) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r5, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x556800}}, './file0\x00'}) ioctl$KVM_GET_MP_STATE(r6, 0x8004ae98, &(0x7f0000000100)) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) ioctl$F2FS_IOC_GET_FEATURES(r5, 0x8004f50c, &(0x7f0000000080)) 02:46:33 executing program 2: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000280)={'vcan0\x00', 0x0}) bind$xdp(r0, &(0x7f0000000040)={0x2c, 0x0, r2, 0x1a}, 0x10) 02:46:33 executing program 2: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000280)={'vcan0\x00', 0x0}) bind$xdp(r0, &(0x7f0000000040)={0x2c, 0x0, r2, 0x1a}, 0x10) 02:46:33 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000280)={'vcan0\x00', 0x0}) bind$xdp(r0, &(0x7f0000000040)={0x2c, 0x0, r2, 0x1a}, 0x10) 02:46:33 executing program 2: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000280)={'vcan0\x00', 0x0}) bind$xdp(r0, &(0x7f0000000040)={0x2c, 0x0, r2, 0x1a}, 0x10) 02:46:33 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000280)={'vcan0\x00', 0x0}) bind$xdp(r0, &(0x7f0000000040)={0x2c, 0x0, r2, 0x1a}, 0x10) 02:46:33 executing program 2: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000280)={'vcan0\x00', 0x0}) bind$xdp(r0, &(0x7f0000000040)={0x2c, 0x0, r2, 0x1a}, 0x10) 02:46:34 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x507, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000007c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x44, 0x3, 0xa, 0x0, 0x0, 0x0, {0xa, 0x0, 0x8}, [@NFTA_CHAIN_HOOK={0x18, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'vlan0\x00'}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x4}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_USERDATA={0x4}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xe0, 0x0, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x97, 0x6, "a2847d0e4d9c362cde89365fcc56e44aef1d4415b60c737ad33458f8f3ebae85c9a18b314f0a0cdcad10995798fd74198a34268b13d1d45a9e9235bca122b1bb9e3ec6e03e35676c9ca0a17f0712e8384d12dc1cae9a8f39f8955bda950bd3e966a360136b5e13fb92a20dd9f98e84e9ae2fbdc908ed6d28e6f73a9709a1d73b84d444423ed8ffb47d8c1c56593549cf58124c"}, @NFTA_TABLE_USERDATA={0x20, 0x6, "3c1861e35545fa13a0e3a9ad337b0bb70dcc4eb3b252ae3954c91cff"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELTABLE={0x234, 0x2, 0xa, 0x3, 0x0, 0x0, {0xc}, [@NFTA_TABLE_USERDATA={0xf3, 0x6, "0eedee994f84e483b2ee73171522162c0d5859a48a275153ad38924a88ffa4d3045b7ac464a02f076c021b65690719f64c97c4c474f6f599812256c0f897606ff7266af528e26f35e6151eb3c8256b0161ba99dfba59422a678a56d575cb67eede578a2b0df0148788504e5b3ee0a43ff12d1877fbac56298967e5ab6f889a1d3eba6d84f3a615b96aef5ab0d4b5ee4d1815f75cca39d4ac9eaa12ebb1b8a6b307ba79578518f51e84383028c578c73f4207d5c0f54415278180aa37a5449bcafed8b2d46338ba8c8d3bffc801865ef59d1124f5cf935df77d73b793f12beaa34cb384c30160abe0c0a8ed836614c3"}, @NFTA_TABLE_USERDATA={0x46, 0x6, "9464f851c0a9fc9d964a91d0d0a48cda0630764e0706d9403e96e9b55b6650cb57abdb63146a7288d7b599754485079792fb60ba046098552e25c5a3301c9ceb4f04"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0xc0, 0x6, "8e9577650594e8fc90caa94d82a184d41b7d73597dbcf02be4a2cc3ecb69258464726b5e64de3365546700e09732e3a2d54327d70e1569556d46da5e325de5c2f2aa56e2e5611962b42b2381ebb1270b41299ada82986f96d8b37328887f2e3a91b0125e96170b2c9901b69e5b87c7e11badce243440cd7f5afd0afbfb1130b04e44b0ae697538e297887c1a6f4c04d80cf5fc5f1ab311b2be61fcd6d4af6ee461887e5d82d2aaf23c9cbdbbf51e2d75c9a969c83a30ad7e1081214a"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}], {0x14}}, 0x3f8}, 0x1, 0x0, 0x0, 0x18}, 0x40) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x5c, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004801}, 0x800) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r3 = dup(r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6, 0x2, 0x91, 0x9, 0x0, 0x4, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xf1, 0x13}, 0x9040, 0x500, 0x2, 0x9, 0x5, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x9}, 0x0, 0x3, r3, 0xa) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) waitid(0x0, 0x0, 0x0, 0x80000000, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) waitid(0x0, 0x0, &(0x7f0000000400), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) r5 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0xfe68}}, 0x0) r6 = socket(0x10, 0x803, 0x0) dup3(r6, r5, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x15, 0x9, "2bbb19e5631df896ba98674d0b5600000000000000186049da15bffbdd1a3e02ca0718c73559bc4fe9801d897649294687be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7]}) socket$netlink(0x10, 0x3, 0x0) 02:46:34 executing program 3: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000000)=0x8000, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000280)={'vcan0\x00', 0x0}) bind$xdp(r0, &(0x7f0000000040)={0x2c, 0x0, r2, 0x1a}, 0x10) 02:46:34 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x7a, 0x15, 0x0, 0x0, 0x0, 0x0, 0x1, 0x824b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000300), &(0x7f0000000340)=ANY=[@ANYBLOB="02fbee013f1b471461a825e1cc3f08d905b6dfcbf7cb44c521d674b75cd5e0a42d854adb53623c3c6bae87c80c2a2d69e0c3194d26b4ef62c11e1182a46651e44083ad6e7c622e79db8b5973d8a79e7c93c73c795a0a3b9a9015cc0e5d549b4a408a08e3f3aac65aed8250d834a87cda0f19c0bc1b600e0379f471a8840482c074b683b02f7302de327f69323eb63d2e9f225cc67e06f9e1abef68460efa00"/174], 0xee, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0x20, 0x70bd29, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, 0x21801, 0x46000}, [@IFLA_GSO_MAX_SEGS={0x8, 0x28, 0xe30a}]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40851) r3 = getpid() preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sched_setscheduler(r3, 0x5, &(0x7f00000001c0)) r4 = inotify_init() inotify_add_watch(r4, &(0x7f0000000000)='.\x00', 0x400017e) r5 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x8) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r5, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x556800}}, './file0\x00'}) ioctl$KVM_GET_MP_STATE(r6, 0x8004ae98, &(0x7f0000000100)) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) ioctl$F2FS_IOC_GET_FEATURES(r5, 0x8004f50c, &(0x7f0000000080)) 02:46:34 executing program 4: syz_mount_image$f2fs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200080, &(0x7f0000000140)={[{@jqfmt_vfsv1}, {@nolazytime}, {@noinline_dentry}]}, 0x1, 0x54f3, &(0x7f0000005640)="$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") mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000100)='./file1\x00', 0x200) 02:46:34 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x7a, 0x15, 0x0, 0x0, 0x0, 0x0, 0x1, 0x824b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000300), &(0x7f0000000340)=ANY=[@ANYBLOB="02fbee013f1b471461a825e1cc3f08d905b6dfcbf7cb44c521d674b75cd5e0a42d854adb53623c3c6bae87c80c2a2d69e0c3194d26b4ef62c11e1182a46651e44083ad6e7c622e79db8b5973d8a79e7c93c73c795a0a3b9a9015cc0e5d549b4a408a08e3f3aac65aed8250d834a87cda0f19c0bc1b600e0379f471a8840482c074b683b02f7302de327f69323eb63d2e9f225cc67e06f9e1abef68460efa00"/174], 0xee, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0x20, 0x70bd29, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, 0x21801, 0x46000}, [@IFLA_GSO_MAX_SEGS={0x8, 0x28, 0xe30a}]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40851) r3 = getpid() preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sched_setscheduler(r3, 0x5, &(0x7f00000001c0)) r4 = inotify_init() inotify_add_watch(r4, &(0x7f0000000000)='.\x00', 0x400017e) r5 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x8) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r5, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x556800}}, './file0\x00'}) ioctl$KVM_GET_MP_STATE(r6, 0x8004ae98, &(0x7f0000000100)) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) ioctl$F2FS_IOC_GET_FEATURES(r5, 0x8004f50c, &(0x7f0000000080)) 02:46:34 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) ioctl$VIDIOC_S_EDID(r0, 0xc0285629, &(0x7f0000000400)={0x0, 0x0, 0x401, '\x00', 0x0}) 02:46:34 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xfdffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x7a, 0x15, 0x0, 0x0, 0x0, 0x0, 0x1, 0x824b0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x0, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000300), &(0x7f0000000340)=ANY=[@ANYBLOB="02fbee013f1b471461a825e1cc3f08d905b6dfcbf7cb44c521d674b75cd5e0a42d854adb53623c3c6bae87c80c2a2d69e0c3194d26b4ef62c11e1182a46651e44083ad6e7c622e79db8b5973d8a79e7c93c73c795a0a3b9a9015cc0e5d549b4a408a08e3f3aac65aed8250d834a87cda0f19c0bc1b600e0379f471a8840482c074b683b02f7302de327f69323eb63d2e9f225cc67e06f9e1abef68460efa00"/174], 0xee, 0x2) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)=@newlink={0x28, 0x10, 0x20, 0x70bd29, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, 0x21801, 0x46000}, [@IFLA_GSO_MAX_SEGS={0x8, 0x28, 0xe30a}]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x40851) r3 = getpid() preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) sched_setscheduler(r3, 0x5, &(0x7f00000001c0)) r4 = inotify_init() inotify_add_watch(r4, &(0x7f0000000000)='.\x00', 0x400017e) r5 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x8) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r5, 0xc0189373, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {0x556800}}, './file0\x00'}) ioctl$KVM_GET_MP_STATE(r6, 0x8004ae98, &(0x7f0000000100)) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) open$dir(&(0x7f0000000040)='./file0\x00', 0x8027e, 0x0) ioctl$F2FS_IOC_GET_FEATURES(r5, 0x8004f50c, &(0x7f0000000080)) 02:46:34 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) ioctl$VIDIOC_S_EDID(r0, 0xc0285629, &(0x7f0000000400)={0x0, 0x0, 0x401, '\x00', 0x0}) 02:46:34 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) ioctl$VIDIOC_S_EDID(r0, 0xc0285629, &(0x7f0000000400)={0x0, 0x0, 0x401, '\x00', 0x0}) 02:46:34 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) ioctl$VIDIOC_S_EDID(r0, 0xc0285629, &(0x7f0000000400)={0x0, 0x0, 0x401, '\x00', 0x0}) 02:46:34 executing program 3: r0 = syz_clone(0x21008000, 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x29) 02:46:34 executing program 3: r0 = syz_clone(0x21008000, 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x29) [ 878.508241] Bluetooth: hci3: command 0x0406 tx timeout 02:46:37 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x507, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000007c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x44, 0x3, 0xa, 0x0, 0x0, 0x0, {0xa, 0x0, 0x8}, [@NFTA_CHAIN_HOOK={0x18, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'vlan0\x00'}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x4}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_USERDATA={0x4}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xe0, 0x0, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x97, 0x6, "a2847d0e4d9c362cde89365fcc56e44aef1d4415b60c737ad33458f8f3ebae85c9a18b314f0a0cdcad10995798fd74198a34268b13d1d45a9e9235bca122b1bb9e3ec6e03e35676c9ca0a17f0712e8384d12dc1cae9a8f39f8955bda950bd3e966a360136b5e13fb92a20dd9f98e84e9ae2fbdc908ed6d28e6f73a9709a1d73b84d444423ed8ffb47d8c1c56593549cf58124c"}, @NFTA_TABLE_USERDATA={0x20, 0x6, "3c1861e35545fa13a0e3a9ad337b0bb70dcc4eb3b252ae3954c91cff"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELTABLE={0x234, 0x2, 0xa, 0x3, 0x0, 0x0, {0xc}, [@NFTA_TABLE_USERDATA={0xf3, 0x6, "0eedee994f84e483b2ee73171522162c0d5859a48a275153ad38924a88ffa4d3045b7ac464a02f076c021b65690719f64c97c4c474f6f599812256c0f897606ff7266af528e26f35e6151eb3c8256b0161ba99dfba59422a678a56d575cb67eede578a2b0df0148788504e5b3ee0a43ff12d1877fbac56298967e5ab6f889a1d3eba6d84f3a615b96aef5ab0d4b5ee4d1815f75cca39d4ac9eaa12ebb1b8a6b307ba79578518f51e84383028c578c73f4207d5c0f54415278180aa37a5449bcafed8b2d46338ba8c8d3bffc801865ef59d1124f5cf935df77d73b793f12beaa34cb384c30160abe0c0a8ed836614c3"}, @NFTA_TABLE_USERDATA={0x46, 0x6, "9464f851c0a9fc9d964a91d0d0a48cda0630764e0706d9403e96e9b55b6650cb57abdb63146a7288d7b599754485079792fb60ba046098552e25c5a3301c9ceb4f04"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0xc0, 0x6, "8e9577650594e8fc90caa94d82a184d41b7d73597dbcf02be4a2cc3ecb69258464726b5e64de3365546700e09732e3a2d54327d70e1569556d46da5e325de5c2f2aa56e2e5611962b42b2381ebb1270b41299ada82986f96d8b37328887f2e3a91b0125e96170b2c9901b69e5b87c7e11badce243440cd7f5afd0afbfb1130b04e44b0ae697538e297887c1a6f4c04d80cf5fc5f1ab311b2be61fcd6d4af6ee461887e5d82d2aaf23c9cbdbbf51e2d75c9a969c83a30ad7e1081214a"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}], {0x14}}, 0x3f8}, 0x1, 0x0, 0x0, 0x18}, 0x40) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x5c, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004801}, 0x800) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r3 = dup(r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6, 0x2, 0x91, 0x9, 0x0, 0x4, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xf1, 0x13}, 0x9040, 0x500, 0x2, 0x9, 0x5, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x9}, 0x0, 0x3, r3, 0xa) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) waitid(0x0, 0x0, 0x0, 0x80000000, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) waitid(0x0, 0x0, &(0x7f0000000400), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) r5 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0xfe68}}, 0x0) r6 = socket(0x10, 0x803, 0x0) dup3(r6, r5, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x15, 0x9, "2bbb19e5631df896ba98674d0b5600000000000000186049da15bffbdd1a3e02ca0718c73559bc4fe9801d897649294687be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7]}) socket$netlink(0x10, 0x3, 0x0) 02:46:37 executing program 3: r0 = syz_clone(0x21008000, 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x29) 02:46:37 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x507, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000007c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x44, 0x3, 0xa, 0x0, 0x0, 0x0, {0xa, 0x0, 0x8}, [@NFTA_CHAIN_HOOK={0x18, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'vlan0\x00'}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x4}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_USERDATA={0x4}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xe0, 0x0, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x97, 0x6, "a2847d0e4d9c362cde89365fcc56e44aef1d4415b60c737ad33458f8f3ebae85c9a18b314f0a0cdcad10995798fd74198a34268b13d1d45a9e9235bca122b1bb9e3ec6e03e35676c9ca0a17f0712e8384d12dc1cae9a8f39f8955bda950bd3e966a360136b5e13fb92a20dd9f98e84e9ae2fbdc908ed6d28e6f73a9709a1d73b84d444423ed8ffb47d8c1c56593549cf58124c"}, @NFTA_TABLE_USERDATA={0x20, 0x6, "3c1861e35545fa13a0e3a9ad337b0bb70dcc4eb3b252ae3954c91cff"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELTABLE={0x234, 0x2, 0xa, 0x3, 0x0, 0x0, {0xc}, [@NFTA_TABLE_USERDATA={0xf3, 0x6, "0eedee994f84e483b2ee73171522162c0d5859a48a275153ad38924a88ffa4d3045b7ac464a02f076c021b65690719f64c97c4c474f6f599812256c0f897606ff7266af528e26f35e6151eb3c8256b0161ba99dfba59422a678a56d575cb67eede578a2b0df0148788504e5b3ee0a43ff12d1877fbac56298967e5ab6f889a1d3eba6d84f3a615b96aef5ab0d4b5ee4d1815f75cca39d4ac9eaa12ebb1b8a6b307ba79578518f51e84383028c578c73f4207d5c0f54415278180aa37a5449bcafed8b2d46338ba8c8d3bffc801865ef59d1124f5cf935df77d73b793f12beaa34cb384c30160abe0c0a8ed836614c3"}, @NFTA_TABLE_USERDATA={0x46, 0x6, "9464f851c0a9fc9d964a91d0d0a48cda0630764e0706d9403e96e9b55b6650cb57abdb63146a7288d7b599754485079792fb60ba046098552e25c5a3301c9ceb4f04"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0xc0, 0x6, "8e9577650594e8fc90caa94d82a184d41b7d73597dbcf02be4a2cc3ecb69258464726b5e64de3365546700e09732e3a2d54327d70e1569556d46da5e325de5c2f2aa56e2e5611962b42b2381ebb1270b41299ada82986f96d8b37328887f2e3a91b0125e96170b2c9901b69e5b87c7e11badce243440cd7f5afd0afbfb1130b04e44b0ae697538e297887c1a6f4c04d80cf5fc5f1ab311b2be61fcd6d4af6ee461887e5d82d2aaf23c9cbdbbf51e2d75c9a969c83a30ad7e1081214a"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}], {0x14}}, 0x3f8}, 0x1, 0x0, 0x0, 0x18}, 0x40) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x5c, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004801}, 0x800) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r3 = dup(r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6, 0x2, 0x91, 0x9, 0x0, 0x4, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xf1, 0x13}, 0x9040, 0x500, 0x2, 0x9, 0x5, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x9}, 0x0, 0x3, r3, 0xa) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) waitid(0x0, 0x0, 0x0, 0x80000000, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) waitid(0x0, 0x0, &(0x7f0000000400), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) r5 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0xfe68}}, 0x0) r6 = socket(0x10, 0x803, 0x0) dup3(r6, r5, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x15, 0x9, "2bbb19e5631df896ba98674d0b5600000000000000186049da15bffbdd1a3e02ca0718c73559bc4fe9801d897649294687be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7]}) socket$netlink(0x10, 0x3, 0x0) 02:46:37 executing program 4: syz_mount_image$f2fs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200080, &(0x7f0000000140)={[{@jqfmt_vfsv1}, {@nolazytime}, {@noinline_dentry}]}, 0x1, 0x54f3, &(0x7f0000005640)="$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") mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000100)='./file1\x00', 0x200) 02:46:37 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x507, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000007c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x44, 0x3, 0xa, 0x0, 0x0, 0x0, {0xa, 0x0, 0x8}, [@NFTA_CHAIN_HOOK={0x18, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'vlan0\x00'}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x4}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_USERDATA={0x4}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xe0, 0x0, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x97, 0x6, "a2847d0e4d9c362cde89365fcc56e44aef1d4415b60c737ad33458f8f3ebae85c9a18b314f0a0cdcad10995798fd74198a34268b13d1d45a9e9235bca122b1bb9e3ec6e03e35676c9ca0a17f0712e8384d12dc1cae9a8f39f8955bda950bd3e966a360136b5e13fb92a20dd9f98e84e9ae2fbdc908ed6d28e6f73a9709a1d73b84d444423ed8ffb47d8c1c56593549cf58124c"}, @NFTA_TABLE_USERDATA={0x20, 0x6, "3c1861e35545fa13a0e3a9ad337b0bb70dcc4eb3b252ae3954c91cff"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELTABLE={0x234, 0x2, 0xa, 0x3, 0x0, 0x0, {0xc}, [@NFTA_TABLE_USERDATA={0xf3, 0x6, "0eedee994f84e483b2ee73171522162c0d5859a48a275153ad38924a88ffa4d3045b7ac464a02f076c021b65690719f64c97c4c474f6f599812256c0f897606ff7266af528e26f35e6151eb3c8256b0161ba99dfba59422a678a56d575cb67eede578a2b0df0148788504e5b3ee0a43ff12d1877fbac56298967e5ab6f889a1d3eba6d84f3a615b96aef5ab0d4b5ee4d1815f75cca39d4ac9eaa12ebb1b8a6b307ba79578518f51e84383028c578c73f4207d5c0f54415278180aa37a5449bcafed8b2d46338ba8c8d3bffc801865ef59d1124f5cf935df77d73b793f12beaa34cb384c30160abe0c0a8ed836614c3"}, @NFTA_TABLE_USERDATA={0x46, 0x6, "9464f851c0a9fc9d964a91d0d0a48cda0630764e0706d9403e96e9b55b6650cb57abdb63146a7288d7b599754485079792fb60ba046098552e25c5a3301c9ceb4f04"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0xc0, 0x6, "8e9577650594e8fc90caa94d82a184d41b7d73597dbcf02be4a2cc3ecb69258464726b5e64de3365546700e09732e3a2d54327d70e1569556d46da5e325de5c2f2aa56e2e5611962b42b2381ebb1270b41299ada82986f96d8b37328887f2e3a91b0125e96170b2c9901b69e5b87c7e11badce243440cd7f5afd0afbfb1130b04e44b0ae697538e297887c1a6f4c04d80cf5fc5f1ab311b2be61fcd6d4af6ee461887e5d82d2aaf23c9cbdbbf51e2d75c9a969c83a30ad7e1081214a"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}], {0x14}}, 0x3f8}, 0x1, 0x0, 0x0, 0x18}, 0x40) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x5c, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004801}, 0x800) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r3 = dup(r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6, 0x2, 0x91, 0x9, 0x0, 0x4, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xf1, 0x13}, 0x9040, 0x500, 0x2, 0x9, 0x5, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x9}, 0x0, 0x3, r3, 0xa) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) waitid(0x0, 0x0, 0x0, 0x80000000, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) waitid(0x0, 0x0, &(0x7f0000000400), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) r5 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0xfe68}}, 0x0) r6 = socket(0x10, 0x803, 0x0) dup3(r6, r5, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x15, 0x9, "2bbb19e5631df896ba98674d0b5600000000000000186049da15bffbdd1a3e02ca0718c73559bc4fe9801d897649294687be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7]}) socket$netlink(0x10, 0x3, 0x0) 02:46:37 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x507, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000007c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x44, 0x3, 0xa, 0x0, 0x0, 0x0, {0xa, 0x0, 0x8}, [@NFTA_CHAIN_HOOK={0x18, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'vlan0\x00'}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x4}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_USERDATA={0x4}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xe0, 0x0, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x97, 0x6, "a2847d0e4d9c362cde89365fcc56e44aef1d4415b60c737ad33458f8f3ebae85c9a18b314f0a0cdcad10995798fd74198a34268b13d1d45a9e9235bca122b1bb9e3ec6e03e35676c9ca0a17f0712e8384d12dc1cae9a8f39f8955bda950bd3e966a360136b5e13fb92a20dd9f98e84e9ae2fbdc908ed6d28e6f73a9709a1d73b84d444423ed8ffb47d8c1c56593549cf58124c"}, @NFTA_TABLE_USERDATA={0x20, 0x6, "3c1861e35545fa13a0e3a9ad337b0bb70dcc4eb3b252ae3954c91cff"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELTABLE={0x234, 0x2, 0xa, 0x3, 0x0, 0x0, {0xc}, [@NFTA_TABLE_USERDATA={0xf3, 0x6, "0eedee994f84e483b2ee73171522162c0d5859a48a275153ad38924a88ffa4d3045b7ac464a02f076c021b65690719f64c97c4c474f6f599812256c0f897606ff7266af528e26f35e6151eb3c8256b0161ba99dfba59422a678a56d575cb67eede578a2b0df0148788504e5b3ee0a43ff12d1877fbac56298967e5ab6f889a1d3eba6d84f3a615b96aef5ab0d4b5ee4d1815f75cca39d4ac9eaa12ebb1b8a6b307ba79578518f51e84383028c578c73f4207d5c0f54415278180aa37a5449bcafed8b2d46338ba8c8d3bffc801865ef59d1124f5cf935df77d73b793f12beaa34cb384c30160abe0c0a8ed836614c3"}, @NFTA_TABLE_USERDATA={0x46, 0x6, "9464f851c0a9fc9d964a91d0d0a48cda0630764e0706d9403e96e9b55b6650cb57abdb63146a7288d7b599754485079792fb60ba046098552e25c5a3301c9ceb4f04"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0xc0, 0x6, "8e9577650594e8fc90caa94d82a184d41b7d73597dbcf02be4a2cc3ecb69258464726b5e64de3365546700e09732e3a2d54327d70e1569556d46da5e325de5c2f2aa56e2e5611962b42b2381ebb1270b41299ada82986f96d8b37328887f2e3a91b0125e96170b2c9901b69e5b87c7e11badce243440cd7f5afd0afbfb1130b04e44b0ae697538e297887c1a6f4c04d80cf5fc5f1ab311b2be61fcd6d4af6ee461887e5d82d2aaf23c9cbdbbf51e2d75c9a969c83a30ad7e1081214a"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}], {0x14}}, 0x3f8}, 0x1, 0x0, 0x0, 0x18}, 0x40) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x5c, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004801}, 0x800) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r3 = dup(r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6, 0x2, 0x91, 0x9, 0x0, 0x4, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xf1, 0x13}, 0x9040, 0x500, 0x2, 0x9, 0x5, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x9}, 0x0, 0x3, r3, 0xa) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) waitid(0x0, 0x0, 0x0, 0x80000000, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) waitid(0x0, 0x0, &(0x7f0000000400), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) r5 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0xfe68}}, 0x0) r6 = socket(0x10, 0x803, 0x0) dup3(r6, r5, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x15, 0x9, "2bbb19e5631df896ba98674d0b5600000000000000186049da15bffbdd1a3e02ca0718c73559bc4fe9801d897649294687be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7]}) socket$netlink(0x10, 0x3, 0x0) 02:46:37 executing program 3: r0 = syz_clone(0x21008000, 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x29) 02:46:37 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x507, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000007c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x44, 0x3, 0xa, 0x0, 0x0, 0x0, {0xa, 0x0, 0x8}, [@NFTA_CHAIN_HOOK={0x18, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'vlan0\x00'}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x4}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_USERDATA={0x4}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xe0, 0x0, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x97, 0x6, "a2847d0e4d9c362cde89365fcc56e44aef1d4415b60c737ad33458f8f3ebae85c9a18b314f0a0cdcad10995798fd74198a34268b13d1d45a9e9235bca122b1bb9e3ec6e03e35676c9ca0a17f0712e8384d12dc1cae9a8f39f8955bda950bd3e966a360136b5e13fb92a20dd9f98e84e9ae2fbdc908ed6d28e6f73a9709a1d73b84d444423ed8ffb47d8c1c56593549cf58124c"}, @NFTA_TABLE_USERDATA={0x20, 0x6, "3c1861e35545fa13a0e3a9ad337b0bb70dcc4eb3b252ae3954c91cff"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELTABLE={0x234, 0x2, 0xa, 0x3, 0x0, 0x0, {0xc}, [@NFTA_TABLE_USERDATA={0xf3, 0x6, "0eedee994f84e483b2ee73171522162c0d5859a48a275153ad38924a88ffa4d3045b7ac464a02f076c021b65690719f64c97c4c474f6f599812256c0f897606ff7266af528e26f35e6151eb3c8256b0161ba99dfba59422a678a56d575cb67eede578a2b0df0148788504e5b3ee0a43ff12d1877fbac56298967e5ab6f889a1d3eba6d84f3a615b96aef5ab0d4b5ee4d1815f75cca39d4ac9eaa12ebb1b8a6b307ba79578518f51e84383028c578c73f4207d5c0f54415278180aa37a5449bcafed8b2d46338ba8c8d3bffc801865ef59d1124f5cf935df77d73b793f12beaa34cb384c30160abe0c0a8ed836614c3"}, @NFTA_TABLE_USERDATA={0x46, 0x6, "9464f851c0a9fc9d964a91d0d0a48cda0630764e0706d9403e96e9b55b6650cb57abdb63146a7288d7b599754485079792fb60ba046098552e25c5a3301c9ceb4f04"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0xc0, 0x6, "8e9577650594e8fc90caa94d82a184d41b7d73597dbcf02be4a2cc3ecb69258464726b5e64de3365546700e09732e3a2d54327d70e1569556d46da5e325de5c2f2aa56e2e5611962b42b2381ebb1270b41299ada82986f96d8b37328887f2e3a91b0125e96170b2c9901b69e5b87c7e11badce243440cd7f5afd0afbfb1130b04e44b0ae697538e297887c1a6f4c04d80cf5fc5f1ab311b2be61fcd6d4af6ee461887e5d82d2aaf23c9cbdbbf51e2d75c9a969c83a30ad7e1081214a"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}], {0x14}}, 0x3f8}, 0x1, 0x0, 0x0, 0x18}, 0x40) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x5c, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004801}, 0x800) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r3 = dup(r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6, 0x2, 0x91, 0x9, 0x0, 0x4, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xf1, 0x13}, 0x9040, 0x500, 0x2, 0x9, 0x5, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x9}, 0x0, 0x3, r3, 0xa) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) waitid(0x0, 0x0, 0x0, 0x80000000, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) waitid(0x0, 0x0, &(0x7f0000000400), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) r5 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0xfe68}}, 0x0) r6 = socket(0x10, 0x803, 0x0) dup3(r6, r5, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x15, 0x9, "2bbb19e5631df896ba98674d0b5600000000000000186049da15bffbdd1a3e02ca0718c73559bc4fe9801d897649294687be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7]}) socket$netlink(0x10, 0x3, 0x0) 02:46:37 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x507, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000007c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x44, 0x3, 0xa, 0x0, 0x0, 0x0, {0xa, 0x0, 0x8}, [@NFTA_CHAIN_HOOK={0x18, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'vlan0\x00'}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x4}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_USERDATA={0x4}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xe0, 0x0, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x97, 0x6, "a2847d0e4d9c362cde89365fcc56e44aef1d4415b60c737ad33458f8f3ebae85c9a18b314f0a0cdcad10995798fd74198a34268b13d1d45a9e9235bca122b1bb9e3ec6e03e35676c9ca0a17f0712e8384d12dc1cae9a8f39f8955bda950bd3e966a360136b5e13fb92a20dd9f98e84e9ae2fbdc908ed6d28e6f73a9709a1d73b84d444423ed8ffb47d8c1c56593549cf58124c"}, @NFTA_TABLE_USERDATA={0x20, 0x6, "3c1861e35545fa13a0e3a9ad337b0bb70dcc4eb3b252ae3954c91cff"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELTABLE={0x234, 0x2, 0xa, 0x3, 0x0, 0x0, {0xc}, [@NFTA_TABLE_USERDATA={0xf3, 0x6, "0eedee994f84e483b2ee73171522162c0d5859a48a275153ad38924a88ffa4d3045b7ac464a02f076c021b65690719f64c97c4c474f6f599812256c0f897606ff7266af528e26f35e6151eb3c8256b0161ba99dfba59422a678a56d575cb67eede578a2b0df0148788504e5b3ee0a43ff12d1877fbac56298967e5ab6f889a1d3eba6d84f3a615b96aef5ab0d4b5ee4d1815f75cca39d4ac9eaa12ebb1b8a6b307ba79578518f51e84383028c578c73f4207d5c0f54415278180aa37a5449bcafed8b2d46338ba8c8d3bffc801865ef59d1124f5cf935df77d73b793f12beaa34cb384c30160abe0c0a8ed836614c3"}, @NFTA_TABLE_USERDATA={0x46, 0x6, "9464f851c0a9fc9d964a91d0d0a48cda0630764e0706d9403e96e9b55b6650cb57abdb63146a7288d7b599754485079792fb60ba046098552e25c5a3301c9ceb4f04"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0xc0, 0x6, "8e9577650594e8fc90caa94d82a184d41b7d73597dbcf02be4a2cc3ecb69258464726b5e64de3365546700e09732e3a2d54327d70e1569556d46da5e325de5c2f2aa56e2e5611962b42b2381ebb1270b41299ada82986f96d8b37328887f2e3a91b0125e96170b2c9901b69e5b87c7e11badce243440cd7f5afd0afbfb1130b04e44b0ae697538e297887c1a6f4c04d80cf5fc5f1ab311b2be61fcd6d4af6ee461887e5d82d2aaf23c9cbdbbf51e2d75c9a969c83a30ad7e1081214a"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}], {0x14}}, 0x3f8}, 0x1, 0x0, 0x0, 0x18}, 0x40) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x5c, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004801}, 0x800) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r3 = dup(r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6, 0x2, 0x91, 0x9, 0x0, 0x4, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xf1, 0x13}, 0x9040, 0x500, 0x2, 0x9, 0x5, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x9}, 0x0, 0x3, r3, 0xa) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) waitid(0x0, 0x0, 0x0, 0x80000000, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) waitid(0x0, 0x0, &(0x7f0000000400), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) r5 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0xfe68}}, 0x0) r6 = socket(0x10, 0x803, 0x0) dup3(r6, r5, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x15, 0x9, "2bbb19e5631df896ba98674d0b5600000000000000186049da15bffbdd1a3e02ca0718c73559bc4fe9801d897649294687be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7]}) socket$netlink(0x10, 0x3, 0x0) 02:46:37 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x507, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000007c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x44, 0x3, 0xa, 0x0, 0x0, 0x0, {0xa, 0x0, 0x8}, [@NFTA_CHAIN_HOOK={0x18, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'vlan0\x00'}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x4}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_USERDATA={0x4}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xe0, 0x0, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x97, 0x6, "a2847d0e4d9c362cde89365fcc56e44aef1d4415b60c737ad33458f8f3ebae85c9a18b314f0a0cdcad10995798fd74198a34268b13d1d45a9e9235bca122b1bb9e3ec6e03e35676c9ca0a17f0712e8384d12dc1cae9a8f39f8955bda950bd3e966a360136b5e13fb92a20dd9f98e84e9ae2fbdc908ed6d28e6f73a9709a1d73b84d444423ed8ffb47d8c1c56593549cf58124c"}, @NFTA_TABLE_USERDATA={0x20, 0x6, "3c1861e35545fa13a0e3a9ad337b0bb70dcc4eb3b252ae3954c91cff"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELTABLE={0x234, 0x2, 0xa, 0x3, 0x0, 0x0, {0xc}, [@NFTA_TABLE_USERDATA={0xf3, 0x6, "0eedee994f84e483b2ee73171522162c0d5859a48a275153ad38924a88ffa4d3045b7ac464a02f076c021b65690719f64c97c4c474f6f599812256c0f897606ff7266af528e26f35e6151eb3c8256b0161ba99dfba59422a678a56d575cb67eede578a2b0df0148788504e5b3ee0a43ff12d1877fbac56298967e5ab6f889a1d3eba6d84f3a615b96aef5ab0d4b5ee4d1815f75cca39d4ac9eaa12ebb1b8a6b307ba79578518f51e84383028c578c73f4207d5c0f54415278180aa37a5449bcafed8b2d46338ba8c8d3bffc801865ef59d1124f5cf935df77d73b793f12beaa34cb384c30160abe0c0a8ed836614c3"}, @NFTA_TABLE_USERDATA={0x46, 0x6, "9464f851c0a9fc9d964a91d0d0a48cda0630764e0706d9403e96e9b55b6650cb57abdb63146a7288d7b599754485079792fb60ba046098552e25c5a3301c9ceb4f04"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0xc0, 0x6, "8e9577650594e8fc90caa94d82a184d41b7d73597dbcf02be4a2cc3ecb69258464726b5e64de3365546700e09732e3a2d54327d70e1569556d46da5e325de5c2f2aa56e2e5611962b42b2381ebb1270b41299ada82986f96d8b37328887f2e3a91b0125e96170b2c9901b69e5b87c7e11badce243440cd7f5afd0afbfb1130b04e44b0ae697538e297887c1a6f4c04d80cf5fc5f1ab311b2be61fcd6d4af6ee461887e5d82d2aaf23c9cbdbbf51e2d75c9a969c83a30ad7e1081214a"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}], {0x14}}, 0x3f8}, 0x1, 0x0, 0x0, 0x18}, 0x40) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x5c, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004801}, 0x800) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r3 = dup(r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6, 0x2, 0x91, 0x9, 0x0, 0x4, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xf1, 0x13}, 0x9040, 0x500, 0x2, 0x9, 0x5, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x9}, 0x0, 0x3, r3, 0xa) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) waitid(0x0, 0x0, 0x0, 0x80000000, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) waitid(0x0, 0x0, &(0x7f0000000400), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) r5 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0xfe68}}, 0x0) r6 = socket(0x10, 0x803, 0x0) dup3(r6, r5, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x15, 0x9, "2bbb19e5631df896ba98674d0b5600000000000000186049da15bffbdd1a3e02ca0718c73559bc4fe9801d897649294687be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7]}) socket$netlink(0x10, 0x3, 0x0) 02:46:37 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x507, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000007c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x44, 0x3, 0xa, 0x0, 0x0, 0x0, {0xa, 0x0, 0x8}, [@NFTA_CHAIN_HOOK={0x18, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'vlan0\x00'}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x4}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_USERDATA={0x4}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xe0, 0x0, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x97, 0x6, "a2847d0e4d9c362cde89365fcc56e44aef1d4415b60c737ad33458f8f3ebae85c9a18b314f0a0cdcad10995798fd74198a34268b13d1d45a9e9235bca122b1bb9e3ec6e03e35676c9ca0a17f0712e8384d12dc1cae9a8f39f8955bda950bd3e966a360136b5e13fb92a20dd9f98e84e9ae2fbdc908ed6d28e6f73a9709a1d73b84d444423ed8ffb47d8c1c56593549cf58124c"}, @NFTA_TABLE_USERDATA={0x20, 0x6, "3c1861e35545fa13a0e3a9ad337b0bb70dcc4eb3b252ae3954c91cff"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELTABLE={0x234, 0x2, 0xa, 0x3, 0x0, 0x0, {0xc}, [@NFTA_TABLE_USERDATA={0xf3, 0x6, "0eedee994f84e483b2ee73171522162c0d5859a48a275153ad38924a88ffa4d3045b7ac464a02f076c021b65690719f64c97c4c474f6f599812256c0f897606ff7266af528e26f35e6151eb3c8256b0161ba99dfba59422a678a56d575cb67eede578a2b0df0148788504e5b3ee0a43ff12d1877fbac56298967e5ab6f889a1d3eba6d84f3a615b96aef5ab0d4b5ee4d1815f75cca39d4ac9eaa12ebb1b8a6b307ba79578518f51e84383028c578c73f4207d5c0f54415278180aa37a5449bcafed8b2d46338ba8c8d3bffc801865ef59d1124f5cf935df77d73b793f12beaa34cb384c30160abe0c0a8ed836614c3"}, @NFTA_TABLE_USERDATA={0x46, 0x6, "9464f851c0a9fc9d964a91d0d0a48cda0630764e0706d9403e96e9b55b6650cb57abdb63146a7288d7b599754485079792fb60ba046098552e25c5a3301c9ceb4f04"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0xc0, 0x6, "8e9577650594e8fc90caa94d82a184d41b7d73597dbcf02be4a2cc3ecb69258464726b5e64de3365546700e09732e3a2d54327d70e1569556d46da5e325de5c2f2aa56e2e5611962b42b2381ebb1270b41299ada82986f96d8b37328887f2e3a91b0125e96170b2c9901b69e5b87c7e11badce243440cd7f5afd0afbfb1130b04e44b0ae697538e297887c1a6f4c04d80cf5fc5f1ab311b2be61fcd6d4af6ee461887e5d82d2aaf23c9cbdbbf51e2d75c9a969c83a30ad7e1081214a"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}], {0x14}}, 0x3f8}, 0x1, 0x0, 0x0, 0x18}, 0x40) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x5c, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004801}, 0x800) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r3 = dup(r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6, 0x2, 0x91, 0x9, 0x0, 0x4, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xf1, 0x13}, 0x9040, 0x500, 0x2, 0x9, 0x5, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x9}, 0x0, 0x3, r3, 0xa) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) waitid(0x0, 0x0, 0x0, 0x80000000, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) waitid(0x0, 0x0, &(0x7f0000000400), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) r5 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0xfe68}}, 0x0) r6 = socket(0x10, 0x803, 0x0) dup3(r6, r5, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x15, 0x9, "2bbb19e5631df896ba98674d0b5600000000000000186049da15bffbdd1a3e02ca0718c73559bc4fe9801d897649294687be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7]}) socket$netlink(0x10, 0x3, 0x0) 02:46:37 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x507, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000007c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x44, 0x3, 0xa, 0x0, 0x0, 0x0, {0xa, 0x0, 0x8}, [@NFTA_CHAIN_HOOK={0x18, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'vlan0\x00'}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x4}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_USERDATA={0x4}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xe0, 0x0, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x97, 0x6, "a2847d0e4d9c362cde89365fcc56e44aef1d4415b60c737ad33458f8f3ebae85c9a18b314f0a0cdcad10995798fd74198a34268b13d1d45a9e9235bca122b1bb9e3ec6e03e35676c9ca0a17f0712e8384d12dc1cae9a8f39f8955bda950bd3e966a360136b5e13fb92a20dd9f98e84e9ae2fbdc908ed6d28e6f73a9709a1d73b84d444423ed8ffb47d8c1c56593549cf58124c"}, @NFTA_TABLE_USERDATA={0x20, 0x6, "3c1861e35545fa13a0e3a9ad337b0bb70dcc4eb3b252ae3954c91cff"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELTABLE={0x234, 0x2, 0xa, 0x3, 0x0, 0x0, {0xc}, [@NFTA_TABLE_USERDATA={0xf3, 0x6, "0eedee994f84e483b2ee73171522162c0d5859a48a275153ad38924a88ffa4d3045b7ac464a02f076c021b65690719f64c97c4c474f6f599812256c0f897606ff7266af528e26f35e6151eb3c8256b0161ba99dfba59422a678a56d575cb67eede578a2b0df0148788504e5b3ee0a43ff12d1877fbac56298967e5ab6f889a1d3eba6d84f3a615b96aef5ab0d4b5ee4d1815f75cca39d4ac9eaa12ebb1b8a6b307ba79578518f51e84383028c578c73f4207d5c0f54415278180aa37a5449bcafed8b2d46338ba8c8d3bffc801865ef59d1124f5cf935df77d73b793f12beaa34cb384c30160abe0c0a8ed836614c3"}, @NFTA_TABLE_USERDATA={0x46, 0x6, "9464f851c0a9fc9d964a91d0d0a48cda0630764e0706d9403e96e9b55b6650cb57abdb63146a7288d7b599754485079792fb60ba046098552e25c5a3301c9ceb4f04"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0xc0, 0x6, "8e9577650594e8fc90caa94d82a184d41b7d73597dbcf02be4a2cc3ecb69258464726b5e64de3365546700e09732e3a2d54327d70e1569556d46da5e325de5c2f2aa56e2e5611962b42b2381ebb1270b41299ada82986f96d8b37328887f2e3a91b0125e96170b2c9901b69e5b87c7e11badce243440cd7f5afd0afbfb1130b04e44b0ae697538e297887c1a6f4c04d80cf5fc5f1ab311b2be61fcd6d4af6ee461887e5d82d2aaf23c9cbdbbf51e2d75c9a969c83a30ad7e1081214a"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}], {0x14}}, 0x3f8}, 0x1, 0x0, 0x0, 0x18}, 0x40) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x5c, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004801}, 0x800) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r3 = dup(r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6, 0x2, 0x91, 0x9, 0x0, 0x4, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xf1, 0x13}, 0x9040, 0x500, 0x2, 0x9, 0x5, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x9}, 0x0, 0x3, r3, 0xa) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) waitid(0x0, 0x0, 0x0, 0x80000000, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) waitid(0x0, 0x0, &(0x7f0000000400), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) r5 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0xfe68}}, 0x0) r6 = socket(0x10, 0x803, 0x0) dup3(r6, r5, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x15, 0x9, "2bbb19e5631df896ba98674d0b5600000000000000186049da15bffbdd1a3e02ca0718c73559bc4fe9801d897649294687be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7]}) socket$netlink(0x10, 0x3, 0x0) 02:46:38 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x507, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000007c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x44, 0x3, 0xa, 0x0, 0x0, 0x0, {0xa, 0x0, 0x8}, [@NFTA_CHAIN_HOOK={0x18, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'vlan0\x00'}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x4}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_USERDATA={0x4}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xe0, 0x0, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x97, 0x6, "a2847d0e4d9c362cde89365fcc56e44aef1d4415b60c737ad33458f8f3ebae85c9a18b314f0a0cdcad10995798fd74198a34268b13d1d45a9e9235bca122b1bb9e3ec6e03e35676c9ca0a17f0712e8384d12dc1cae9a8f39f8955bda950bd3e966a360136b5e13fb92a20dd9f98e84e9ae2fbdc908ed6d28e6f73a9709a1d73b84d444423ed8ffb47d8c1c56593549cf58124c"}, @NFTA_TABLE_USERDATA={0x20, 0x6, "3c1861e35545fa13a0e3a9ad337b0bb70dcc4eb3b252ae3954c91cff"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELTABLE={0x234, 0x2, 0xa, 0x3, 0x0, 0x0, {0xc}, [@NFTA_TABLE_USERDATA={0xf3, 0x6, "0eedee994f84e483b2ee73171522162c0d5859a48a275153ad38924a88ffa4d3045b7ac464a02f076c021b65690719f64c97c4c474f6f599812256c0f897606ff7266af528e26f35e6151eb3c8256b0161ba99dfba59422a678a56d575cb67eede578a2b0df0148788504e5b3ee0a43ff12d1877fbac56298967e5ab6f889a1d3eba6d84f3a615b96aef5ab0d4b5ee4d1815f75cca39d4ac9eaa12ebb1b8a6b307ba79578518f51e84383028c578c73f4207d5c0f54415278180aa37a5449bcafed8b2d46338ba8c8d3bffc801865ef59d1124f5cf935df77d73b793f12beaa34cb384c30160abe0c0a8ed836614c3"}, @NFTA_TABLE_USERDATA={0x46, 0x6, "9464f851c0a9fc9d964a91d0d0a48cda0630764e0706d9403e96e9b55b6650cb57abdb63146a7288d7b599754485079792fb60ba046098552e25c5a3301c9ceb4f04"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0xc0, 0x6, "8e9577650594e8fc90caa94d82a184d41b7d73597dbcf02be4a2cc3ecb69258464726b5e64de3365546700e09732e3a2d54327d70e1569556d46da5e325de5c2f2aa56e2e5611962b42b2381ebb1270b41299ada82986f96d8b37328887f2e3a91b0125e96170b2c9901b69e5b87c7e11badce243440cd7f5afd0afbfb1130b04e44b0ae697538e297887c1a6f4c04d80cf5fc5f1ab311b2be61fcd6d4af6ee461887e5d82d2aaf23c9cbdbbf51e2d75c9a969c83a30ad7e1081214a"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}], {0x14}}, 0x3f8}, 0x1, 0x0, 0x0, 0x18}, 0x40) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x5c, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004801}, 0x800) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r3 = dup(r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6, 0x2, 0x91, 0x9, 0x0, 0x4, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xf1, 0x13}, 0x9040, 0x500, 0x2, 0x9, 0x5, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x9}, 0x0, 0x3, r3, 0xa) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) waitid(0x0, 0x0, 0x0, 0x80000000, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) waitid(0x0, 0x0, &(0x7f0000000400), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) r5 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0xfe68}}, 0x0) r6 = socket(0x10, 0x803, 0x0) dup3(r6, r5, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x15, 0x9, "2bbb19e5631df896ba98674d0b5600000000000000186049da15bffbdd1a3e02ca0718c73559bc4fe9801d897649294687be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7]}) socket$netlink(0x10, 0x3, 0x0) 02:46:38 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x507, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000007c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x44, 0x3, 0xa, 0x0, 0x0, 0x0, {0xa, 0x0, 0x8}, [@NFTA_CHAIN_HOOK={0x18, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'vlan0\x00'}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x4}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_USERDATA={0x4}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xe0, 0x0, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x97, 0x6, "a2847d0e4d9c362cde89365fcc56e44aef1d4415b60c737ad33458f8f3ebae85c9a18b314f0a0cdcad10995798fd74198a34268b13d1d45a9e9235bca122b1bb9e3ec6e03e35676c9ca0a17f0712e8384d12dc1cae9a8f39f8955bda950bd3e966a360136b5e13fb92a20dd9f98e84e9ae2fbdc908ed6d28e6f73a9709a1d73b84d444423ed8ffb47d8c1c56593549cf58124c"}, @NFTA_TABLE_USERDATA={0x20, 0x6, "3c1861e35545fa13a0e3a9ad337b0bb70dcc4eb3b252ae3954c91cff"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELTABLE={0x234, 0x2, 0xa, 0x3, 0x0, 0x0, {0xc}, [@NFTA_TABLE_USERDATA={0xf3, 0x6, "0eedee994f84e483b2ee73171522162c0d5859a48a275153ad38924a88ffa4d3045b7ac464a02f076c021b65690719f64c97c4c474f6f599812256c0f897606ff7266af528e26f35e6151eb3c8256b0161ba99dfba59422a678a56d575cb67eede578a2b0df0148788504e5b3ee0a43ff12d1877fbac56298967e5ab6f889a1d3eba6d84f3a615b96aef5ab0d4b5ee4d1815f75cca39d4ac9eaa12ebb1b8a6b307ba79578518f51e84383028c578c73f4207d5c0f54415278180aa37a5449bcafed8b2d46338ba8c8d3bffc801865ef59d1124f5cf935df77d73b793f12beaa34cb384c30160abe0c0a8ed836614c3"}, @NFTA_TABLE_USERDATA={0x46, 0x6, "9464f851c0a9fc9d964a91d0d0a48cda0630764e0706d9403e96e9b55b6650cb57abdb63146a7288d7b599754485079792fb60ba046098552e25c5a3301c9ceb4f04"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0xc0, 0x6, "8e9577650594e8fc90caa94d82a184d41b7d73597dbcf02be4a2cc3ecb69258464726b5e64de3365546700e09732e3a2d54327d70e1569556d46da5e325de5c2f2aa56e2e5611962b42b2381ebb1270b41299ada82986f96d8b37328887f2e3a91b0125e96170b2c9901b69e5b87c7e11badce243440cd7f5afd0afbfb1130b04e44b0ae697538e297887c1a6f4c04d80cf5fc5f1ab311b2be61fcd6d4af6ee461887e5d82d2aaf23c9cbdbbf51e2d75c9a969c83a30ad7e1081214a"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}], {0x14}}, 0x3f8}, 0x1, 0x0, 0x0, 0x18}, 0x40) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x5c, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004801}, 0x800) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r3 = dup(r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6, 0x2, 0x91, 0x9, 0x0, 0x4, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xf1, 0x13}, 0x9040, 0x500, 0x2, 0x9, 0x5, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x9}, 0x0, 0x3, r3, 0xa) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) waitid(0x0, 0x0, 0x0, 0x80000000, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) waitid(0x0, 0x0, &(0x7f0000000400), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) r5 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0xfe68}}, 0x0) r6 = socket(0x10, 0x803, 0x0) dup3(r6, r5, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x15, 0x9, "2bbb19e5631df896ba98674d0b5600000000000000186049da15bffbdd1a3e02ca0718c73559bc4fe9801d897649294687be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7]}) socket$netlink(0x10, 0x3, 0x0) 02:46:38 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x507, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000007c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x44, 0x3, 0xa, 0x0, 0x0, 0x0, {0xa, 0x0, 0x8}, [@NFTA_CHAIN_HOOK={0x18, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'vlan0\x00'}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x4}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_USERDATA={0x4}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xe0, 0x0, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x97, 0x6, "a2847d0e4d9c362cde89365fcc56e44aef1d4415b60c737ad33458f8f3ebae85c9a18b314f0a0cdcad10995798fd74198a34268b13d1d45a9e9235bca122b1bb9e3ec6e03e35676c9ca0a17f0712e8384d12dc1cae9a8f39f8955bda950bd3e966a360136b5e13fb92a20dd9f98e84e9ae2fbdc908ed6d28e6f73a9709a1d73b84d444423ed8ffb47d8c1c56593549cf58124c"}, @NFTA_TABLE_USERDATA={0x20, 0x6, "3c1861e35545fa13a0e3a9ad337b0bb70dcc4eb3b252ae3954c91cff"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELTABLE={0x234, 0x2, 0xa, 0x3, 0x0, 0x0, {0xc}, [@NFTA_TABLE_USERDATA={0xf3, 0x6, "0eedee994f84e483b2ee73171522162c0d5859a48a275153ad38924a88ffa4d3045b7ac464a02f076c021b65690719f64c97c4c474f6f599812256c0f897606ff7266af528e26f35e6151eb3c8256b0161ba99dfba59422a678a56d575cb67eede578a2b0df0148788504e5b3ee0a43ff12d1877fbac56298967e5ab6f889a1d3eba6d84f3a615b96aef5ab0d4b5ee4d1815f75cca39d4ac9eaa12ebb1b8a6b307ba79578518f51e84383028c578c73f4207d5c0f54415278180aa37a5449bcafed8b2d46338ba8c8d3bffc801865ef59d1124f5cf935df77d73b793f12beaa34cb384c30160abe0c0a8ed836614c3"}, @NFTA_TABLE_USERDATA={0x46, 0x6, "9464f851c0a9fc9d964a91d0d0a48cda0630764e0706d9403e96e9b55b6650cb57abdb63146a7288d7b599754485079792fb60ba046098552e25c5a3301c9ceb4f04"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0xc0, 0x6, "8e9577650594e8fc90caa94d82a184d41b7d73597dbcf02be4a2cc3ecb69258464726b5e64de3365546700e09732e3a2d54327d70e1569556d46da5e325de5c2f2aa56e2e5611962b42b2381ebb1270b41299ada82986f96d8b37328887f2e3a91b0125e96170b2c9901b69e5b87c7e11badce243440cd7f5afd0afbfb1130b04e44b0ae697538e297887c1a6f4c04d80cf5fc5f1ab311b2be61fcd6d4af6ee461887e5d82d2aaf23c9cbdbbf51e2d75c9a969c83a30ad7e1081214a"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}], {0x14}}, 0x3f8}, 0x1, 0x0, 0x0, 0x18}, 0x40) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x5c, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004801}, 0x800) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r3 = dup(r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6, 0x2, 0x91, 0x9, 0x0, 0x4, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xf1, 0x13}, 0x9040, 0x500, 0x2, 0x9, 0x5, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x9}, 0x0, 0x3, r3, 0xa) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) waitid(0x0, 0x0, 0x0, 0x80000000, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) waitid(0x0, 0x0, &(0x7f0000000400), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) r5 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0xfe68}}, 0x0) r6 = socket(0x10, 0x803, 0x0) dup3(r6, r5, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x15, 0x9, "2bbb19e5631df896ba98674d0b5600000000000000186049da15bffbdd1a3e02ca0718c73559bc4fe9801d897649294687be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7]}) socket$netlink(0x10, 0x3, 0x0) 02:46:38 executing program 4: syz_mount_image$f2fs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200080, &(0x7f0000000140)={[{@jqfmt_vfsv1}, {@nolazytime}, {@noinline_dentry}]}, 0x1, 0x54f3, &(0x7f0000005640)="$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") mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000100)='./file1\x00', 0x200) 02:46:38 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x507, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000007c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x44, 0x3, 0xa, 0x0, 0x0, 0x0, {0xa, 0x0, 0x8}, [@NFTA_CHAIN_HOOK={0x18, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'vlan0\x00'}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x4}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_USERDATA={0x4}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xe0, 0x0, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x97, 0x6, "a2847d0e4d9c362cde89365fcc56e44aef1d4415b60c737ad33458f8f3ebae85c9a18b314f0a0cdcad10995798fd74198a34268b13d1d45a9e9235bca122b1bb9e3ec6e03e35676c9ca0a17f0712e8384d12dc1cae9a8f39f8955bda950bd3e966a360136b5e13fb92a20dd9f98e84e9ae2fbdc908ed6d28e6f73a9709a1d73b84d444423ed8ffb47d8c1c56593549cf58124c"}, @NFTA_TABLE_USERDATA={0x20, 0x6, "3c1861e35545fa13a0e3a9ad337b0bb70dcc4eb3b252ae3954c91cff"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELTABLE={0x234, 0x2, 0xa, 0x3, 0x0, 0x0, {0xc}, [@NFTA_TABLE_USERDATA={0xf3, 0x6, "0eedee994f84e483b2ee73171522162c0d5859a48a275153ad38924a88ffa4d3045b7ac464a02f076c021b65690719f64c97c4c474f6f599812256c0f897606ff7266af528e26f35e6151eb3c8256b0161ba99dfba59422a678a56d575cb67eede578a2b0df0148788504e5b3ee0a43ff12d1877fbac56298967e5ab6f889a1d3eba6d84f3a615b96aef5ab0d4b5ee4d1815f75cca39d4ac9eaa12ebb1b8a6b307ba79578518f51e84383028c578c73f4207d5c0f54415278180aa37a5449bcafed8b2d46338ba8c8d3bffc801865ef59d1124f5cf935df77d73b793f12beaa34cb384c30160abe0c0a8ed836614c3"}, @NFTA_TABLE_USERDATA={0x46, 0x6, "9464f851c0a9fc9d964a91d0d0a48cda0630764e0706d9403e96e9b55b6650cb57abdb63146a7288d7b599754485079792fb60ba046098552e25c5a3301c9ceb4f04"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0xc0, 0x6, "8e9577650594e8fc90caa94d82a184d41b7d73597dbcf02be4a2cc3ecb69258464726b5e64de3365546700e09732e3a2d54327d70e1569556d46da5e325de5c2f2aa56e2e5611962b42b2381ebb1270b41299ada82986f96d8b37328887f2e3a91b0125e96170b2c9901b69e5b87c7e11badce243440cd7f5afd0afbfb1130b04e44b0ae697538e297887c1a6f4c04d80cf5fc5f1ab311b2be61fcd6d4af6ee461887e5d82d2aaf23c9cbdbbf51e2d75c9a969c83a30ad7e1081214a"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}], {0x14}}, 0x3f8}, 0x1, 0x0, 0x0, 0x18}, 0x40) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x5c, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004801}, 0x800) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r3 = dup(r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6, 0x2, 0x91, 0x9, 0x0, 0x4, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xf1, 0x13}, 0x9040, 0x500, 0x2, 0x9, 0x5, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x9}, 0x0, 0x3, r3, 0xa) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) waitid(0x0, 0x0, 0x0, 0x80000000, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) waitid(0x0, 0x0, &(0x7f0000000400), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) r5 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0xfe68}}, 0x0) r6 = socket(0x10, 0x803, 0x0) dup3(r6, r5, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x15, 0x9, "2bbb19e5631df896ba98674d0b5600000000000000186049da15bffbdd1a3e02ca0718c73559bc4fe9801d897649294687be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7]}) socket$netlink(0x10, 0x3, 0x0) 02:46:38 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x507, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000007c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x44, 0x3, 0xa, 0x0, 0x0, 0x0, {0xa, 0x0, 0x8}, [@NFTA_CHAIN_HOOK={0x18, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'vlan0\x00'}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x4}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_USERDATA={0x4}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xe0, 0x0, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x97, 0x6, "a2847d0e4d9c362cde89365fcc56e44aef1d4415b60c737ad33458f8f3ebae85c9a18b314f0a0cdcad10995798fd74198a34268b13d1d45a9e9235bca122b1bb9e3ec6e03e35676c9ca0a17f0712e8384d12dc1cae9a8f39f8955bda950bd3e966a360136b5e13fb92a20dd9f98e84e9ae2fbdc908ed6d28e6f73a9709a1d73b84d444423ed8ffb47d8c1c56593549cf58124c"}, @NFTA_TABLE_USERDATA={0x20, 0x6, "3c1861e35545fa13a0e3a9ad337b0bb70dcc4eb3b252ae3954c91cff"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELTABLE={0x234, 0x2, 0xa, 0x3, 0x0, 0x0, {0xc}, [@NFTA_TABLE_USERDATA={0xf3, 0x6, "0eedee994f84e483b2ee73171522162c0d5859a48a275153ad38924a88ffa4d3045b7ac464a02f076c021b65690719f64c97c4c474f6f599812256c0f897606ff7266af528e26f35e6151eb3c8256b0161ba99dfba59422a678a56d575cb67eede578a2b0df0148788504e5b3ee0a43ff12d1877fbac56298967e5ab6f889a1d3eba6d84f3a615b96aef5ab0d4b5ee4d1815f75cca39d4ac9eaa12ebb1b8a6b307ba79578518f51e84383028c578c73f4207d5c0f54415278180aa37a5449bcafed8b2d46338ba8c8d3bffc801865ef59d1124f5cf935df77d73b793f12beaa34cb384c30160abe0c0a8ed836614c3"}, @NFTA_TABLE_USERDATA={0x46, 0x6, "9464f851c0a9fc9d964a91d0d0a48cda0630764e0706d9403e96e9b55b6650cb57abdb63146a7288d7b599754485079792fb60ba046098552e25c5a3301c9ceb4f04"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0xc0, 0x6, "8e9577650594e8fc90caa94d82a184d41b7d73597dbcf02be4a2cc3ecb69258464726b5e64de3365546700e09732e3a2d54327d70e1569556d46da5e325de5c2f2aa56e2e5611962b42b2381ebb1270b41299ada82986f96d8b37328887f2e3a91b0125e96170b2c9901b69e5b87c7e11badce243440cd7f5afd0afbfb1130b04e44b0ae697538e297887c1a6f4c04d80cf5fc5f1ab311b2be61fcd6d4af6ee461887e5d82d2aaf23c9cbdbbf51e2d75c9a969c83a30ad7e1081214a"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}], {0x14}}, 0x3f8}, 0x1, 0x0, 0x0, 0x18}, 0x40) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x5c, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004801}, 0x800) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r3 = dup(r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6, 0x2, 0x91, 0x9, 0x0, 0x4, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xf1, 0x13}, 0x9040, 0x500, 0x2, 0x9, 0x5, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x9}, 0x0, 0x3, r3, 0xa) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) waitid(0x0, 0x0, 0x0, 0x80000000, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) waitid(0x0, 0x0, &(0x7f0000000400), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) r5 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0xfe68}}, 0x0) r6 = socket(0x10, 0x803, 0x0) dup3(r6, r5, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x15, 0x9, "2bbb19e5631df896ba98674d0b5600000000000000186049da15bffbdd1a3e02ca0718c73559bc4fe9801d897649294687be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7]}) socket$netlink(0x10, 0x3, 0x0) 02:46:38 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x507, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000007c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x44, 0x3, 0xa, 0x0, 0x0, 0x0, {0xa, 0x0, 0x8}, [@NFTA_CHAIN_HOOK={0x18, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'vlan0\x00'}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x4}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_USERDATA={0x4}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xe0, 0x0, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x97, 0x6, "a2847d0e4d9c362cde89365fcc56e44aef1d4415b60c737ad33458f8f3ebae85c9a18b314f0a0cdcad10995798fd74198a34268b13d1d45a9e9235bca122b1bb9e3ec6e03e35676c9ca0a17f0712e8384d12dc1cae9a8f39f8955bda950bd3e966a360136b5e13fb92a20dd9f98e84e9ae2fbdc908ed6d28e6f73a9709a1d73b84d444423ed8ffb47d8c1c56593549cf58124c"}, @NFTA_TABLE_USERDATA={0x20, 0x6, "3c1861e35545fa13a0e3a9ad337b0bb70dcc4eb3b252ae3954c91cff"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELTABLE={0x234, 0x2, 0xa, 0x3, 0x0, 0x0, {0xc}, [@NFTA_TABLE_USERDATA={0xf3, 0x6, "0eedee994f84e483b2ee73171522162c0d5859a48a275153ad38924a88ffa4d3045b7ac464a02f076c021b65690719f64c97c4c474f6f599812256c0f897606ff7266af528e26f35e6151eb3c8256b0161ba99dfba59422a678a56d575cb67eede578a2b0df0148788504e5b3ee0a43ff12d1877fbac56298967e5ab6f889a1d3eba6d84f3a615b96aef5ab0d4b5ee4d1815f75cca39d4ac9eaa12ebb1b8a6b307ba79578518f51e84383028c578c73f4207d5c0f54415278180aa37a5449bcafed8b2d46338ba8c8d3bffc801865ef59d1124f5cf935df77d73b793f12beaa34cb384c30160abe0c0a8ed836614c3"}, @NFTA_TABLE_USERDATA={0x46, 0x6, "9464f851c0a9fc9d964a91d0d0a48cda0630764e0706d9403e96e9b55b6650cb57abdb63146a7288d7b599754485079792fb60ba046098552e25c5a3301c9ceb4f04"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0xc0, 0x6, "8e9577650594e8fc90caa94d82a184d41b7d73597dbcf02be4a2cc3ecb69258464726b5e64de3365546700e09732e3a2d54327d70e1569556d46da5e325de5c2f2aa56e2e5611962b42b2381ebb1270b41299ada82986f96d8b37328887f2e3a91b0125e96170b2c9901b69e5b87c7e11badce243440cd7f5afd0afbfb1130b04e44b0ae697538e297887c1a6f4c04d80cf5fc5f1ab311b2be61fcd6d4af6ee461887e5d82d2aaf23c9cbdbbf51e2d75c9a969c83a30ad7e1081214a"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}], {0x14}}, 0x3f8}, 0x1, 0x0, 0x0, 0x18}, 0x40) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x5c, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004801}, 0x800) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r3 = dup(r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6, 0x2, 0x91, 0x9, 0x0, 0x4, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xf1, 0x13}, 0x9040, 0x500, 0x2, 0x9, 0x5, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x9}, 0x0, 0x3, r3, 0xa) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) waitid(0x0, 0x0, 0x0, 0x80000000, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) waitid(0x0, 0x0, &(0x7f0000000400), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) r5 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0xfe68}}, 0x0) r6 = socket(0x10, 0x803, 0x0) dup3(r6, r5, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x15, 0x9, "2bbb19e5631df896ba98674d0b5600000000000000186049da15bffbdd1a3e02ca0718c73559bc4fe9801d897649294687be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7]}) socket$netlink(0x10, 0x3, 0x0) 02:46:38 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x507, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000007c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x44, 0x3, 0xa, 0x0, 0x0, 0x0, {0xa, 0x0, 0x8}, [@NFTA_CHAIN_HOOK={0x18, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'vlan0\x00'}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x4}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_USERDATA={0x4}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xe0, 0x0, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x97, 0x6, "a2847d0e4d9c362cde89365fcc56e44aef1d4415b60c737ad33458f8f3ebae85c9a18b314f0a0cdcad10995798fd74198a34268b13d1d45a9e9235bca122b1bb9e3ec6e03e35676c9ca0a17f0712e8384d12dc1cae9a8f39f8955bda950bd3e966a360136b5e13fb92a20dd9f98e84e9ae2fbdc908ed6d28e6f73a9709a1d73b84d444423ed8ffb47d8c1c56593549cf58124c"}, @NFTA_TABLE_USERDATA={0x20, 0x6, "3c1861e35545fa13a0e3a9ad337b0bb70dcc4eb3b252ae3954c91cff"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELTABLE={0x234, 0x2, 0xa, 0x3, 0x0, 0x0, {0xc}, [@NFTA_TABLE_USERDATA={0xf3, 0x6, "0eedee994f84e483b2ee73171522162c0d5859a48a275153ad38924a88ffa4d3045b7ac464a02f076c021b65690719f64c97c4c474f6f599812256c0f897606ff7266af528e26f35e6151eb3c8256b0161ba99dfba59422a678a56d575cb67eede578a2b0df0148788504e5b3ee0a43ff12d1877fbac56298967e5ab6f889a1d3eba6d84f3a615b96aef5ab0d4b5ee4d1815f75cca39d4ac9eaa12ebb1b8a6b307ba79578518f51e84383028c578c73f4207d5c0f54415278180aa37a5449bcafed8b2d46338ba8c8d3bffc801865ef59d1124f5cf935df77d73b793f12beaa34cb384c30160abe0c0a8ed836614c3"}, @NFTA_TABLE_USERDATA={0x46, 0x6, "9464f851c0a9fc9d964a91d0d0a48cda0630764e0706d9403e96e9b55b6650cb57abdb63146a7288d7b599754485079792fb60ba046098552e25c5a3301c9ceb4f04"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0xc0, 0x6, "8e9577650594e8fc90caa94d82a184d41b7d73597dbcf02be4a2cc3ecb69258464726b5e64de3365546700e09732e3a2d54327d70e1569556d46da5e325de5c2f2aa56e2e5611962b42b2381ebb1270b41299ada82986f96d8b37328887f2e3a91b0125e96170b2c9901b69e5b87c7e11badce243440cd7f5afd0afbfb1130b04e44b0ae697538e297887c1a6f4c04d80cf5fc5f1ab311b2be61fcd6d4af6ee461887e5d82d2aaf23c9cbdbbf51e2d75c9a969c83a30ad7e1081214a"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}], {0x14}}, 0x3f8}, 0x1, 0x0, 0x0, 0x18}, 0x40) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x5c, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004801}, 0x800) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r3 = dup(r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6, 0x2, 0x91, 0x9, 0x0, 0x4, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xf1, 0x13}, 0x9040, 0x500, 0x2, 0x9, 0x5, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x9}, 0x0, 0x3, r3, 0xa) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) waitid(0x0, 0x0, 0x0, 0x80000000, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) waitid(0x0, 0x0, &(0x7f0000000400), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) r5 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0xfe68}}, 0x0) r6 = socket(0x10, 0x803, 0x0) dup3(r6, r5, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x15, 0x9, "2bbb19e5631df896ba98674d0b5600000000000000186049da15bffbdd1a3e02ca0718c73559bc4fe9801d897649294687be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7]}) socket$netlink(0x10, 0x3, 0x0) 02:46:38 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x507, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000007c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x44, 0x3, 0xa, 0x0, 0x0, 0x0, {0xa, 0x0, 0x8}, [@NFTA_CHAIN_HOOK={0x18, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'vlan0\x00'}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x4}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_USERDATA={0x4}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xe0, 0x0, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x97, 0x6, "a2847d0e4d9c362cde89365fcc56e44aef1d4415b60c737ad33458f8f3ebae85c9a18b314f0a0cdcad10995798fd74198a34268b13d1d45a9e9235bca122b1bb9e3ec6e03e35676c9ca0a17f0712e8384d12dc1cae9a8f39f8955bda950bd3e966a360136b5e13fb92a20dd9f98e84e9ae2fbdc908ed6d28e6f73a9709a1d73b84d444423ed8ffb47d8c1c56593549cf58124c"}, @NFTA_TABLE_USERDATA={0x20, 0x6, "3c1861e35545fa13a0e3a9ad337b0bb70dcc4eb3b252ae3954c91cff"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELTABLE={0x234, 0x2, 0xa, 0x3, 0x0, 0x0, {0xc}, [@NFTA_TABLE_USERDATA={0xf3, 0x6, "0eedee994f84e483b2ee73171522162c0d5859a48a275153ad38924a88ffa4d3045b7ac464a02f076c021b65690719f64c97c4c474f6f599812256c0f897606ff7266af528e26f35e6151eb3c8256b0161ba99dfba59422a678a56d575cb67eede578a2b0df0148788504e5b3ee0a43ff12d1877fbac56298967e5ab6f889a1d3eba6d84f3a615b96aef5ab0d4b5ee4d1815f75cca39d4ac9eaa12ebb1b8a6b307ba79578518f51e84383028c578c73f4207d5c0f54415278180aa37a5449bcafed8b2d46338ba8c8d3bffc801865ef59d1124f5cf935df77d73b793f12beaa34cb384c30160abe0c0a8ed836614c3"}, @NFTA_TABLE_USERDATA={0x46, 0x6, "9464f851c0a9fc9d964a91d0d0a48cda0630764e0706d9403e96e9b55b6650cb57abdb63146a7288d7b599754485079792fb60ba046098552e25c5a3301c9ceb4f04"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0xc0, 0x6, "8e9577650594e8fc90caa94d82a184d41b7d73597dbcf02be4a2cc3ecb69258464726b5e64de3365546700e09732e3a2d54327d70e1569556d46da5e325de5c2f2aa56e2e5611962b42b2381ebb1270b41299ada82986f96d8b37328887f2e3a91b0125e96170b2c9901b69e5b87c7e11badce243440cd7f5afd0afbfb1130b04e44b0ae697538e297887c1a6f4c04d80cf5fc5f1ab311b2be61fcd6d4af6ee461887e5d82d2aaf23c9cbdbbf51e2d75c9a969c83a30ad7e1081214a"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}], {0x14}}, 0x3f8}, 0x1, 0x0, 0x0, 0x18}, 0x40) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x5c, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004801}, 0x800) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r3 = dup(r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6, 0x2, 0x91, 0x9, 0x0, 0x4, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xf1, 0x13}, 0x9040, 0x500, 0x2, 0x9, 0x5, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x9}, 0x0, 0x3, r3, 0xa) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) waitid(0x0, 0x0, 0x0, 0x80000000, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) waitid(0x0, 0x0, &(0x7f0000000400), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) r5 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0xfe68}}, 0x0) r6 = socket(0x10, 0x803, 0x0) dup3(r6, r5, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x15, 0x9, "2bbb19e5631df896ba98674d0b5600000000000000186049da15bffbdd1a3e02ca0718c73559bc4fe9801d897649294687be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7]}) socket$netlink(0x10, 0x3, 0x0) 02:46:38 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x507, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000007c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x44, 0x3, 0xa, 0x0, 0x0, 0x0, {0xa, 0x0, 0x8}, [@NFTA_CHAIN_HOOK={0x18, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'vlan0\x00'}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x4}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_USERDATA={0x4}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xe0, 0x0, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x97, 0x6, "a2847d0e4d9c362cde89365fcc56e44aef1d4415b60c737ad33458f8f3ebae85c9a18b314f0a0cdcad10995798fd74198a34268b13d1d45a9e9235bca122b1bb9e3ec6e03e35676c9ca0a17f0712e8384d12dc1cae9a8f39f8955bda950bd3e966a360136b5e13fb92a20dd9f98e84e9ae2fbdc908ed6d28e6f73a9709a1d73b84d444423ed8ffb47d8c1c56593549cf58124c"}, @NFTA_TABLE_USERDATA={0x20, 0x6, "3c1861e35545fa13a0e3a9ad337b0bb70dcc4eb3b252ae3954c91cff"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELTABLE={0x234, 0x2, 0xa, 0x3, 0x0, 0x0, {0xc}, [@NFTA_TABLE_USERDATA={0xf3, 0x6, "0eedee994f84e483b2ee73171522162c0d5859a48a275153ad38924a88ffa4d3045b7ac464a02f076c021b65690719f64c97c4c474f6f599812256c0f897606ff7266af528e26f35e6151eb3c8256b0161ba99dfba59422a678a56d575cb67eede578a2b0df0148788504e5b3ee0a43ff12d1877fbac56298967e5ab6f889a1d3eba6d84f3a615b96aef5ab0d4b5ee4d1815f75cca39d4ac9eaa12ebb1b8a6b307ba79578518f51e84383028c578c73f4207d5c0f54415278180aa37a5449bcafed8b2d46338ba8c8d3bffc801865ef59d1124f5cf935df77d73b793f12beaa34cb384c30160abe0c0a8ed836614c3"}, @NFTA_TABLE_USERDATA={0x46, 0x6, "9464f851c0a9fc9d964a91d0d0a48cda0630764e0706d9403e96e9b55b6650cb57abdb63146a7288d7b599754485079792fb60ba046098552e25c5a3301c9ceb4f04"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0xc0, 0x6, "8e9577650594e8fc90caa94d82a184d41b7d73597dbcf02be4a2cc3ecb69258464726b5e64de3365546700e09732e3a2d54327d70e1569556d46da5e325de5c2f2aa56e2e5611962b42b2381ebb1270b41299ada82986f96d8b37328887f2e3a91b0125e96170b2c9901b69e5b87c7e11badce243440cd7f5afd0afbfb1130b04e44b0ae697538e297887c1a6f4c04d80cf5fc5f1ab311b2be61fcd6d4af6ee461887e5d82d2aaf23c9cbdbbf51e2d75c9a969c83a30ad7e1081214a"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}], {0x14}}, 0x3f8}, 0x1, 0x0, 0x0, 0x18}, 0x40) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x5c, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004801}, 0x800) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r3 = dup(r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6, 0x2, 0x91, 0x9, 0x0, 0x4, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xf1, 0x13}, 0x9040, 0x500, 0x2, 0x9, 0x5, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x9}, 0x0, 0x3, r3, 0xa) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) waitid(0x0, 0x0, 0x0, 0x80000000, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) waitid(0x0, 0x0, &(0x7f0000000400), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) r5 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0xfe68}}, 0x0) r6 = socket(0x10, 0x803, 0x0) dup3(r6, r5, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x15, 0x9, "2bbb19e5631df896ba98674d0b5600000000000000186049da15bffbdd1a3e02ca0718c73559bc4fe9801d897649294687be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7]}) socket$netlink(0x10, 0x3, 0x0) 02:46:38 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x507, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000007c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x44, 0x3, 0xa, 0x0, 0x0, 0x0, {0xa, 0x0, 0x8}, [@NFTA_CHAIN_HOOK={0x18, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'vlan0\x00'}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x4}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_USERDATA={0x4}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xe0, 0x0, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x97, 0x6, "a2847d0e4d9c362cde89365fcc56e44aef1d4415b60c737ad33458f8f3ebae85c9a18b314f0a0cdcad10995798fd74198a34268b13d1d45a9e9235bca122b1bb9e3ec6e03e35676c9ca0a17f0712e8384d12dc1cae9a8f39f8955bda950bd3e966a360136b5e13fb92a20dd9f98e84e9ae2fbdc908ed6d28e6f73a9709a1d73b84d444423ed8ffb47d8c1c56593549cf58124c"}, @NFTA_TABLE_USERDATA={0x20, 0x6, "3c1861e35545fa13a0e3a9ad337b0bb70dcc4eb3b252ae3954c91cff"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELTABLE={0x234, 0x2, 0xa, 0x3, 0x0, 0x0, {0xc}, [@NFTA_TABLE_USERDATA={0xf3, 0x6, "0eedee994f84e483b2ee73171522162c0d5859a48a275153ad38924a88ffa4d3045b7ac464a02f076c021b65690719f64c97c4c474f6f599812256c0f897606ff7266af528e26f35e6151eb3c8256b0161ba99dfba59422a678a56d575cb67eede578a2b0df0148788504e5b3ee0a43ff12d1877fbac56298967e5ab6f889a1d3eba6d84f3a615b96aef5ab0d4b5ee4d1815f75cca39d4ac9eaa12ebb1b8a6b307ba79578518f51e84383028c578c73f4207d5c0f54415278180aa37a5449bcafed8b2d46338ba8c8d3bffc801865ef59d1124f5cf935df77d73b793f12beaa34cb384c30160abe0c0a8ed836614c3"}, @NFTA_TABLE_USERDATA={0x46, 0x6, "9464f851c0a9fc9d964a91d0d0a48cda0630764e0706d9403e96e9b55b6650cb57abdb63146a7288d7b599754485079792fb60ba046098552e25c5a3301c9ceb4f04"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0xc0, 0x6, "8e9577650594e8fc90caa94d82a184d41b7d73597dbcf02be4a2cc3ecb69258464726b5e64de3365546700e09732e3a2d54327d70e1569556d46da5e325de5c2f2aa56e2e5611962b42b2381ebb1270b41299ada82986f96d8b37328887f2e3a91b0125e96170b2c9901b69e5b87c7e11badce243440cd7f5afd0afbfb1130b04e44b0ae697538e297887c1a6f4c04d80cf5fc5f1ab311b2be61fcd6d4af6ee461887e5d82d2aaf23c9cbdbbf51e2d75c9a969c83a30ad7e1081214a"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}], {0x14}}, 0x3f8}, 0x1, 0x0, 0x0, 0x18}, 0x40) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x5c, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004801}, 0x800) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r3 = dup(r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6, 0x2, 0x91, 0x9, 0x0, 0x4, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xf1, 0x13}, 0x9040, 0x500, 0x2, 0x9, 0x5, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x9}, 0x0, 0x3, r3, 0xa) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) waitid(0x0, 0x0, 0x0, 0x80000000, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) waitid(0x0, 0x0, &(0x7f0000000400), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) r5 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0xfe68}}, 0x0) r6 = socket(0x10, 0x803, 0x0) dup3(r6, r5, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x15, 0x9, "2bbb19e5631df896ba98674d0b5600000000000000186049da15bffbdd1a3e02ca0718c73559bc4fe9801d897649294687be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7]}) socket$netlink(0x10, 0x3, 0x0) 02:46:38 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x507, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000007c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x44, 0x3, 0xa, 0x0, 0x0, 0x0, {0xa, 0x0, 0x8}, [@NFTA_CHAIN_HOOK={0x18, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'vlan0\x00'}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x4}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_USERDATA={0x4}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xe0, 0x0, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x97, 0x6, "a2847d0e4d9c362cde89365fcc56e44aef1d4415b60c737ad33458f8f3ebae85c9a18b314f0a0cdcad10995798fd74198a34268b13d1d45a9e9235bca122b1bb9e3ec6e03e35676c9ca0a17f0712e8384d12dc1cae9a8f39f8955bda950bd3e966a360136b5e13fb92a20dd9f98e84e9ae2fbdc908ed6d28e6f73a9709a1d73b84d444423ed8ffb47d8c1c56593549cf58124c"}, @NFTA_TABLE_USERDATA={0x20, 0x6, "3c1861e35545fa13a0e3a9ad337b0bb70dcc4eb3b252ae3954c91cff"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELTABLE={0x234, 0x2, 0xa, 0x3, 0x0, 0x0, {0xc}, [@NFTA_TABLE_USERDATA={0xf3, 0x6, "0eedee994f84e483b2ee73171522162c0d5859a48a275153ad38924a88ffa4d3045b7ac464a02f076c021b65690719f64c97c4c474f6f599812256c0f897606ff7266af528e26f35e6151eb3c8256b0161ba99dfba59422a678a56d575cb67eede578a2b0df0148788504e5b3ee0a43ff12d1877fbac56298967e5ab6f889a1d3eba6d84f3a615b96aef5ab0d4b5ee4d1815f75cca39d4ac9eaa12ebb1b8a6b307ba79578518f51e84383028c578c73f4207d5c0f54415278180aa37a5449bcafed8b2d46338ba8c8d3bffc801865ef59d1124f5cf935df77d73b793f12beaa34cb384c30160abe0c0a8ed836614c3"}, @NFTA_TABLE_USERDATA={0x46, 0x6, "9464f851c0a9fc9d964a91d0d0a48cda0630764e0706d9403e96e9b55b6650cb57abdb63146a7288d7b599754485079792fb60ba046098552e25c5a3301c9ceb4f04"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0xc0, 0x6, "8e9577650594e8fc90caa94d82a184d41b7d73597dbcf02be4a2cc3ecb69258464726b5e64de3365546700e09732e3a2d54327d70e1569556d46da5e325de5c2f2aa56e2e5611962b42b2381ebb1270b41299ada82986f96d8b37328887f2e3a91b0125e96170b2c9901b69e5b87c7e11badce243440cd7f5afd0afbfb1130b04e44b0ae697538e297887c1a6f4c04d80cf5fc5f1ab311b2be61fcd6d4af6ee461887e5d82d2aaf23c9cbdbbf51e2d75c9a969c83a30ad7e1081214a"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}], {0x14}}, 0x3f8}, 0x1, 0x0, 0x0, 0x18}, 0x40) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x5c, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004801}, 0x800) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r3 = dup(r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6, 0x2, 0x91, 0x9, 0x0, 0x4, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xf1, 0x13}, 0x9040, 0x500, 0x2, 0x9, 0x5, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x9}, 0x0, 0x3, r3, 0xa) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) waitid(0x0, 0x0, 0x0, 0x80000000, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) waitid(0x0, 0x0, &(0x7f0000000400), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) r5 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0xfe68}}, 0x0) r6 = socket(0x10, 0x803, 0x0) dup3(r6, r5, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x15, 0x9, "2bbb19e5631df896ba98674d0b5600000000000000186049da15bffbdd1a3e02ca0718c73559bc4fe9801d897649294687be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7]}) socket$netlink(0x10, 0x3, 0x0) 02:46:38 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x507, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000007c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x44, 0x3, 0xa, 0x0, 0x0, 0x0, {0xa, 0x0, 0x8}, [@NFTA_CHAIN_HOOK={0x18, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'vlan0\x00'}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x4}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_USERDATA={0x4}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xe0, 0x0, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x97, 0x6, "a2847d0e4d9c362cde89365fcc56e44aef1d4415b60c737ad33458f8f3ebae85c9a18b314f0a0cdcad10995798fd74198a34268b13d1d45a9e9235bca122b1bb9e3ec6e03e35676c9ca0a17f0712e8384d12dc1cae9a8f39f8955bda950bd3e966a360136b5e13fb92a20dd9f98e84e9ae2fbdc908ed6d28e6f73a9709a1d73b84d444423ed8ffb47d8c1c56593549cf58124c"}, @NFTA_TABLE_USERDATA={0x20, 0x6, "3c1861e35545fa13a0e3a9ad337b0bb70dcc4eb3b252ae3954c91cff"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELTABLE={0x234, 0x2, 0xa, 0x3, 0x0, 0x0, {0xc}, [@NFTA_TABLE_USERDATA={0xf3, 0x6, "0eedee994f84e483b2ee73171522162c0d5859a48a275153ad38924a88ffa4d3045b7ac464a02f076c021b65690719f64c97c4c474f6f599812256c0f897606ff7266af528e26f35e6151eb3c8256b0161ba99dfba59422a678a56d575cb67eede578a2b0df0148788504e5b3ee0a43ff12d1877fbac56298967e5ab6f889a1d3eba6d84f3a615b96aef5ab0d4b5ee4d1815f75cca39d4ac9eaa12ebb1b8a6b307ba79578518f51e84383028c578c73f4207d5c0f54415278180aa37a5449bcafed8b2d46338ba8c8d3bffc801865ef59d1124f5cf935df77d73b793f12beaa34cb384c30160abe0c0a8ed836614c3"}, @NFTA_TABLE_USERDATA={0x46, 0x6, "9464f851c0a9fc9d964a91d0d0a48cda0630764e0706d9403e96e9b55b6650cb57abdb63146a7288d7b599754485079792fb60ba046098552e25c5a3301c9ceb4f04"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0xc0, 0x6, "8e9577650594e8fc90caa94d82a184d41b7d73597dbcf02be4a2cc3ecb69258464726b5e64de3365546700e09732e3a2d54327d70e1569556d46da5e325de5c2f2aa56e2e5611962b42b2381ebb1270b41299ada82986f96d8b37328887f2e3a91b0125e96170b2c9901b69e5b87c7e11badce243440cd7f5afd0afbfb1130b04e44b0ae697538e297887c1a6f4c04d80cf5fc5f1ab311b2be61fcd6d4af6ee461887e5d82d2aaf23c9cbdbbf51e2d75c9a969c83a30ad7e1081214a"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}], {0x14}}, 0x3f8}, 0x1, 0x0, 0x0, 0x18}, 0x40) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x5c, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004801}, 0x800) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r3 = dup(r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6, 0x2, 0x91, 0x9, 0x0, 0x4, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xf1, 0x13}, 0x9040, 0x500, 0x2, 0x9, 0x5, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x9}, 0x0, 0x3, r3, 0xa) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) waitid(0x0, 0x0, 0x0, 0x80000000, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) waitid(0x0, 0x0, &(0x7f0000000400), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) r5 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0xfe68}}, 0x0) r6 = socket(0x10, 0x803, 0x0) dup3(r6, r5, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x15, 0x9, "2bbb19e5631df896ba98674d0b5600000000000000186049da15bffbdd1a3e02ca0718c73559bc4fe9801d897649294687be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7]}) socket$netlink(0x10, 0x3, 0x0) 02:46:38 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x507, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000007c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x44, 0x3, 0xa, 0x0, 0x0, 0x0, {0xa, 0x0, 0x8}, [@NFTA_CHAIN_HOOK={0x18, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'vlan0\x00'}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x4}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_USERDATA={0x4}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xe0, 0x0, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x97, 0x6, "a2847d0e4d9c362cde89365fcc56e44aef1d4415b60c737ad33458f8f3ebae85c9a18b314f0a0cdcad10995798fd74198a34268b13d1d45a9e9235bca122b1bb9e3ec6e03e35676c9ca0a17f0712e8384d12dc1cae9a8f39f8955bda950bd3e966a360136b5e13fb92a20dd9f98e84e9ae2fbdc908ed6d28e6f73a9709a1d73b84d444423ed8ffb47d8c1c56593549cf58124c"}, @NFTA_TABLE_USERDATA={0x20, 0x6, "3c1861e35545fa13a0e3a9ad337b0bb70dcc4eb3b252ae3954c91cff"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELTABLE={0x234, 0x2, 0xa, 0x3, 0x0, 0x0, {0xc}, [@NFTA_TABLE_USERDATA={0xf3, 0x6, "0eedee994f84e483b2ee73171522162c0d5859a48a275153ad38924a88ffa4d3045b7ac464a02f076c021b65690719f64c97c4c474f6f599812256c0f897606ff7266af528e26f35e6151eb3c8256b0161ba99dfba59422a678a56d575cb67eede578a2b0df0148788504e5b3ee0a43ff12d1877fbac56298967e5ab6f889a1d3eba6d84f3a615b96aef5ab0d4b5ee4d1815f75cca39d4ac9eaa12ebb1b8a6b307ba79578518f51e84383028c578c73f4207d5c0f54415278180aa37a5449bcafed8b2d46338ba8c8d3bffc801865ef59d1124f5cf935df77d73b793f12beaa34cb384c30160abe0c0a8ed836614c3"}, @NFTA_TABLE_USERDATA={0x46, 0x6, "9464f851c0a9fc9d964a91d0d0a48cda0630764e0706d9403e96e9b55b6650cb57abdb63146a7288d7b599754485079792fb60ba046098552e25c5a3301c9ceb4f04"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0xc0, 0x6, "8e9577650594e8fc90caa94d82a184d41b7d73597dbcf02be4a2cc3ecb69258464726b5e64de3365546700e09732e3a2d54327d70e1569556d46da5e325de5c2f2aa56e2e5611962b42b2381ebb1270b41299ada82986f96d8b37328887f2e3a91b0125e96170b2c9901b69e5b87c7e11badce243440cd7f5afd0afbfb1130b04e44b0ae697538e297887c1a6f4c04d80cf5fc5f1ab311b2be61fcd6d4af6ee461887e5d82d2aaf23c9cbdbbf51e2d75c9a969c83a30ad7e1081214a"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}], {0x14}}, 0x3f8}, 0x1, 0x0, 0x0, 0x18}, 0x40) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x5c, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004801}, 0x800) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r3 = dup(r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6, 0x2, 0x91, 0x9, 0x0, 0x4, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xf1, 0x13}, 0x9040, 0x500, 0x2, 0x9, 0x5, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x9}, 0x0, 0x3, r3, 0xa) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) waitid(0x0, 0x0, 0x0, 0x80000000, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) waitid(0x0, 0x0, &(0x7f0000000400), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) r5 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0xfe68}}, 0x0) r6 = socket(0x10, 0x803, 0x0) dup3(r6, r5, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x15, 0x9, "2bbb19e5631df896ba98674d0b5600000000000000186049da15bffbdd1a3e02ca0718c73559bc4fe9801d897649294687be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7]}) socket$netlink(0x10, 0x3, 0x0) 02:46:39 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x507, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000007c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x44, 0x3, 0xa, 0x0, 0x0, 0x0, {0xa, 0x0, 0x8}, [@NFTA_CHAIN_HOOK={0x18, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'vlan0\x00'}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x4}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_USERDATA={0x4}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xe0, 0x0, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x97, 0x6, "a2847d0e4d9c362cde89365fcc56e44aef1d4415b60c737ad33458f8f3ebae85c9a18b314f0a0cdcad10995798fd74198a34268b13d1d45a9e9235bca122b1bb9e3ec6e03e35676c9ca0a17f0712e8384d12dc1cae9a8f39f8955bda950bd3e966a360136b5e13fb92a20dd9f98e84e9ae2fbdc908ed6d28e6f73a9709a1d73b84d444423ed8ffb47d8c1c56593549cf58124c"}, @NFTA_TABLE_USERDATA={0x20, 0x6, "3c1861e35545fa13a0e3a9ad337b0bb70dcc4eb3b252ae3954c91cff"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELTABLE={0x234, 0x2, 0xa, 0x3, 0x0, 0x0, {0xc}, [@NFTA_TABLE_USERDATA={0xf3, 0x6, "0eedee994f84e483b2ee73171522162c0d5859a48a275153ad38924a88ffa4d3045b7ac464a02f076c021b65690719f64c97c4c474f6f599812256c0f897606ff7266af528e26f35e6151eb3c8256b0161ba99dfba59422a678a56d575cb67eede578a2b0df0148788504e5b3ee0a43ff12d1877fbac56298967e5ab6f889a1d3eba6d84f3a615b96aef5ab0d4b5ee4d1815f75cca39d4ac9eaa12ebb1b8a6b307ba79578518f51e84383028c578c73f4207d5c0f54415278180aa37a5449bcafed8b2d46338ba8c8d3bffc801865ef59d1124f5cf935df77d73b793f12beaa34cb384c30160abe0c0a8ed836614c3"}, @NFTA_TABLE_USERDATA={0x46, 0x6, "9464f851c0a9fc9d964a91d0d0a48cda0630764e0706d9403e96e9b55b6650cb57abdb63146a7288d7b599754485079792fb60ba046098552e25c5a3301c9ceb4f04"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0xc0, 0x6, "8e9577650594e8fc90caa94d82a184d41b7d73597dbcf02be4a2cc3ecb69258464726b5e64de3365546700e09732e3a2d54327d70e1569556d46da5e325de5c2f2aa56e2e5611962b42b2381ebb1270b41299ada82986f96d8b37328887f2e3a91b0125e96170b2c9901b69e5b87c7e11badce243440cd7f5afd0afbfb1130b04e44b0ae697538e297887c1a6f4c04d80cf5fc5f1ab311b2be61fcd6d4af6ee461887e5d82d2aaf23c9cbdbbf51e2d75c9a969c83a30ad7e1081214a"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}], {0x14}}, 0x3f8}, 0x1, 0x0, 0x0, 0x18}, 0x40) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x5c, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004801}, 0x800) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r3 = dup(r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6, 0x2, 0x91, 0x9, 0x0, 0x4, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xf1, 0x13}, 0x9040, 0x500, 0x2, 0x9, 0x5, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x9}, 0x0, 0x3, r3, 0xa) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) waitid(0x0, 0x0, 0x0, 0x80000000, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) waitid(0x0, 0x0, &(0x7f0000000400), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) r5 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0xfe68}}, 0x0) r6 = socket(0x10, 0x803, 0x0) dup3(r6, r5, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x15, 0x9, "2bbb19e5631df896ba98674d0b5600000000000000186049da15bffbdd1a3e02ca0718c73559bc4fe9801d897649294687be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7]}) socket$netlink(0x10, 0x3, 0x0) 02:46:39 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x507, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000007c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x44, 0x3, 0xa, 0x0, 0x0, 0x0, {0xa, 0x0, 0x8}, [@NFTA_CHAIN_HOOK={0x18, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'vlan0\x00'}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x4}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_USERDATA={0x4}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xe0, 0x0, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x97, 0x6, "a2847d0e4d9c362cde89365fcc56e44aef1d4415b60c737ad33458f8f3ebae85c9a18b314f0a0cdcad10995798fd74198a34268b13d1d45a9e9235bca122b1bb9e3ec6e03e35676c9ca0a17f0712e8384d12dc1cae9a8f39f8955bda950bd3e966a360136b5e13fb92a20dd9f98e84e9ae2fbdc908ed6d28e6f73a9709a1d73b84d444423ed8ffb47d8c1c56593549cf58124c"}, @NFTA_TABLE_USERDATA={0x20, 0x6, "3c1861e35545fa13a0e3a9ad337b0bb70dcc4eb3b252ae3954c91cff"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELTABLE={0x234, 0x2, 0xa, 0x3, 0x0, 0x0, {0xc}, [@NFTA_TABLE_USERDATA={0xf3, 0x6, "0eedee994f84e483b2ee73171522162c0d5859a48a275153ad38924a88ffa4d3045b7ac464a02f076c021b65690719f64c97c4c474f6f599812256c0f897606ff7266af528e26f35e6151eb3c8256b0161ba99dfba59422a678a56d575cb67eede578a2b0df0148788504e5b3ee0a43ff12d1877fbac56298967e5ab6f889a1d3eba6d84f3a615b96aef5ab0d4b5ee4d1815f75cca39d4ac9eaa12ebb1b8a6b307ba79578518f51e84383028c578c73f4207d5c0f54415278180aa37a5449bcafed8b2d46338ba8c8d3bffc801865ef59d1124f5cf935df77d73b793f12beaa34cb384c30160abe0c0a8ed836614c3"}, @NFTA_TABLE_USERDATA={0x46, 0x6, "9464f851c0a9fc9d964a91d0d0a48cda0630764e0706d9403e96e9b55b6650cb57abdb63146a7288d7b599754485079792fb60ba046098552e25c5a3301c9ceb4f04"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0xc0, 0x6, "8e9577650594e8fc90caa94d82a184d41b7d73597dbcf02be4a2cc3ecb69258464726b5e64de3365546700e09732e3a2d54327d70e1569556d46da5e325de5c2f2aa56e2e5611962b42b2381ebb1270b41299ada82986f96d8b37328887f2e3a91b0125e96170b2c9901b69e5b87c7e11badce243440cd7f5afd0afbfb1130b04e44b0ae697538e297887c1a6f4c04d80cf5fc5f1ab311b2be61fcd6d4af6ee461887e5d82d2aaf23c9cbdbbf51e2d75c9a969c83a30ad7e1081214a"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}], {0x14}}, 0x3f8}, 0x1, 0x0, 0x0, 0x18}, 0x40) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x5c, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004801}, 0x800) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r3 = dup(r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6, 0x2, 0x91, 0x9, 0x0, 0x4, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xf1, 0x13}, 0x9040, 0x500, 0x2, 0x9, 0x5, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x9}, 0x0, 0x3, r3, 0xa) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) waitid(0x0, 0x0, 0x0, 0x80000000, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) waitid(0x0, 0x0, &(0x7f0000000400), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) r5 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0xfe68}}, 0x0) r6 = socket(0x10, 0x803, 0x0) dup3(r6, r5, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x15, 0x9, "2bbb19e5631df896ba98674d0b5600000000000000186049da15bffbdd1a3e02ca0718c73559bc4fe9801d897649294687be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7]}) socket$netlink(0x10, 0x3, 0x0) 02:46:39 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x507, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000007c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x44, 0x3, 0xa, 0x0, 0x0, 0x0, {0xa, 0x0, 0x8}, [@NFTA_CHAIN_HOOK={0x18, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'vlan0\x00'}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x4}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_USERDATA={0x4}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xe0, 0x0, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x97, 0x6, "a2847d0e4d9c362cde89365fcc56e44aef1d4415b60c737ad33458f8f3ebae85c9a18b314f0a0cdcad10995798fd74198a34268b13d1d45a9e9235bca122b1bb9e3ec6e03e35676c9ca0a17f0712e8384d12dc1cae9a8f39f8955bda950bd3e966a360136b5e13fb92a20dd9f98e84e9ae2fbdc908ed6d28e6f73a9709a1d73b84d444423ed8ffb47d8c1c56593549cf58124c"}, @NFTA_TABLE_USERDATA={0x20, 0x6, "3c1861e35545fa13a0e3a9ad337b0bb70dcc4eb3b252ae3954c91cff"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELTABLE={0x234, 0x2, 0xa, 0x3, 0x0, 0x0, {0xc}, [@NFTA_TABLE_USERDATA={0xf3, 0x6, "0eedee994f84e483b2ee73171522162c0d5859a48a275153ad38924a88ffa4d3045b7ac464a02f076c021b65690719f64c97c4c474f6f599812256c0f897606ff7266af528e26f35e6151eb3c8256b0161ba99dfba59422a678a56d575cb67eede578a2b0df0148788504e5b3ee0a43ff12d1877fbac56298967e5ab6f889a1d3eba6d84f3a615b96aef5ab0d4b5ee4d1815f75cca39d4ac9eaa12ebb1b8a6b307ba79578518f51e84383028c578c73f4207d5c0f54415278180aa37a5449bcafed8b2d46338ba8c8d3bffc801865ef59d1124f5cf935df77d73b793f12beaa34cb384c30160abe0c0a8ed836614c3"}, @NFTA_TABLE_USERDATA={0x46, 0x6, "9464f851c0a9fc9d964a91d0d0a48cda0630764e0706d9403e96e9b55b6650cb57abdb63146a7288d7b599754485079792fb60ba046098552e25c5a3301c9ceb4f04"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0xc0, 0x6, "8e9577650594e8fc90caa94d82a184d41b7d73597dbcf02be4a2cc3ecb69258464726b5e64de3365546700e09732e3a2d54327d70e1569556d46da5e325de5c2f2aa56e2e5611962b42b2381ebb1270b41299ada82986f96d8b37328887f2e3a91b0125e96170b2c9901b69e5b87c7e11badce243440cd7f5afd0afbfb1130b04e44b0ae697538e297887c1a6f4c04d80cf5fc5f1ab311b2be61fcd6d4af6ee461887e5d82d2aaf23c9cbdbbf51e2d75c9a969c83a30ad7e1081214a"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}], {0x14}}, 0x3f8}, 0x1, 0x0, 0x0, 0x18}, 0x40) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x5c, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004801}, 0x800) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r3 = dup(r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6, 0x2, 0x91, 0x9, 0x0, 0x4, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xf1, 0x13}, 0x9040, 0x500, 0x2, 0x9, 0x5, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x9}, 0x0, 0x3, r3, 0xa) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) waitid(0x0, 0x0, 0x0, 0x80000000, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) waitid(0x0, 0x0, &(0x7f0000000400), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) r5 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0xfe68}}, 0x0) r6 = socket(0x10, 0x803, 0x0) dup3(r6, r5, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x15, 0x9, "2bbb19e5631df896ba98674d0b5600000000000000186049da15bffbdd1a3e02ca0718c73559bc4fe9801d897649294687be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7]}) socket$netlink(0x10, 0x3, 0x0) 02:46:39 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x507, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000007c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x44, 0x3, 0xa, 0x0, 0x0, 0x0, {0xa, 0x0, 0x8}, [@NFTA_CHAIN_HOOK={0x18, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'vlan0\x00'}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x4}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_USERDATA={0x4}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xe0, 0x0, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x97, 0x6, "a2847d0e4d9c362cde89365fcc56e44aef1d4415b60c737ad33458f8f3ebae85c9a18b314f0a0cdcad10995798fd74198a34268b13d1d45a9e9235bca122b1bb9e3ec6e03e35676c9ca0a17f0712e8384d12dc1cae9a8f39f8955bda950bd3e966a360136b5e13fb92a20dd9f98e84e9ae2fbdc908ed6d28e6f73a9709a1d73b84d444423ed8ffb47d8c1c56593549cf58124c"}, @NFTA_TABLE_USERDATA={0x20, 0x6, "3c1861e35545fa13a0e3a9ad337b0bb70dcc4eb3b252ae3954c91cff"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELTABLE={0x234, 0x2, 0xa, 0x3, 0x0, 0x0, {0xc}, [@NFTA_TABLE_USERDATA={0xf3, 0x6, "0eedee994f84e483b2ee73171522162c0d5859a48a275153ad38924a88ffa4d3045b7ac464a02f076c021b65690719f64c97c4c474f6f599812256c0f897606ff7266af528e26f35e6151eb3c8256b0161ba99dfba59422a678a56d575cb67eede578a2b0df0148788504e5b3ee0a43ff12d1877fbac56298967e5ab6f889a1d3eba6d84f3a615b96aef5ab0d4b5ee4d1815f75cca39d4ac9eaa12ebb1b8a6b307ba79578518f51e84383028c578c73f4207d5c0f54415278180aa37a5449bcafed8b2d46338ba8c8d3bffc801865ef59d1124f5cf935df77d73b793f12beaa34cb384c30160abe0c0a8ed836614c3"}, @NFTA_TABLE_USERDATA={0x46, 0x6, "9464f851c0a9fc9d964a91d0d0a48cda0630764e0706d9403e96e9b55b6650cb57abdb63146a7288d7b599754485079792fb60ba046098552e25c5a3301c9ceb4f04"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0xc0, 0x6, "8e9577650594e8fc90caa94d82a184d41b7d73597dbcf02be4a2cc3ecb69258464726b5e64de3365546700e09732e3a2d54327d70e1569556d46da5e325de5c2f2aa56e2e5611962b42b2381ebb1270b41299ada82986f96d8b37328887f2e3a91b0125e96170b2c9901b69e5b87c7e11badce243440cd7f5afd0afbfb1130b04e44b0ae697538e297887c1a6f4c04d80cf5fc5f1ab311b2be61fcd6d4af6ee461887e5d82d2aaf23c9cbdbbf51e2d75c9a969c83a30ad7e1081214a"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}], {0x14}}, 0x3f8}, 0x1, 0x0, 0x0, 0x18}, 0x40) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x5c, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004801}, 0x800) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r3 = dup(r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6, 0x2, 0x91, 0x9, 0x0, 0x4, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xf1, 0x13}, 0x9040, 0x500, 0x2, 0x9, 0x5, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x9}, 0x0, 0x3, r3, 0xa) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) waitid(0x0, 0x0, 0x0, 0x80000000, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) waitid(0x0, 0x0, &(0x7f0000000400), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) r5 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0xfe68}}, 0x0) r6 = socket(0x10, 0x803, 0x0) dup3(r6, r5, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x15, 0x9, "2bbb19e5631df896ba98674d0b5600000000000000186049da15bffbdd1a3e02ca0718c73559bc4fe9801d897649294687be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7]}) socket$netlink(0x10, 0x3, 0x0) 02:46:39 executing program 4: syz_mount_image$f2fs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200080, &(0x7f0000000140)={[{@jqfmt_vfsv1}, {@nolazytime}, {@noinline_dentry}]}, 0x1, 0x54f3, &(0x7f0000005640)="$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") mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000100)='./file1\x00', 0x200) 02:46:39 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x507, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000007c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x44, 0x3, 0xa, 0x0, 0x0, 0x0, {0xa, 0x0, 0x8}, [@NFTA_CHAIN_HOOK={0x18, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'vlan0\x00'}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x4}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_USERDATA={0x4}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xe0, 0x0, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x97, 0x6, "a2847d0e4d9c362cde89365fcc56e44aef1d4415b60c737ad33458f8f3ebae85c9a18b314f0a0cdcad10995798fd74198a34268b13d1d45a9e9235bca122b1bb9e3ec6e03e35676c9ca0a17f0712e8384d12dc1cae9a8f39f8955bda950bd3e966a360136b5e13fb92a20dd9f98e84e9ae2fbdc908ed6d28e6f73a9709a1d73b84d444423ed8ffb47d8c1c56593549cf58124c"}, @NFTA_TABLE_USERDATA={0x20, 0x6, "3c1861e35545fa13a0e3a9ad337b0bb70dcc4eb3b252ae3954c91cff"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELTABLE={0x234, 0x2, 0xa, 0x3, 0x0, 0x0, {0xc}, [@NFTA_TABLE_USERDATA={0xf3, 0x6, "0eedee994f84e483b2ee73171522162c0d5859a48a275153ad38924a88ffa4d3045b7ac464a02f076c021b65690719f64c97c4c474f6f599812256c0f897606ff7266af528e26f35e6151eb3c8256b0161ba99dfba59422a678a56d575cb67eede578a2b0df0148788504e5b3ee0a43ff12d1877fbac56298967e5ab6f889a1d3eba6d84f3a615b96aef5ab0d4b5ee4d1815f75cca39d4ac9eaa12ebb1b8a6b307ba79578518f51e84383028c578c73f4207d5c0f54415278180aa37a5449bcafed8b2d46338ba8c8d3bffc801865ef59d1124f5cf935df77d73b793f12beaa34cb384c30160abe0c0a8ed836614c3"}, @NFTA_TABLE_USERDATA={0x46, 0x6, "9464f851c0a9fc9d964a91d0d0a48cda0630764e0706d9403e96e9b55b6650cb57abdb63146a7288d7b599754485079792fb60ba046098552e25c5a3301c9ceb4f04"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0xc0, 0x6, "8e9577650594e8fc90caa94d82a184d41b7d73597dbcf02be4a2cc3ecb69258464726b5e64de3365546700e09732e3a2d54327d70e1569556d46da5e325de5c2f2aa56e2e5611962b42b2381ebb1270b41299ada82986f96d8b37328887f2e3a91b0125e96170b2c9901b69e5b87c7e11badce243440cd7f5afd0afbfb1130b04e44b0ae697538e297887c1a6f4c04d80cf5fc5f1ab311b2be61fcd6d4af6ee461887e5d82d2aaf23c9cbdbbf51e2d75c9a969c83a30ad7e1081214a"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}], {0x14}}, 0x3f8}, 0x1, 0x0, 0x0, 0x18}, 0x40) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x5c, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004801}, 0x800) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r3 = dup(r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6, 0x2, 0x91, 0x9, 0x0, 0x4, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xf1, 0x13}, 0x9040, 0x500, 0x2, 0x9, 0x5, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x9}, 0x0, 0x3, r3, 0xa) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) waitid(0x0, 0x0, 0x0, 0x80000000, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) waitid(0x0, 0x0, &(0x7f0000000400), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) r5 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0xfe68}}, 0x0) r6 = socket(0x10, 0x803, 0x0) dup3(r6, r5, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x15, 0x9, "2bbb19e5631df896ba98674d0b5600000000000000186049da15bffbdd1a3e02ca0718c73559bc4fe9801d897649294687be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7]}) socket$netlink(0x10, 0x3, 0x0) 02:46:39 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x507, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000007c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x44, 0x3, 0xa, 0x0, 0x0, 0x0, {0xa, 0x0, 0x8}, [@NFTA_CHAIN_HOOK={0x18, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'vlan0\x00'}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x4}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_USERDATA={0x4}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xe0, 0x0, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x97, 0x6, "a2847d0e4d9c362cde89365fcc56e44aef1d4415b60c737ad33458f8f3ebae85c9a18b314f0a0cdcad10995798fd74198a34268b13d1d45a9e9235bca122b1bb9e3ec6e03e35676c9ca0a17f0712e8384d12dc1cae9a8f39f8955bda950bd3e966a360136b5e13fb92a20dd9f98e84e9ae2fbdc908ed6d28e6f73a9709a1d73b84d444423ed8ffb47d8c1c56593549cf58124c"}, @NFTA_TABLE_USERDATA={0x20, 0x6, "3c1861e35545fa13a0e3a9ad337b0bb70dcc4eb3b252ae3954c91cff"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELTABLE={0x234, 0x2, 0xa, 0x3, 0x0, 0x0, {0xc}, [@NFTA_TABLE_USERDATA={0xf3, 0x6, "0eedee994f84e483b2ee73171522162c0d5859a48a275153ad38924a88ffa4d3045b7ac464a02f076c021b65690719f64c97c4c474f6f599812256c0f897606ff7266af528e26f35e6151eb3c8256b0161ba99dfba59422a678a56d575cb67eede578a2b0df0148788504e5b3ee0a43ff12d1877fbac56298967e5ab6f889a1d3eba6d84f3a615b96aef5ab0d4b5ee4d1815f75cca39d4ac9eaa12ebb1b8a6b307ba79578518f51e84383028c578c73f4207d5c0f54415278180aa37a5449bcafed8b2d46338ba8c8d3bffc801865ef59d1124f5cf935df77d73b793f12beaa34cb384c30160abe0c0a8ed836614c3"}, @NFTA_TABLE_USERDATA={0x46, 0x6, "9464f851c0a9fc9d964a91d0d0a48cda0630764e0706d9403e96e9b55b6650cb57abdb63146a7288d7b599754485079792fb60ba046098552e25c5a3301c9ceb4f04"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0xc0, 0x6, "8e9577650594e8fc90caa94d82a184d41b7d73597dbcf02be4a2cc3ecb69258464726b5e64de3365546700e09732e3a2d54327d70e1569556d46da5e325de5c2f2aa56e2e5611962b42b2381ebb1270b41299ada82986f96d8b37328887f2e3a91b0125e96170b2c9901b69e5b87c7e11badce243440cd7f5afd0afbfb1130b04e44b0ae697538e297887c1a6f4c04d80cf5fc5f1ab311b2be61fcd6d4af6ee461887e5d82d2aaf23c9cbdbbf51e2d75c9a969c83a30ad7e1081214a"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}], {0x14}}, 0x3f8}, 0x1, 0x0, 0x0, 0x18}, 0x40) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x5c, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004801}, 0x800) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r3 = dup(r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6, 0x2, 0x91, 0x9, 0x0, 0x4, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xf1, 0x13}, 0x9040, 0x500, 0x2, 0x9, 0x5, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x9}, 0x0, 0x3, r3, 0xa) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) waitid(0x0, 0x0, 0x0, 0x80000000, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) waitid(0x0, 0x0, &(0x7f0000000400), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) r5 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0xfe68}}, 0x0) r6 = socket(0x10, 0x803, 0x0) dup3(r6, r5, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x15, 0x9, "2bbb19e5631df896ba98674d0b5600000000000000186049da15bffbdd1a3e02ca0718c73559bc4fe9801d897649294687be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7]}) socket$netlink(0x10, 0x3, 0x0) 02:46:39 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x507, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000007c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x44, 0x3, 0xa, 0x0, 0x0, 0x0, {0xa, 0x0, 0x8}, [@NFTA_CHAIN_HOOK={0x18, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'vlan0\x00'}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x4}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_USERDATA={0x4}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xe0, 0x0, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x97, 0x6, "a2847d0e4d9c362cde89365fcc56e44aef1d4415b60c737ad33458f8f3ebae85c9a18b314f0a0cdcad10995798fd74198a34268b13d1d45a9e9235bca122b1bb9e3ec6e03e35676c9ca0a17f0712e8384d12dc1cae9a8f39f8955bda950bd3e966a360136b5e13fb92a20dd9f98e84e9ae2fbdc908ed6d28e6f73a9709a1d73b84d444423ed8ffb47d8c1c56593549cf58124c"}, @NFTA_TABLE_USERDATA={0x20, 0x6, "3c1861e35545fa13a0e3a9ad337b0bb70dcc4eb3b252ae3954c91cff"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELTABLE={0x234, 0x2, 0xa, 0x3, 0x0, 0x0, {0xc}, [@NFTA_TABLE_USERDATA={0xf3, 0x6, "0eedee994f84e483b2ee73171522162c0d5859a48a275153ad38924a88ffa4d3045b7ac464a02f076c021b65690719f64c97c4c474f6f599812256c0f897606ff7266af528e26f35e6151eb3c8256b0161ba99dfba59422a678a56d575cb67eede578a2b0df0148788504e5b3ee0a43ff12d1877fbac56298967e5ab6f889a1d3eba6d84f3a615b96aef5ab0d4b5ee4d1815f75cca39d4ac9eaa12ebb1b8a6b307ba79578518f51e84383028c578c73f4207d5c0f54415278180aa37a5449bcafed8b2d46338ba8c8d3bffc801865ef59d1124f5cf935df77d73b793f12beaa34cb384c30160abe0c0a8ed836614c3"}, @NFTA_TABLE_USERDATA={0x46, 0x6, "9464f851c0a9fc9d964a91d0d0a48cda0630764e0706d9403e96e9b55b6650cb57abdb63146a7288d7b599754485079792fb60ba046098552e25c5a3301c9ceb4f04"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0xc0, 0x6, "8e9577650594e8fc90caa94d82a184d41b7d73597dbcf02be4a2cc3ecb69258464726b5e64de3365546700e09732e3a2d54327d70e1569556d46da5e325de5c2f2aa56e2e5611962b42b2381ebb1270b41299ada82986f96d8b37328887f2e3a91b0125e96170b2c9901b69e5b87c7e11badce243440cd7f5afd0afbfb1130b04e44b0ae697538e297887c1a6f4c04d80cf5fc5f1ab311b2be61fcd6d4af6ee461887e5d82d2aaf23c9cbdbbf51e2d75c9a969c83a30ad7e1081214a"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}], {0x14}}, 0x3f8}, 0x1, 0x0, 0x0, 0x18}, 0x40) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x5c, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004801}, 0x800) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r3 = dup(r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6, 0x2, 0x91, 0x9, 0x0, 0x4, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xf1, 0x13}, 0x9040, 0x500, 0x2, 0x9, 0x5, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x9}, 0x0, 0x3, r3, 0xa) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) waitid(0x0, 0x0, 0x0, 0x80000000, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) waitid(0x0, 0x0, &(0x7f0000000400), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) r5 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0xfe68}}, 0x0) r6 = socket(0x10, 0x803, 0x0) dup3(r6, r5, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x15, 0x9, "2bbb19e5631df896ba98674d0b5600000000000000186049da15bffbdd1a3e02ca0718c73559bc4fe9801d897649294687be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7]}) socket$netlink(0x10, 0x3, 0x0) 02:46:39 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x507, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000007c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x44, 0x3, 0xa, 0x0, 0x0, 0x0, {0xa, 0x0, 0x8}, [@NFTA_CHAIN_HOOK={0x18, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'vlan0\x00'}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x4}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_USERDATA={0x4}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xe0, 0x0, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x97, 0x6, "a2847d0e4d9c362cde89365fcc56e44aef1d4415b60c737ad33458f8f3ebae85c9a18b314f0a0cdcad10995798fd74198a34268b13d1d45a9e9235bca122b1bb9e3ec6e03e35676c9ca0a17f0712e8384d12dc1cae9a8f39f8955bda950bd3e966a360136b5e13fb92a20dd9f98e84e9ae2fbdc908ed6d28e6f73a9709a1d73b84d444423ed8ffb47d8c1c56593549cf58124c"}, @NFTA_TABLE_USERDATA={0x20, 0x6, "3c1861e35545fa13a0e3a9ad337b0bb70dcc4eb3b252ae3954c91cff"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELTABLE={0x234, 0x2, 0xa, 0x3, 0x0, 0x0, {0xc}, [@NFTA_TABLE_USERDATA={0xf3, 0x6, "0eedee994f84e483b2ee73171522162c0d5859a48a275153ad38924a88ffa4d3045b7ac464a02f076c021b65690719f64c97c4c474f6f599812256c0f897606ff7266af528e26f35e6151eb3c8256b0161ba99dfba59422a678a56d575cb67eede578a2b0df0148788504e5b3ee0a43ff12d1877fbac56298967e5ab6f889a1d3eba6d84f3a615b96aef5ab0d4b5ee4d1815f75cca39d4ac9eaa12ebb1b8a6b307ba79578518f51e84383028c578c73f4207d5c0f54415278180aa37a5449bcafed8b2d46338ba8c8d3bffc801865ef59d1124f5cf935df77d73b793f12beaa34cb384c30160abe0c0a8ed836614c3"}, @NFTA_TABLE_USERDATA={0x46, 0x6, "9464f851c0a9fc9d964a91d0d0a48cda0630764e0706d9403e96e9b55b6650cb57abdb63146a7288d7b599754485079792fb60ba046098552e25c5a3301c9ceb4f04"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0xc0, 0x6, "8e9577650594e8fc90caa94d82a184d41b7d73597dbcf02be4a2cc3ecb69258464726b5e64de3365546700e09732e3a2d54327d70e1569556d46da5e325de5c2f2aa56e2e5611962b42b2381ebb1270b41299ada82986f96d8b37328887f2e3a91b0125e96170b2c9901b69e5b87c7e11badce243440cd7f5afd0afbfb1130b04e44b0ae697538e297887c1a6f4c04d80cf5fc5f1ab311b2be61fcd6d4af6ee461887e5d82d2aaf23c9cbdbbf51e2d75c9a969c83a30ad7e1081214a"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}], {0x14}}, 0x3f8}, 0x1, 0x0, 0x0, 0x18}, 0x40) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x5c, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004801}, 0x800) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r3 = dup(r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6, 0x2, 0x91, 0x9, 0x0, 0x4, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xf1, 0x13}, 0x9040, 0x500, 0x2, 0x9, 0x5, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x9}, 0x0, 0x3, r3, 0xa) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) waitid(0x0, 0x0, 0x0, 0x80000000, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) waitid(0x0, 0x0, &(0x7f0000000400), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) r5 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0xfe68}}, 0x0) r6 = socket(0x10, 0x803, 0x0) dup3(r6, r5, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x15, 0x9, "2bbb19e5631df896ba98674d0b5600000000000000186049da15bffbdd1a3e02ca0718c73559bc4fe9801d897649294687be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7]}) socket$netlink(0x10, 0x3, 0x0) 02:46:39 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x507, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000007c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x44, 0x3, 0xa, 0x0, 0x0, 0x0, {0xa, 0x0, 0x8}, [@NFTA_CHAIN_HOOK={0x18, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'vlan0\x00'}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x4}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_USERDATA={0x4}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xe0, 0x0, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x97, 0x6, "a2847d0e4d9c362cde89365fcc56e44aef1d4415b60c737ad33458f8f3ebae85c9a18b314f0a0cdcad10995798fd74198a34268b13d1d45a9e9235bca122b1bb9e3ec6e03e35676c9ca0a17f0712e8384d12dc1cae9a8f39f8955bda950bd3e966a360136b5e13fb92a20dd9f98e84e9ae2fbdc908ed6d28e6f73a9709a1d73b84d444423ed8ffb47d8c1c56593549cf58124c"}, @NFTA_TABLE_USERDATA={0x20, 0x6, "3c1861e35545fa13a0e3a9ad337b0bb70dcc4eb3b252ae3954c91cff"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELTABLE={0x234, 0x2, 0xa, 0x3, 0x0, 0x0, {0xc}, [@NFTA_TABLE_USERDATA={0xf3, 0x6, "0eedee994f84e483b2ee73171522162c0d5859a48a275153ad38924a88ffa4d3045b7ac464a02f076c021b65690719f64c97c4c474f6f599812256c0f897606ff7266af528e26f35e6151eb3c8256b0161ba99dfba59422a678a56d575cb67eede578a2b0df0148788504e5b3ee0a43ff12d1877fbac56298967e5ab6f889a1d3eba6d84f3a615b96aef5ab0d4b5ee4d1815f75cca39d4ac9eaa12ebb1b8a6b307ba79578518f51e84383028c578c73f4207d5c0f54415278180aa37a5449bcafed8b2d46338ba8c8d3bffc801865ef59d1124f5cf935df77d73b793f12beaa34cb384c30160abe0c0a8ed836614c3"}, @NFTA_TABLE_USERDATA={0x46, 0x6, "9464f851c0a9fc9d964a91d0d0a48cda0630764e0706d9403e96e9b55b6650cb57abdb63146a7288d7b599754485079792fb60ba046098552e25c5a3301c9ceb4f04"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0xc0, 0x6, "8e9577650594e8fc90caa94d82a184d41b7d73597dbcf02be4a2cc3ecb69258464726b5e64de3365546700e09732e3a2d54327d70e1569556d46da5e325de5c2f2aa56e2e5611962b42b2381ebb1270b41299ada82986f96d8b37328887f2e3a91b0125e96170b2c9901b69e5b87c7e11badce243440cd7f5afd0afbfb1130b04e44b0ae697538e297887c1a6f4c04d80cf5fc5f1ab311b2be61fcd6d4af6ee461887e5d82d2aaf23c9cbdbbf51e2d75c9a969c83a30ad7e1081214a"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}], {0x14}}, 0x3f8}, 0x1, 0x0, 0x0, 0x18}, 0x40) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x5c, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004801}, 0x800) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r3 = dup(r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6, 0x2, 0x91, 0x9, 0x0, 0x4, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xf1, 0x13}, 0x9040, 0x500, 0x2, 0x9, 0x5, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x9}, 0x0, 0x3, r3, 0xa) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) waitid(0x0, 0x0, 0x0, 0x80000000, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) waitid(0x0, 0x0, &(0x7f0000000400), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) r5 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0xfe68}}, 0x0) r6 = socket(0x10, 0x803, 0x0) dup3(r6, r5, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x15, 0x9, "2bbb19e5631df896ba98674d0b5600000000000000186049da15bffbdd1a3e02ca0718c73559bc4fe9801d897649294687be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7]}) socket$netlink(0x10, 0x3, 0x0) 02:46:39 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x507, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000007c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x44, 0x3, 0xa, 0x0, 0x0, 0x0, {0xa, 0x0, 0x8}, [@NFTA_CHAIN_HOOK={0x18, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'vlan0\x00'}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x4}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_USERDATA={0x4}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xe0, 0x0, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x97, 0x6, "a2847d0e4d9c362cde89365fcc56e44aef1d4415b60c737ad33458f8f3ebae85c9a18b314f0a0cdcad10995798fd74198a34268b13d1d45a9e9235bca122b1bb9e3ec6e03e35676c9ca0a17f0712e8384d12dc1cae9a8f39f8955bda950bd3e966a360136b5e13fb92a20dd9f98e84e9ae2fbdc908ed6d28e6f73a9709a1d73b84d444423ed8ffb47d8c1c56593549cf58124c"}, @NFTA_TABLE_USERDATA={0x20, 0x6, "3c1861e35545fa13a0e3a9ad337b0bb70dcc4eb3b252ae3954c91cff"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELTABLE={0x234, 0x2, 0xa, 0x3, 0x0, 0x0, {0xc}, [@NFTA_TABLE_USERDATA={0xf3, 0x6, "0eedee994f84e483b2ee73171522162c0d5859a48a275153ad38924a88ffa4d3045b7ac464a02f076c021b65690719f64c97c4c474f6f599812256c0f897606ff7266af528e26f35e6151eb3c8256b0161ba99dfba59422a678a56d575cb67eede578a2b0df0148788504e5b3ee0a43ff12d1877fbac56298967e5ab6f889a1d3eba6d84f3a615b96aef5ab0d4b5ee4d1815f75cca39d4ac9eaa12ebb1b8a6b307ba79578518f51e84383028c578c73f4207d5c0f54415278180aa37a5449bcafed8b2d46338ba8c8d3bffc801865ef59d1124f5cf935df77d73b793f12beaa34cb384c30160abe0c0a8ed836614c3"}, @NFTA_TABLE_USERDATA={0x46, 0x6, "9464f851c0a9fc9d964a91d0d0a48cda0630764e0706d9403e96e9b55b6650cb57abdb63146a7288d7b599754485079792fb60ba046098552e25c5a3301c9ceb4f04"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0xc0, 0x6, "8e9577650594e8fc90caa94d82a184d41b7d73597dbcf02be4a2cc3ecb69258464726b5e64de3365546700e09732e3a2d54327d70e1569556d46da5e325de5c2f2aa56e2e5611962b42b2381ebb1270b41299ada82986f96d8b37328887f2e3a91b0125e96170b2c9901b69e5b87c7e11badce243440cd7f5afd0afbfb1130b04e44b0ae697538e297887c1a6f4c04d80cf5fc5f1ab311b2be61fcd6d4af6ee461887e5d82d2aaf23c9cbdbbf51e2d75c9a969c83a30ad7e1081214a"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}], {0x14}}, 0x3f8}, 0x1, 0x0, 0x0, 0x18}, 0x40) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x5c, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004801}, 0x800) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r3 = dup(r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6, 0x2, 0x91, 0x9, 0x0, 0x4, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xf1, 0x13}, 0x9040, 0x500, 0x2, 0x9, 0x5, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x9}, 0x0, 0x3, r3, 0xa) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) waitid(0x0, 0x0, 0x0, 0x80000000, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) waitid(0x0, 0x0, &(0x7f0000000400), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) r5 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0xfe68}}, 0x0) r6 = socket(0x10, 0x803, 0x0) dup3(r6, r5, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x15, 0x9, "2bbb19e5631df896ba98674d0b5600000000000000186049da15bffbdd1a3e02ca0718c73559bc4fe9801d897649294687be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7]}) socket$netlink(0x10, 0x3, 0x0) 02:46:39 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x507, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000007c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x44, 0x3, 0xa, 0x0, 0x0, 0x0, {0xa, 0x0, 0x8}, [@NFTA_CHAIN_HOOK={0x18, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'vlan0\x00'}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x4}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_USERDATA={0x4}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xe0, 0x0, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x97, 0x6, "a2847d0e4d9c362cde89365fcc56e44aef1d4415b60c737ad33458f8f3ebae85c9a18b314f0a0cdcad10995798fd74198a34268b13d1d45a9e9235bca122b1bb9e3ec6e03e35676c9ca0a17f0712e8384d12dc1cae9a8f39f8955bda950bd3e966a360136b5e13fb92a20dd9f98e84e9ae2fbdc908ed6d28e6f73a9709a1d73b84d444423ed8ffb47d8c1c56593549cf58124c"}, @NFTA_TABLE_USERDATA={0x20, 0x6, "3c1861e35545fa13a0e3a9ad337b0bb70dcc4eb3b252ae3954c91cff"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELTABLE={0x234, 0x2, 0xa, 0x3, 0x0, 0x0, {0xc}, [@NFTA_TABLE_USERDATA={0xf3, 0x6, "0eedee994f84e483b2ee73171522162c0d5859a48a275153ad38924a88ffa4d3045b7ac464a02f076c021b65690719f64c97c4c474f6f599812256c0f897606ff7266af528e26f35e6151eb3c8256b0161ba99dfba59422a678a56d575cb67eede578a2b0df0148788504e5b3ee0a43ff12d1877fbac56298967e5ab6f889a1d3eba6d84f3a615b96aef5ab0d4b5ee4d1815f75cca39d4ac9eaa12ebb1b8a6b307ba79578518f51e84383028c578c73f4207d5c0f54415278180aa37a5449bcafed8b2d46338ba8c8d3bffc801865ef59d1124f5cf935df77d73b793f12beaa34cb384c30160abe0c0a8ed836614c3"}, @NFTA_TABLE_USERDATA={0x46, 0x6, "9464f851c0a9fc9d964a91d0d0a48cda0630764e0706d9403e96e9b55b6650cb57abdb63146a7288d7b599754485079792fb60ba046098552e25c5a3301c9ceb4f04"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0xc0, 0x6, "8e9577650594e8fc90caa94d82a184d41b7d73597dbcf02be4a2cc3ecb69258464726b5e64de3365546700e09732e3a2d54327d70e1569556d46da5e325de5c2f2aa56e2e5611962b42b2381ebb1270b41299ada82986f96d8b37328887f2e3a91b0125e96170b2c9901b69e5b87c7e11badce243440cd7f5afd0afbfb1130b04e44b0ae697538e297887c1a6f4c04d80cf5fc5f1ab311b2be61fcd6d4af6ee461887e5d82d2aaf23c9cbdbbf51e2d75c9a969c83a30ad7e1081214a"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}], {0x14}}, 0x3f8}, 0x1, 0x0, 0x0, 0x18}, 0x40) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x5c, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004801}, 0x800) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r3 = dup(r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6, 0x2, 0x91, 0x9, 0x0, 0x4, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xf1, 0x13}, 0x9040, 0x500, 0x2, 0x9, 0x5, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x9}, 0x0, 0x3, r3, 0xa) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) waitid(0x0, 0x0, 0x0, 0x80000000, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) waitid(0x0, 0x0, &(0x7f0000000400), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) r5 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0xfe68}}, 0x0) r6 = socket(0x10, 0x803, 0x0) dup3(r6, r5, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x15, 0x9, "2bbb19e5631df896ba98674d0b5600000000000000186049da15bffbdd1a3e02ca0718c73559bc4fe9801d897649294687be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7]}) socket$netlink(0x10, 0x3, 0x0) 02:46:39 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x507, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000007c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x44, 0x3, 0xa, 0x0, 0x0, 0x0, {0xa, 0x0, 0x8}, [@NFTA_CHAIN_HOOK={0x18, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'vlan0\x00'}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x4}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_USERDATA={0x4}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xe0, 0x0, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x97, 0x6, "a2847d0e4d9c362cde89365fcc56e44aef1d4415b60c737ad33458f8f3ebae85c9a18b314f0a0cdcad10995798fd74198a34268b13d1d45a9e9235bca122b1bb9e3ec6e03e35676c9ca0a17f0712e8384d12dc1cae9a8f39f8955bda950bd3e966a360136b5e13fb92a20dd9f98e84e9ae2fbdc908ed6d28e6f73a9709a1d73b84d444423ed8ffb47d8c1c56593549cf58124c"}, @NFTA_TABLE_USERDATA={0x20, 0x6, "3c1861e35545fa13a0e3a9ad337b0bb70dcc4eb3b252ae3954c91cff"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELTABLE={0x234, 0x2, 0xa, 0x3, 0x0, 0x0, {0xc}, [@NFTA_TABLE_USERDATA={0xf3, 0x6, "0eedee994f84e483b2ee73171522162c0d5859a48a275153ad38924a88ffa4d3045b7ac464a02f076c021b65690719f64c97c4c474f6f599812256c0f897606ff7266af528e26f35e6151eb3c8256b0161ba99dfba59422a678a56d575cb67eede578a2b0df0148788504e5b3ee0a43ff12d1877fbac56298967e5ab6f889a1d3eba6d84f3a615b96aef5ab0d4b5ee4d1815f75cca39d4ac9eaa12ebb1b8a6b307ba79578518f51e84383028c578c73f4207d5c0f54415278180aa37a5449bcafed8b2d46338ba8c8d3bffc801865ef59d1124f5cf935df77d73b793f12beaa34cb384c30160abe0c0a8ed836614c3"}, @NFTA_TABLE_USERDATA={0x46, 0x6, "9464f851c0a9fc9d964a91d0d0a48cda0630764e0706d9403e96e9b55b6650cb57abdb63146a7288d7b599754485079792fb60ba046098552e25c5a3301c9ceb4f04"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0xc0, 0x6, "8e9577650594e8fc90caa94d82a184d41b7d73597dbcf02be4a2cc3ecb69258464726b5e64de3365546700e09732e3a2d54327d70e1569556d46da5e325de5c2f2aa56e2e5611962b42b2381ebb1270b41299ada82986f96d8b37328887f2e3a91b0125e96170b2c9901b69e5b87c7e11badce243440cd7f5afd0afbfb1130b04e44b0ae697538e297887c1a6f4c04d80cf5fc5f1ab311b2be61fcd6d4af6ee461887e5d82d2aaf23c9cbdbbf51e2d75c9a969c83a30ad7e1081214a"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}], {0x14}}, 0x3f8}, 0x1, 0x0, 0x0, 0x18}, 0x40) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x5c, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004801}, 0x800) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r3 = dup(r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6, 0x2, 0x91, 0x9, 0x0, 0x4, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xf1, 0x13}, 0x9040, 0x500, 0x2, 0x9, 0x5, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x9}, 0x0, 0x3, r3, 0xa) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) waitid(0x0, 0x0, 0x0, 0x80000000, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) waitid(0x0, 0x0, &(0x7f0000000400), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) r5 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0xfe68}}, 0x0) r6 = socket(0x10, 0x803, 0x0) dup3(r6, r5, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x15, 0x9, "2bbb19e5631df896ba98674d0b5600000000000000186049da15bffbdd1a3e02ca0718c73559bc4fe9801d897649294687be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7]}) socket$netlink(0x10, 0x3, 0x0) 02:46:39 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x507, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000007c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x44, 0x3, 0xa, 0x0, 0x0, 0x0, {0xa, 0x0, 0x8}, [@NFTA_CHAIN_HOOK={0x18, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'vlan0\x00'}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x4}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_USERDATA={0x4}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xe0, 0x0, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x97, 0x6, "a2847d0e4d9c362cde89365fcc56e44aef1d4415b60c737ad33458f8f3ebae85c9a18b314f0a0cdcad10995798fd74198a34268b13d1d45a9e9235bca122b1bb9e3ec6e03e35676c9ca0a17f0712e8384d12dc1cae9a8f39f8955bda950bd3e966a360136b5e13fb92a20dd9f98e84e9ae2fbdc908ed6d28e6f73a9709a1d73b84d444423ed8ffb47d8c1c56593549cf58124c"}, @NFTA_TABLE_USERDATA={0x20, 0x6, "3c1861e35545fa13a0e3a9ad337b0bb70dcc4eb3b252ae3954c91cff"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELTABLE={0x234, 0x2, 0xa, 0x3, 0x0, 0x0, {0xc}, [@NFTA_TABLE_USERDATA={0xf3, 0x6, "0eedee994f84e483b2ee73171522162c0d5859a48a275153ad38924a88ffa4d3045b7ac464a02f076c021b65690719f64c97c4c474f6f599812256c0f897606ff7266af528e26f35e6151eb3c8256b0161ba99dfba59422a678a56d575cb67eede578a2b0df0148788504e5b3ee0a43ff12d1877fbac56298967e5ab6f889a1d3eba6d84f3a615b96aef5ab0d4b5ee4d1815f75cca39d4ac9eaa12ebb1b8a6b307ba79578518f51e84383028c578c73f4207d5c0f54415278180aa37a5449bcafed8b2d46338ba8c8d3bffc801865ef59d1124f5cf935df77d73b793f12beaa34cb384c30160abe0c0a8ed836614c3"}, @NFTA_TABLE_USERDATA={0x46, 0x6, "9464f851c0a9fc9d964a91d0d0a48cda0630764e0706d9403e96e9b55b6650cb57abdb63146a7288d7b599754485079792fb60ba046098552e25c5a3301c9ceb4f04"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0xc0, 0x6, "8e9577650594e8fc90caa94d82a184d41b7d73597dbcf02be4a2cc3ecb69258464726b5e64de3365546700e09732e3a2d54327d70e1569556d46da5e325de5c2f2aa56e2e5611962b42b2381ebb1270b41299ada82986f96d8b37328887f2e3a91b0125e96170b2c9901b69e5b87c7e11badce243440cd7f5afd0afbfb1130b04e44b0ae697538e297887c1a6f4c04d80cf5fc5f1ab311b2be61fcd6d4af6ee461887e5d82d2aaf23c9cbdbbf51e2d75c9a969c83a30ad7e1081214a"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}], {0x14}}, 0x3f8}, 0x1, 0x0, 0x0, 0x18}, 0x40) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x5c, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004801}, 0x800) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r3 = dup(r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6, 0x2, 0x91, 0x9, 0x0, 0x4, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xf1, 0x13}, 0x9040, 0x500, 0x2, 0x9, 0x5, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x9}, 0x0, 0x3, r3, 0xa) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) waitid(0x0, 0x0, 0x0, 0x80000000, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) waitid(0x0, 0x0, &(0x7f0000000400), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) r5 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0xfe68}}, 0x0) r6 = socket(0x10, 0x803, 0x0) dup3(r6, r5, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x15, 0x9, "2bbb19e5631df896ba98674d0b5600000000000000186049da15bffbdd1a3e02ca0718c73559bc4fe9801d897649294687be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7]}) socket$netlink(0x10, 0x3, 0x0) 02:46:40 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x507, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000007c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x44, 0x3, 0xa, 0x0, 0x0, 0x0, {0xa, 0x0, 0x8}, [@NFTA_CHAIN_HOOK={0x18, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'vlan0\x00'}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x4}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_USERDATA={0x4}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xe0, 0x0, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x97, 0x6, "a2847d0e4d9c362cde89365fcc56e44aef1d4415b60c737ad33458f8f3ebae85c9a18b314f0a0cdcad10995798fd74198a34268b13d1d45a9e9235bca122b1bb9e3ec6e03e35676c9ca0a17f0712e8384d12dc1cae9a8f39f8955bda950bd3e966a360136b5e13fb92a20dd9f98e84e9ae2fbdc908ed6d28e6f73a9709a1d73b84d444423ed8ffb47d8c1c56593549cf58124c"}, @NFTA_TABLE_USERDATA={0x20, 0x6, "3c1861e35545fa13a0e3a9ad337b0bb70dcc4eb3b252ae3954c91cff"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELTABLE={0x234, 0x2, 0xa, 0x3, 0x0, 0x0, {0xc}, [@NFTA_TABLE_USERDATA={0xf3, 0x6, "0eedee994f84e483b2ee73171522162c0d5859a48a275153ad38924a88ffa4d3045b7ac464a02f076c021b65690719f64c97c4c474f6f599812256c0f897606ff7266af528e26f35e6151eb3c8256b0161ba99dfba59422a678a56d575cb67eede578a2b0df0148788504e5b3ee0a43ff12d1877fbac56298967e5ab6f889a1d3eba6d84f3a615b96aef5ab0d4b5ee4d1815f75cca39d4ac9eaa12ebb1b8a6b307ba79578518f51e84383028c578c73f4207d5c0f54415278180aa37a5449bcafed8b2d46338ba8c8d3bffc801865ef59d1124f5cf935df77d73b793f12beaa34cb384c30160abe0c0a8ed836614c3"}, @NFTA_TABLE_USERDATA={0x46, 0x6, "9464f851c0a9fc9d964a91d0d0a48cda0630764e0706d9403e96e9b55b6650cb57abdb63146a7288d7b599754485079792fb60ba046098552e25c5a3301c9ceb4f04"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0xc0, 0x6, "8e9577650594e8fc90caa94d82a184d41b7d73597dbcf02be4a2cc3ecb69258464726b5e64de3365546700e09732e3a2d54327d70e1569556d46da5e325de5c2f2aa56e2e5611962b42b2381ebb1270b41299ada82986f96d8b37328887f2e3a91b0125e96170b2c9901b69e5b87c7e11badce243440cd7f5afd0afbfb1130b04e44b0ae697538e297887c1a6f4c04d80cf5fc5f1ab311b2be61fcd6d4af6ee461887e5d82d2aaf23c9cbdbbf51e2d75c9a969c83a30ad7e1081214a"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}], {0x14}}, 0x3f8}, 0x1, 0x0, 0x0, 0x18}, 0x40) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x5c, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004801}, 0x800) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r3 = dup(r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6, 0x2, 0x91, 0x9, 0x0, 0x4, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xf1, 0x13}, 0x9040, 0x500, 0x2, 0x9, 0x5, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x9}, 0x0, 0x3, r3, 0xa) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) waitid(0x0, 0x0, 0x0, 0x80000000, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) waitid(0x0, 0x0, &(0x7f0000000400), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) r5 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0xfe68}}, 0x0) r6 = socket(0x10, 0x803, 0x0) dup3(r6, r5, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x15, 0x9, "2bbb19e5631df896ba98674d0b5600000000000000186049da15bffbdd1a3e02ca0718c73559bc4fe9801d897649294687be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7]}) socket$netlink(0x10, 0x3, 0x0) 02:46:40 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x507, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000007c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x44, 0x3, 0xa, 0x0, 0x0, 0x0, {0xa, 0x0, 0x8}, [@NFTA_CHAIN_HOOK={0x18, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'vlan0\x00'}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x4}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_USERDATA={0x4}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xe0, 0x0, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x97, 0x6, "a2847d0e4d9c362cde89365fcc56e44aef1d4415b60c737ad33458f8f3ebae85c9a18b314f0a0cdcad10995798fd74198a34268b13d1d45a9e9235bca122b1bb9e3ec6e03e35676c9ca0a17f0712e8384d12dc1cae9a8f39f8955bda950bd3e966a360136b5e13fb92a20dd9f98e84e9ae2fbdc908ed6d28e6f73a9709a1d73b84d444423ed8ffb47d8c1c56593549cf58124c"}, @NFTA_TABLE_USERDATA={0x20, 0x6, "3c1861e35545fa13a0e3a9ad337b0bb70dcc4eb3b252ae3954c91cff"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELTABLE={0x234, 0x2, 0xa, 0x3, 0x0, 0x0, {0xc}, [@NFTA_TABLE_USERDATA={0xf3, 0x6, "0eedee994f84e483b2ee73171522162c0d5859a48a275153ad38924a88ffa4d3045b7ac464a02f076c021b65690719f64c97c4c474f6f599812256c0f897606ff7266af528e26f35e6151eb3c8256b0161ba99dfba59422a678a56d575cb67eede578a2b0df0148788504e5b3ee0a43ff12d1877fbac56298967e5ab6f889a1d3eba6d84f3a615b96aef5ab0d4b5ee4d1815f75cca39d4ac9eaa12ebb1b8a6b307ba79578518f51e84383028c578c73f4207d5c0f54415278180aa37a5449bcafed8b2d46338ba8c8d3bffc801865ef59d1124f5cf935df77d73b793f12beaa34cb384c30160abe0c0a8ed836614c3"}, @NFTA_TABLE_USERDATA={0x46, 0x6, "9464f851c0a9fc9d964a91d0d0a48cda0630764e0706d9403e96e9b55b6650cb57abdb63146a7288d7b599754485079792fb60ba046098552e25c5a3301c9ceb4f04"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0xc0, 0x6, "8e9577650594e8fc90caa94d82a184d41b7d73597dbcf02be4a2cc3ecb69258464726b5e64de3365546700e09732e3a2d54327d70e1569556d46da5e325de5c2f2aa56e2e5611962b42b2381ebb1270b41299ada82986f96d8b37328887f2e3a91b0125e96170b2c9901b69e5b87c7e11badce243440cd7f5afd0afbfb1130b04e44b0ae697538e297887c1a6f4c04d80cf5fc5f1ab311b2be61fcd6d4af6ee461887e5d82d2aaf23c9cbdbbf51e2d75c9a969c83a30ad7e1081214a"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}], {0x14}}, 0x3f8}, 0x1, 0x0, 0x0, 0x18}, 0x40) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x5c, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004801}, 0x800) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r3 = dup(r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6, 0x2, 0x91, 0x9, 0x0, 0x4, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xf1, 0x13}, 0x9040, 0x500, 0x2, 0x9, 0x5, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x9}, 0x0, 0x3, r3, 0xa) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) waitid(0x0, 0x0, 0x0, 0x80000000, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) waitid(0x0, 0x0, &(0x7f0000000400), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) r5 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0xfe68}}, 0x0) r6 = socket(0x10, 0x803, 0x0) dup3(r6, r5, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x15, 0x9, "2bbb19e5631df896ba98674d0b5600000000000000186049da15bffbdd1a3e02ca0718c73559bc4fe9801d897649294687be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7]}) socket$netlink(0x10, 0x3, 0x0) 02:46:40 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x507, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000007c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x44, 0x3, 0xa, 0x0, 0x0, 0x0, {0xa, 0x0, 0x8}, [@NFTA_CHAIN_HOOK={0x18, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'vlan0\x00'}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x4}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_USERDATA={0x4}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xe0, 0x0, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x97, 0x6, "a2847d0e4d9c362cde89365fcc56e44aef1d4415b60c737ad33458f8f3ebae85c9a18b314f0a0cdcad10995798fd74198a34268b13d1d45a9e9235bca122b1bb9e3ec6e03e35676c9ca0a17f0712e8384d12dc1cae9a8f39f8955bda950bd3e966a360136b5e13fb92a20dd9f98e84e9ae2fbdc908ed6d28e6f73a9709a1d73b84d444423ed8ffb47d8c1c56593549cf58124c"}, @NFTA_TABLE_USERDATA={0x20, 0x6, "3c1861e35545fa13a0e3a9ad337b0bb70dcc4eb3b252ae3954c91cff"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELTABLE={0x234, 0x2, 0xa, 0x3, 0x0, 0x0, {0xc}, [@NFTA_TABLE_USERDATA={0xf3, 0x6, "0eedee994f84e483b2ee73171522162c0d5859a48a275153ad38924a88ffa4d3045b7ac464a02f076c021b65690719f64c97c4c474f6f599812256c0f897606ff7266af528e26f35e6151eb3c8256b0161ba99dfba59422a678a56d575cb67eede578a2b0df0148788504e5b3ee0a43ff12d1877fbac56298967e5ab6f889a1d3eba6d84f3a615b96aef5ab0d4b5ee4d1815f75cca39d4ac9eaa12ebb1b8a6b307ba79578518f51e84383028c578c73f4207d5c0f54415278180aa37a5449bcafed8b2d46338ba8c8d3bffc801865ef59d1124f5cf935df77d73b793f12beaa34cb384c30160abe0c0a8ed836614c3"}, @NFTA_TABLE_USERDATA={0x46, 0x6, "9464f851c0a9fc9d964a91d0d0a48cda0630764e0706d9403e96e9b55b6650cb57abdb63146a7288d7b599754485079792fb60ba046098552e25c5a3301c9ceb4f04"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0xc0, 0x6, "8e9577650594e8fc90caa94d82a184d41b7d73597dbcf02be4a2cc3ecb69258464726b5e64de3365546700e09732e3a2d54327d70e1569556d46da5e325de5c2f2aa56e2e5611962b42b2381ebb1270b41299ada82986f96d8b37328887f2e3a91b0125e96170b2c9901b69e5b87c7e11badce243440cd7f5afd0afbfb1130b04e44b0ae697538e297887c1a6f4c04d80cf5fc5f1ab311b2be61fcd6d4af6ee461887e5d82d2aaf23c9cbdbbf51e2d75c9a969c83a30ad7e1081214a"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}], {0x14}}, 0x3f8}, 0x1, 0x0, 0x0, 0x18}, 0x40) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x5c, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004801}, 0x800) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r3 = dup(r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6, 0x2, 0x91, 0x9, 0x0, 0x4, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xf1, 0x13}, 0x9040, 0x500, 0x2, 0x9, 0x5, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x9}, 0x0, 0x3, r3, 0xa) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) waitid(0x0, 0x0, 0x0, 0x80000000, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) waitid(0x0, 0x0, &(0x7f0000000400), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) r5 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0xfe68}}, 0x0) r6 = socket(0x10, 0x803, 0x0) dup3(r6, r5, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x15, 0x9, "2bbb19e5631df896ba98674d0b5600000000000000186049da15bffbdd1a3e02ca0718c73559bc4fe9801d897649294687be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7]}) socket$netlink(0x10, 0x3, 0x0) 02:46:40 executing program 2: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x507, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000007c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x44, 0x3, 0xa, 0x0, 0x0, 0x0, {0xa, 0x0, 0x8}, [@NFTA_CHAIN_HOOK={0x18, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'vlan0\x00'}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x4}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_USERDATA={0x4}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xe0, 0x0, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x97, 0x6, "a2847d0e4d9c362cde89365fcc56e44aef1d4415b60c737ad33458f8f3ebae85c9a18b314f0a0cdcad10995798fd74198a34268b13d1d45a9e9235bca122b1bb9e3ec6e03e35676c9ca0a17f0712e8384d12dc1cae9a8f39f8955bda950bd3e966a360136b5e13fb92a20dd9f98e84e9ae2fbdc908ed6d28e6f73a9709a1d73b84d444423ed8ffb47d8c1c56593549cf58124c"}, @NFTA_TABLE_USERDATA={0x20, 0x6, "3c1861e35545fa13a0e3a9ad337b0bb70dcc4eb3b252ae3954c91cff"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELTABLE={0x234, 0x2, 0xa, 0x3, 0x0, 0x0, {0xc}, [@NFTA_TABLE_USERDATA={0xf3, 0x6, "0eedee994f84e483b2ee73171522162c0d5859a48a275153ad38924a88ffa4d3045b7ac464a02f076c021b65690719f64c97c4c474f6f599812256c0f897606ff7266af528e26f35e6151eb3c8256b0161ba99dfba59422a678a56d575cb67eede578a2b0df0148788504e5b3ee0a43ff12d1877fbac56298967e5ab6f889a1d3eba6d84f3a615b96aef5ab0d4b5ee4d1815f75cca39d4ac9eaa12ebb1b8a6b307ba79578518f51e84383028c578c73f4207d5c0f54415278180aa37a5449bcafed8b2d46338ba8c8d3bffc801865ef59d1124f5cf935df77d73b793f12beaa34cb384c30160abe0c0a8ed836614c3"}, @NFTA_TABLE_USERDATA={0x46, 0x6, "9464f851c0a9fc9d964a91d0d0a48cda0630764e0706d9403e96e9b55b6650cb57abdb63146a7288d7b599754485079792fb60ba046098552e25c5a3301c9ceb4f04"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0xc0, 0x6, "8e9577650594e8fc90caa94d82a184d41b7d73597dbcf02be4a2cc3ecb69258464726b5e64de3365546700e09732e3a2d54327d70e1569556d46da5e325de5c2f2aa56e2e5611962b42b2381ebb1270b41299ada82986f96d8b37328887f2e3a91b0125e96170b2c9901b69e5b87c7e11badce243440cd7f5afd0afbfb1130b04e44b0ae697538e297887c1a6f4c04d80cf5fc5f1ab311b2be61fcd6d4af6ee461887e5d82d2aaf23c9cbdbbf51e2d75c9a969c83a30ad7e1081214a"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}], {0x14}}, 0x3f8}, 0x1, 0x0, 0x0, 0x18}, 0x40) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x5c, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004801}, 0x800) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r3 = dup(r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6, 0x2, 0x91, 0x9, 0x0, 0x4, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xf1, 0x13}, 0x9040, 0x500, 0x2, 0x9, 0x5, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x9}, 0x0, 0x3, r3, 0xa) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) waitid(0x0, 0x0, 0x0, 0x80000000, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) waitid(0x0, 0x0, &(0x7f0000000400), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) r5 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0xfe68}}, 0x0) r6 = socket(0x10, 0x803, 0x0) dup3(r6, r5, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x15, 0x9, "2bbb19e5631df896ba98674d0b5600000000000000186049da15bffbdd1a3e02ca0718c73559bc4fe9801d897649294687be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7]}) socket$netlink(0x10, 0x3, 0x0) 02:46:40 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x507, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000007c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x44, 0x3, 0xa, 0x0, 0x0, 0x0, {0xa, 0x0, 0x8}, [@NFTA_CHAIN_HOOK={0x18, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'vlan0\x00'}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x4}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_USERDATA={0x4}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xe0, 0x0, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x97, 0x6, "a2847d0e4d9c362cde89365fcc56e44aef1d4415b60c737ad33458f8f3ebae85c9a18b314f0a0cdcad10995798fd74198a34268b13d1d45a9e9235bca122b1bb9e3ec6e03e35676c9ca0a17f0712e8384d12dc1cae9a8f39f8955bda950bd3e966a360136b5e13fb92a20dd9f98e84e9ae2fbdc908ed6d28e6f73a9709a1d73b84d444423ed8ffb47d8c1c56593549cf58124c"}, @NFTA_TABLE_USERDATA={0x20, 0x6, "3c1861e35545fa13a0e3a9ad337b0bb70dcc4eb3b252ae3954c91cff"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELTABLE={0x234, 0x2, 0xa, 0x3, 0x0, 0x0, {0xc}, [@NFTA_TABLE_USERDATA={0xf3, 0x6, "0eedee994f84e483b2ee73171522162c0d5859a48a275153ad38924a88ffa4d3045b7ac464a02f076c021b65690719f64c97c4c474f6f599812256c0f897606ff7266af528e26f35e6151eb3c8256b0161ba99dfba59422a678a56d575cb67eede578a2b0df0148788504e5b3ee0a43ff12d1877fbac56298967e5ab6f889a1d3eba6d84f3a615b96aef5ab0d4b5ee4d1815f75cca39d4ac9eaa12ebb1b8a6b307ba79578518f51e84383028c578c73f4207d5c0f54415278180aa37a5449bcafed8b2d46338ba8c8d3bffc801865ef59d1124f5cf935df77d73b793f12beaa34cb384c30160abe0c0a8ed836614c3"}, @NFTA_TABLE_USERDATA={0x46, 0x6, "9464f851c0a9fc9d964a91d0d0a48cda0630764e0706d9403e96e9b55b6650cb57abdb63146a7288d7b599754485079792fb60ba046098552e25c5a3301c9ceb4f04"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0xc0, 0x6, "8e9577650594e8fc90caa94d82a184d41b7d73597dbcf02be4a2cc3ecb69258464726b5e64de3365546700e09732e3a2d54327d70e1569556d46da5e325de5c2f2aa56e2e5611962b42b2381ebb1270b41299ada82986f96d8b37328887f2e3a91b0125e96170b2c9901b69e5b87c7e11badce243440cd7f5afd0afbfb1130b04e44b0ae697538e297887c1a6f4c04d80cf5fc5f1ab311b2be61fcd6d4af6ee461887e5d82d2aaf23c9cbdbbf51e2d75c9a969c83a30ad7e1081214a"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}], {0x14}}, 0x3f8}, 0x1, 0x0, 0x0, 0x18}, 0x40) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x5c, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004801}, 0x800) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r3 = dup(r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6, 0x2, 0x91, 0x9, 0x0, 0x4, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xf1, 0x13}, 0x9040, 0x500, 0x2, 0x9, 0x5, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x9}, 0x0, 0x3, r3, 0xa) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) waitid(0x0, 0x0, 0x0, 0x80000000, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) waitid(0x0, 0x0, &(0x7f0000000400), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) r5 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0xfe68}}, 0x0) r6 = socket(0x10, 0x803, 0x0) dup3(r6, r5, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x15, 0x9, "2bbb19e5631df896ba98674d0b5600000000000000186049da15bffbdd1a3e02ca0718c73559bc4fe9801d897649294687be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7]}) socket$netlink(0x10, 0x3, 0x0) 02:46:40 executing program 4: syz_mount_image$f2fs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200080, &(0x7f0000000140)={[{@jqfmt_vfsv1}, {@nolazytime}, {@noinline_dentry}]}, 0x1, 0x54f3, &(0x7f0000005640)="$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") mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000100)='./file1\x00', 0x200) 02:46:40 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x507, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000007c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x44, 0x3, 0xa, 0x0, 0x0, 0x0, {0xa, 0x0, 0x8}, [@NFTA_CHAIN_HOOK={0x18, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'vlan0\x00'}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x4}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_USERDATA={0x4}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xe0, 0x0, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x97, 0x6, "a2847d0e4d9c362cde89365fcc56e44aef1d4415b60c737ad33458f8f3ebae85c9a18b314f0a0cdcad10995798fd74198a34268b13d1d45a9e9235bca122b1bb9e3ec6e03e35676c9ca0a17f0712e8384d12dc1cae9a8f39f8955bda950bd3e966a360136b5e13fb92a20dd9f98e84e9ae2fbdc908ed6d28e6f73a9709a1d73b84d444423ed8ffb47d8c1c56593549cf58124c"}, @NFTA_TABLE_USERDATA={0x20, 0x6, "3c1861e35545fa13a0e3a9ad337b0bb70dcc4eb3b252ae3954c91cff"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELTABLE={0x234, 0x2, 0xa, 0x3, 0x0, 0x0, {0xc}, [@NFTA_TABLE_USERDATA={0xf3, 0x6, "0eedee994f84e483b2ee73171522162c0d5859a48a275153ad38924a88ffa4d3045b7ac464a02f076c021b65690719f64c97c4c474f6f599812256c0f897606ff7266af528e26f35e6151eb3c8256b0161ba99dfba59422a678a56d575cb67eede578a2b0df0148788504e5b3ee0a43ff12d1877fbac56298967e5ab6f889a1d3eba6d84f3a615b96aef5ab0d4b5ee4d1815f75cca39d4ac9eaa12ebb1b8a6b307ba79578518f51e84383028c578c73f4207d5c0f54415278180aa37a5449bcafed8b2d46338ba8c8d3bffc801865ef59d1124f5cf935df77d73b793f12beaa34cb384c30160abe0c0a8ed836614c3"}, @NFTA_TABLE_USERDATA={0x46, 0x6, "9464f851c0a9fc9d964a91d0d0a48cda0630764e0706d9403e96e9b55b6650cb57abdb63146a7288d7b599754485079792fb60ba046098552e25c5a3301c9ceb4f04"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0xc0, 0x6, "8e9577650594e8fc90caa94d82a184d41b7d73597dbcf02be4a2cc3ecb69258464726b5e64de3365546700e09732e3a2d54327d70e1569556d46da5e325de5c2f2aa56e2e5611962b42b2381ebb1270b41299ada82986f96d8b37328887f2e3a91b0125e96170b2c9901b69e5b87c7e11badce243440cd7f5afd0afbfb1130b04e44b0ae697538e297887c1a6f4c04d80cf5fc5f1ab311b2be61fcd6d4af6ee461887e5d82d2aaf23c9cbdbbf51e2d75c9a969c83a30ad7e1081214a"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}], {0x14}}, 0x3f8}, 0x1, 0x0, 0x0, 0x18}, 0x40) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x5c, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004801}, 0x800) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r3 = dup(r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6, 0x2, 0x91, 0x9, 0x0, 0x4, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xf1, 0x13}, 0x9040, 0x500, 0x2, 0x9, 0x5, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x9}, 0x0, 0x3, r3, 0xa) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) waitid(0x0, 0x0, 0x0, 0x80000000, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) waitid(0x0, 0x0, &(0x7f0000000400), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) r5 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0xfe68}}, 0x0) r6 = socket(0x10, 0x803, 0x0) dup3(r6, r5, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x15, 0x9, "2bbb19e5631df896ba98674d0b5600000000000000186049da15bffbdd1a3e02ca0718c73559bc4fe9801d897649294687be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7]}) socket$netlink(0x10, 0x3, 0x0) 02:46:40 executing program 0: r0 = syz_clone(0x21008000, 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x29) 02:46:40 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x507, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000007c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x44, 0x3, 0xa, 0x0, 0x0, 0x0, {0xa, 0x0, 0x8}, [@NFTA_CHAIN_HOOK={0x18, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'vlan0\x00'}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x4}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_USERDATA={0x4}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xe0, 0x0, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x97, 0x6, "a2847d0e4d9c362cde89365fcc56e44aef1d4415b60c737ad33458f8f3ebae85c9a18b314f0a0cdcad10995798fd74198a34268b13d1d45a9e9235bca122b1bb9e3ec6e03e35676c9ca0a17f0712e8384d12dc1cae9a8f39f8955bda950bd3e966a360136b5e13fb92a20dd9f98e84e9ae2fbdc908ed6d28e6f73a9709a1d73b84d444423ed8ffb47d8c1c56593549cf58124c"}, @NFTA_TABLE_USERDATA={0x20, 0x6, "3c1861e35545fa13a0e3a9ad337b0bb70dcc4eb3b252ae3954c91cff"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELTABLE={0x234, 0x2, 0xa, 0x3, 0x0, 0x0, {0xc}, [@NFTA_TABLE_USERDATA={0xf3, 0x6, "0eedee994f84e483b2ee73171522162c0d5859a48a275153ad38924a88ffa4d3045b7ac464a02f076c021b65690719f64c97c4c474f6f599812256c0f897606ff7266af528e26f35e6151eb3c8256b0161ba99dfba59422a678a56d575cb67eede578a2b0df0148788504e5b3ee0a43ff12d1877fbac56298967e5ab6f889a1d3eba6d84f3a615b96aef5ab0d4b5ee4d1815f75cca39d4ac9eaa12ebb1b8a6b307ba79578518f51e84383028c578c73f4207d5c0f54415278180aa37a5449bcafed8b2d46338ba8c8d3bffc801865ef59d1124f5cf935df77d73b793f12beaa34cb384c30160abe0c0a8ed836614c3"}, @NFTA_TABLE_USERDATA={0x46, 0x6, "9464f851c0a9fc9d964a91d0d0a48cda0630764e0706d9403e96e9b55b6650cb57abdb63146a7288d7b599754485079792fb60ba046098552e25c5a3301c9ceb4f04"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0xc0, 0x6, "8e9577650594e8fc90caa94d82a184d41b7d73597dbcf02be4a2cc3ecb69258464726b5e64de3365546700e09732e3a2d54327d70e1569556d46da5e325de5c2f2aa56e2e5611962b42b2381ebb1270b41299ada82986f96d8b37328887f2e3a91b0125e96170b2c9901b69e5b87c7e11badce243440cd7f5afd0afbfb1130b04e44b0ae697538e297887c1a6f4c04d80cf5fc5f1ab311b2be61fcd6d4af6ee461887e5d82d2aaf23c9cbdbbf51e2d75c9a969c83a30ad7e1081214a"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}], {0x14}}, 0x3f8}, 0x1, 0x0, 0x0, 0x18}, 0x40) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x5c, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004801}, 0x800) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r3 = dup(r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6, 0x2, 0x91, 0x9, 0x0, 0x4, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xf1, 0x13}, 0x9040, 0x500, 0x2, 0x9, 0x5, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x9}, 0x0, 0x3, r3, 0xa) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) waitid(0x0, 0x0, 0x0, 0x80000000, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) waitid(0x0, 0x0, &(0x7f0000000400), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) r5 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0xfe68}}, 0x0) r6 = socket(0x10, 0x803, 0x0) dup3(r6, r5, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x15, 0x9, "2bbb19e5631df896ba98674d0b5600000000000000186049da15bffbdd1a3e02ca0718c73559bc4fe9801d897649294687be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7]}) socket$netlink(0x10, 0x3, 0x0) 02:46:40 executing program 0: r0 = syz_clone(0x21008000, 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x29) 02:46:40 executing program 0: r0 = syz_clone(0x21008000, 0x0, 0x0, 0x0, 0x0, 0x0) tgkill(r0, r0, 0x29) 02:46:40 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='workdir=./file1,lowerdir=./file0,upperdir=./bus,nfs_export=on']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) open_by_handle_at(r0, &(0x7f0000000300)=@FILEID_INO32_GEN_PARENT={0x10, 0xfb}, 0x0) 02:46:40 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='workdir=./file1,lowerdir=./file0,upperdir=./bus,nfs_export=on']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) open_by_handle_at(r0, &(0x7f0000000300)=@FILEID_INO32_GEN_PARENT={0x10, 0xfb}, 0x0) [ 884.734940] overlayfs: failed to decode file handle (len=16, type=251, flags=0, err=-22) 02:46:40 executing program 2: syz_mount_image$hfs(&(0x7f0000000080), &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x8000, &(0x7f0000000140)={[{@codepage={'codepage', 0x3d, 'iso8859-9'}}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}]}, 0x1, 0x27c, &(0x7f0000000180)="$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") perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x14d27e, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) [ 884.842820] audit: type=1800 audit(1675392400.974:1121): pid=29874 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="loop2" ino=21 res=0 [ 884.879460] audit: type=1804 audit(1675392400.994:1122): pid=29874 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name=2F726F6F742F73797A6B616C6C65722D74657374646972313137313832303232392F73797A6B616C6C65722E5A76717A4D702F39362F131377C5FC35D41454D5D41D29AD1A6029598146E6BE166E41AD0DBD4054033C9F33BBDA8224A2F3D772E7636E48B33CBF708372E8F1B9933EC5127743BE2206209EF02DF9CBF2F6E880D3382F627573 dev="loop2" ino=21 res=1 [ 884.893069] overlayfs: failed to decode file handle (len=16, type=251, flags=0, err=-22) 02:46:41 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x507, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000007c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x44, 0x3, 0xa, 0x0, 0x0, 0x0, {0xa, 0x0, 0x8}, [@NFTA_CHAIN_HOOK={0x18, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'vlan0\x00'}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x4}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_USERDATA={0x4}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xe0, 0x0, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x97, 0x6, "a2847d0e4d9c362cde89365fcc56e44aef1d4415b60c737ad33458f8f3ebae85c9a18b314f0a0cdcad10995798fd74198a34268b13d1d45a9e9235bca122b1bb9e3ec6e03e35676c9ca0a17f0712e8384d12dc1cae9a8f39f8955bda950bd3e966a360136b5e13fb92a20dd9f98e84e9ae2fbdc908ed6d28e6f73a9709a1d73b84d444423ed8ffb47d8c1c56593549cf58124c"}, @NFTA_TABLE_USERDATA={0x20, 0x6, "3c1861e35545fa13a0e3a9ad337b0bb70dcc4eb3b252ae3954c91cff"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELTABLE={0x234, 0x2, 0xa, 0x3, 0x0, 0x0, {0xc}, [@NFTA_TABLE_USERDATA={0xf3, 0x6, "0eedee994f84e483b2ee73171522162c0d5859a48a275153ad38924a88ffa4d3045b7ac464a02f076c021b65690719f64c97c4c474f6f599812256c0f897606ff7266af528e26f35e6151eb3c8256b0161ba99dfba59422a678a56d575cb67eede578a2b0df0148788504e5b3ee0a43ff12d1877fbac56298967e5ab6f889a1d3eba6d84f3a615b96aef5ab0d4b5ee4d1815f75cca39d4ac9eaa12ebb1b8a6b307ba79578518f51e84383028c578c73f4207d5c0f54415278180aa37a5449bcafed8b2d46338ba8c8d3bffc801865ef59d1124f5cf935df77d73b793f12beaa34cb384c30160abe0c0a8ed836614c3"}, @NFTA_TABLE_USERDATA={0x46, 0x6, "9464f851c0a9fc9d964a91d0d0a48cda0630764e0706d9403e96e9b55b6650cb57abdb63146a7288d7b599754485079792fb60ba046098552e25c5a3301c9ceb4f04"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0xc0, 0x6, "8e9577650594e8fc90caa94d82a184d41b7d73597dbcf02be4a2cc3ecb69258464726b5e64de3365546700e09732e3a2d54327d70e1569556d46da5e325de5c2f2aa56e2e5611962b42b2381ebb1270b41299ada82986f96d8b37328887f2e3a91b0125e96170b2c9901b69e5b87c7e11badce243440cd7f5afd0afbfb1130b04e44b0ae697538e297887c1a6f4c04d80cf5fc5f1ab311b2be61fcd6d4af6ee461887e5d82d2aaf23c9cbdbbf51e2d75c9a969c83a30ad7e1081214a"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}], {0x14}}, 0x3f8}, 0x1, 0x0, 0x0, 0x18}, 0x40) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x5c, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004801}, 0x800) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r3 = dup(r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6, 0x2, 0x91, 0x9, 0x0, 0x4, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xf1, 0x13}, 0x9040, 0x500, 0x2, 0x9, 0x5, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x9}, 0x0, 0x3, r3, 0xa) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) waitid(0x0, 0x0, 0x0, 0x80000000, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) waitid(0x0, 0x0, &(0x7f0000000400), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) r5 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0xfe68}}, 0x0) r6 = socket(0x10, 0x803, 0x0) dup3(r6, r5, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x15, 0x9, "2bbb19e5631df896ba98674d0b5600000000000000186049da15bffbdd1a3e02ca0718c73559bc4fe9801d897649294687be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7]}) socket$netlink(0x10, 0x3, 0x0) 02:46:41 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x507, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000007c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x44, 0x3, 0xa, 0x0, 0x0, 0x0, {0xa, 0x0, 0x8}, [@NFTA_CHAIN_HOOK={0x18, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'vlan0\x00'}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x4}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_USERDATA={0x4}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xe0, 0x0, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x97, 0x6, "a2847d0e4d9c362cde89365fcc56e44aef1d4415b60c737ad33458f8f3ebae85c9a18b314f0a0cdcad10995798fd74198a34268b13d1d45a9e9235bca122b1bb9e3ec6e03e35676c9ca0a17f0712e8384d12dc1cae9a8f39f8955bda950bd3e966a360136b5e13fb92a20dd9f98e84e9ae2fbdc908ed6d28e6f73a9709a1d73b84d444423ed8ffb47d8c1c56593549cf58124c"}, @NFTA_TABLE_USERDATA={0x20, 0x6, "3c1861e35545fa13a0e3a9ad337b0bb70dcc4eb3b252ae3954c91cff"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELTABLE={0x234, 0x2, 0xa, 0x3, 0x0, 0x0, {0xc}, [@NFTA_TABLE_USERDATA={0xf3, 0x6, "0eedee994f84e483b2ee73171522162c0d5859a48a275153ad38924a88ffa4d3045b7ac464a02f076c021b65690719f64c97c4c474f6f599812256c0f897606ff7266af528e26f35e6151eb3c8256b0161ba99dfba59422a678a56d575cb67eede578a2b0df0148788504e5b3ee0a43ff12d1877fbac56298967e5ab6f889a1d3eba6d84f3a615b96aef5ab0d4b5ee4d1815f75cca39d4ac9eaa12ebb1b8a6b307ba79578518f51e84383028c578c73f4207d5c0f54415278180aa37a5449bcafed8b2d46338ba8c8d3bffc801865ef59d1124f5cf935df77d73b793f12beaa34cb384c30160abe0c0a8ed836614c3"}, @NFTA_TABLE_USERDATA={0x46, 0x6, "9464f851c0a9fc9d964a91d0d0a48cda0630764e0706d9403e96e9b55b6650cb57abdb63146a7288d7b599754485079792fb60ba046098552e25c5a3301c9ceb4f04"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0xc0, 0x6, "8e9577650594e8fc90caa94d82a184d41b7d73597dbcf02be4a2cc3ecb69258464726b5e64de3365546700e09732e3a2d54327d70e1569556d46da5e325de5c2f2aa56e2e5611962b42b2381ebb1270b41299ada82986f96d8b37328887f2e3a91b0125e96170b2c9901b69e5b87c7e11badce243440cd7f5afd0afbfb1130b04e44b0ae697538e297887c1a6f4c04d80cf5fc5f1ab311b2be61fcd6d4af6ee461887e5d82d2aaf23c9cbdbbf51e2d75c9a969c83a30ad7e1081214a"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}], {0x14}}, 0x3f8}, 0x1, 0x0, 0x0, 0x18}, 0x40) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x5c, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004801}, 0x800) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r3 = dup(r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6, 0x2, 0x91, 0x9, 0x0, 0x4, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xf1, 0x13}, 0x9040, 0x500, 0x2, 0x9, 0x5, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x9}, 0x0, 0x3, r3, 0xa) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) waitid(0x0, 0x0, 0x0, 0x80000000, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) waitid(0x0, 0x0, &(0x7f0000000400), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) r5 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0xfe68}}, 0x0) r6 = socket(0x10, 0x803, 0x0) dup3(r6, r5, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x15, 0x9, "2bbb19e5631df896ba98674d0b5600000000000000186049da15bffbdd1a3e02ca0718c73559bc4fe9801d897649294687be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7]}) socket$netlink(0x10, 0x3, 0x0) 02:46:41 executing program 5: ioctl$USBDEVFS_DROP_PRIVILEGES(0xffffffffffffffff, 0x4004551e, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x3, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)=@getqdisc={0x48, 0x26, 0x8, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x1, 0x4}, {0x0, 0xc}, {0xfff3, 0xffff}}, [{0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}]}, 0x48}, 0x1, 0x0, 0x0, 0x44054}, 0x881) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000130000000000000000010000d50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r4}, 0x10) r6 = getpgid(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, r5, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000500)={'\x00', 0x1000, 0x26d88cab, 0x1f, 0x9, 0x3f, r6}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r8 = syz_open_dev$audion(&(0x7f0000000540), 0x8, 0x222800) bind$inet6(r8, &(0x7f0000000580)={0xa, 0x4e24, 0xffff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x2}, 0x1c) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f00000002c0)='#@g\xc0\x90\x15\x1f\x13\x1b5y\xaaV*j\x8d\xb9O\t\x87\xd8\xa9Z\x96\xd1\x1dG\xaf0\xe1\x91\xd8\a\x00') preadv(r7, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x6e}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000140)={'\x00', 0x7, 0xcc, 0x2b, 0x40, 0x8}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) 02:46:41 executing program 2: syz_mount_image$hfs(&(0x7f0000000080), &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x8000, &(0x7f0000000140)={[{@codepage={'codepage', 0x3d, 'iso8859-9'}}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}]}, 0x1, 0x27c, &(0x7f0000000180)="$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") perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x14d27e, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) 02:46:41 executing program 4: syz_mount_image$f2fs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200080, &(0x7f0000000140)={[{@jqfmt_vfsv1}, {@nolazytime}, {@noinline_dentry}]}, 0x1, 0x54f3, &(0x7f0000005640)="$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") mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000100)='./file1\x00', 0x200) 02:46:41 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='workdir=./file1,lowerdir=./file0,upperdir=./bus,nfs_export=on']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) open_by_handle_at(r0, &(0x7f0000000300)=@FILEID_INO32_GEN_PARENT={0x10, 0xfb}, 0x0) [ 885.085711] overlayfs: failed to decode file handle (len=16, type=251, flags=0, err=-22) 02:46:41 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0) syz_mount_image$tmpfs(&(0x7f00000002c0), &(0x7f0000000100)='./bus\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='workdir=./file1,lowerdir=./file0,upperdir=./bus,nfs_export=on']) chdir(&(0x7f0000000040)='./bus\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpuset.effective_cpus\x00', 0x275a, 0x0) open_by_handle_at(r0, &(0x7f0000000300)=@FILEID_INO32_GEN_PARENT={0x10, 0xfb}, 0x0) [ 885.180417] audit: type=1800 audit(1675392401.294:1123): pid=29891 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="loop2" ino=21 res=0 02:46:41 executing program 2: syz_mount_image$hfs(&(0x7f0000000080), &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x8000, &(0x7f0000000140)={[{@codepage={'codepage', 0x3d, 'iso8859-9'}}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}]}, 0x1, 0x27c, &(0x7f0000000180)="$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") perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x14d27e, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) [ 885.320277] audit: type=1804 audit(1675392401.344:1124): pid=29891 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name=2F726F6F742F73797A6B616C6C65722D74657374646972313137313832303232392F73797A6B616C6C65722E5A76717A4D702F39372F131377C5FC35D41454D5D41D29AD1A6029598146E6BE166E41AD0DBD4054033C9F33BBDA8224A2F3D772E7636E48B33CBF708372E8F1B9933EC5127743BE2206209EF02DF9CBF2F6E880D3382F627573 dev="loop2" ino=21 res=1 02:46:41 executing program 5: ioctl$USBDEVFS_DROP_PRIVILEGES(0xffffffffffffffff, 0x4004551e, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x3, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)=@getqdisc={0x48, 0x26, 0x8, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x1, 0x4}, {0x0, 0xc}, {0xfff3, 0xffff}}, [{0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}]}, 0x48}, 0x1, 0x0, 0x0, 0x44054}, 0x881) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000130000000000000000010000d50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r4}, 0x10) r6 = getpgid(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, r5, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000500)={'\x00', 0x1000, 0x26d88cab, 0x1f, 0x9, 0x3f, r6}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r8 = syz_open_dev$audion(&(0x7f0000000540), 0x8, 0x222800) bind$inet6(r8, &(0x7f0000000580)={0xa, 0x4e24, 0xffff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x2}, 0x1c) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f00000002c0)='#@g\xc0\x90\x15\x1f\x13\x1b5y\xaaV*j\x8d\xb9O\t\x87\xd8\xa9Z\x96\xd1\x1dG\xaf0\xe1\x91\xd8\a\x00') preadv(r7, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x6e}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000140)={'\x00', 0x7, 0xcc, 0x2b, 0x40, 0x8}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) 02:46:41 executing program 0: ioctl$USBDEVFS_DROP_PRIVILEGES(0xffffffffffffffff, 0x4004551e, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x3, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)=@getqdisc={0x48, 0x26, 0x8, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x1, 0x4}, {0x0, 0xc}, {0xfff3, 0xffff}}, [{0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}]}, 0x48}, 0x1, 0x0, 0x0, 0x44054}, 0x881) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000130000000000000000010000d50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r4}, 0x10) r6 = getpgid(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, r5, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000500)={'\x00', 0x1000, 0x26d88cab, 0x1f, 0x9, 0x3f, r6}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r8 = syz_open_dev$audion(&(0x7f0000000540), 0x8, 0x222800) bind$inet6(r8, &(0x7f0000000580)={0xa, 0x4e24, 0xffff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x2}, 0x1c) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f00000002c0)='#@g\xc0\x90\x15\x1f\x13\x1b5y\xaaV*j\x8d\xb9O\t\x87\xd8\xa9Z\x96\xd1\x1dG\xaf0\xe1\x91\xd8\a\x00') preadv(r7, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x6e}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000140)={'\x00', 0x7, 0xcc, 0x2b, 0x40, 0x8}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) [ 885.441563] overlayfs: failed to decode file handle (len=16, type=251, flags=0, err=-22) 02:46:41 executing program 5: ioctl$USBDEVFS_DROP_PRIVILEGES(0xffffffffffffffff, 0x4004551e, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x3, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)=@getqdisc={0x48, 0x26, 0x8, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x1, 0x4}, {0x0, 0xc}, {0xfff3, 0xffff}}, [{0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}]}, 0x48}, 0x1, 0x0, 0x0, 0x44054}, 0x881) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000130000000000000000010000d50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r4}, 0x10) r6 = getpgid(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, r5, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000500)={'\x00', 0x1000, 0x26d88cab, 0x1f, 0x9, 0x3f, r6}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r8 = syz_open_dev$audion(&(0x7f0000000540), 0x8, 0x222800) bind$inet6(r8, &(0x7f0000000580)={0xa, 0x4e24, 0xffff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x2}, 0x1c) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f00000002c0)='#@g\xc0\x90\x15\x1f\x13\x1b5y\xaaV*j\x8d\xb9O\t\x87\xd8\xa9Z\x96\xd1\x1dG\xaf0\xe1\x91\xd8\a\x00') preadv(r7, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x6e}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000140)={'\x00', 0x7, 0xcc, 0x2b, 0x40, 0x8}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) 02:46:41 executing program 2: syz_mount_image$hfs(&(0x7f0000000080), &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x8000, &(0x7f0000000140)={[{@codepage={'codepage', 0x3d, 'iso8859-9'}}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}]}, 0x1, 0x27c, &(0x7f0000000180)="$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") perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x14d27e, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) [ 885.550342] audit: type=1800 audit(1675392401.594:1125): pid=29908 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="loop2" ino=21 res=0 [ 885.607712] audit: type=1804 audit(1675392401.614:1126): pid=29912 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name=2F726F6F742F73797A6B616C6C65722D74657374646972313137313832303232392F73797A6B616C6C65722E5A76717A4D702F39382F131377C5FC35D41454D5D41D29AD1A6029598146E6BE166E41AD0DBD4054033C9F33BBDA8224A2F3D772E7636E48B33CBF708372E8F1B9933EC5127743BE2206209EF02DF9CBF2F6E880D3382F627573 dev="loop2" ino=21 res=1 02:46:41 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0), 0x75f, 0x103382) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x507, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000007c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x44, 0x3, 0xa, 0x0, 0x0, 0x0, {0xa, 0x0, 0x8}, [@NFTA_CHAIN_HOOK={0x18, 0x4, 0x0, 0x1, [@NFTA_HOOK_DEV={0x14, 0x3, 'vlan0\x00'}]}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x1}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x34, 0x3, 0xa, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_CHAIN_POLICY={0x8}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x4}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_USERDATA={0x4}]}, @NFT_MSG_NEWSETELEM={0x44, 0xc, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFTA_SET_ELEM_LIST_SET_ID={0x8, 0x4, 0x1, 0x0, 0x2}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_SET_ID={0x8}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz0\x00'}]}, @NFT_MSG_NEWTABLE={0xe0, 0x0, 0xa, 0x0, 0x0, 0x0, {0x0, 0x0, 0x8}, [@NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_USERDATA={0x97, 0x6, "a2847d0e4d9c362cde89365fcc56e44aef1d4415b60c737ad33458f8f3ebae85c9a18b314f0a0cdcad10995798fd74198a34268b13d1d45a9e9235bca122b1bb9e3ec6e03e35676c9ca0a17f0712e8384d12dc1cae9a8f39f8955bda950bd3e966a360136b5e13fb92a20dd9f98e84e9ae2fbdc908ed6d28e6f73a9709a1d73b84d444423ed8ffb47d8c1c56593549cf58124c"}, @NFTA_TABLE_USERDATA={0x20, 0x6, "3c1861e35545fa13a0e3a9ad337b0bb70dcc4eb3b252ae3954c91cff"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}]}, @NFT_MSG_DELTABLE={0x234, 0x2, 0xa, 0x3, 0x0, 0x0, {0xc}, [@NFTA_TABLE_USERDATA={0xf3, 0x6, "0eedee994f84e483b2ee73171522162c0d5859a48a275153ad38924a88ffa4d3045b7ac464a02f076c021b65690719f64c97c4c474f6f599812256c0f897606ff7266af528e26f35e6151eb3c8256b0161ba99dfba59422a678a56d575cb67eede578a2b0df0148788504e5b3ee0a43ff12d1877fbac56298967e5ab6f889a1d3eba6d84f3a615b96aef5ab0d4b5ee4d1815f75cca39d4ac9eaa12ebb1b8a6b307ba79578518f51e84383028c578c73f4207d5c0f54415278180aa37a5449bcafed8b2d46338ba8c8d3bffc801865ef59d1124f5cf935df77d73b793f12beaa34cb384c30160abe0c0a8ed836614c3"}, @NFTA_TABLE_USERDATA={0x46, 0x6, "9464f851c0a9fc9d964a91d0d0a48cda0630764e0706d9403e96e9b55b6650cb57abdb63146a7288d7b599754485079792fb60ba046098552e25c5a3301c9ceb4f04"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_USERDATA={0xc0, 0x6, "8e9577650594e8fc90caa94d82a184d41b7d73597dbcf02be4a2cc3ecb69258464726b5e64de3365546700e09732e3a2d54327d70e1569556d46da5e325de5c2f2aa56e2e5611962b42b2381ebb1270b41299ada82986f96d8b37328887f2e3a91b0125e96170b2c9901b69e5b87c7e11badce243440cd7f5afd0afbfb1130b04e44b0ae697538e297887c1a6f4c04d80cf5fc5f1ab311b2be61fcd6d4af6ee461887e5d82d2aaf23c9cbdbbf51e2d75c9a969c83a30ad7e1081214a"}, @NFTA_TABLE_FLAGS={0x8}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}], {0x14}}, 0x3f8}, 0x1, 0x0, 0x0, 0x18}, 0x40) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)={0x5c, 0x2, 0x6, 0x801, 0x6c, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004801}, 0x800) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x3) r3 = dup(r2) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000340)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0\x00'}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6, 0x2, 0x91, 0x9, 0x0, 0x4, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0xf1, 0x13}, 0x9040, 0x500, 0x2, 0x9, 0x5, 0x0, 0xffff, 0x0, 0x3, 0x0, 0x9}, 0x0, 0x3, r3, 0xa) r4 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) waitid(0x0, 0x0, 0x0, 0x80000000, 0x0) pwritev(r4, &(0x7f0000000540)=[{&(0x7f0000000000)='B', 0x1}], 0x1, 0x81805, 0x0) waitid(0x0, 0x0, &(0x7f0000000400), 0x2, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r4) r5 = socket$can_bcm(0x1d, 0x2, 0x2) sendmsg$can_raw(r5, &(0x7f0000001fc8)={0x0, 0x0, &(0x7f0000000ff0)={&(0x7f000000a000)=@canfd={{0x1}, 0x0, 0x0, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000004e2f9663a918fa1efd9b0b"}, 0xfe68}}, 0x0) r6 = socket(0x10, 0x803, 0x0) dup3(r6, r5, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000380)) sendfile(r0, r0, 0x0, 0x24002da8) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000780)={0x0, {}, 0x0, {}, 0x0, 0x1, 0x15, 0x9, "2bbb19e5631df896ba98674d0b5600000000000000186049da15bffbdd1a3e02ca0718c73559bc4fe9801d897649294687be6979a0b60bafc062c41c7373af99", "fd623e81b1486a5e6fab919c545f72d339f1538f1d1c4b68318117e2a6badf49", [0x7]}) socket$netlink(0x10, 0x3, 0x0) [ 885.857910] audit: type=1800 audit(1675392401.974:1127): pid=29924 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="loop2" ino=21 res=0 [ 885.949382] audit: type=1804 audit(1675392402.024:1128): pid=29924 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name=2F726F6F742F73797A6B616C6C65722D74657374646972313137313832303232392F73797A6B616C6C65722E5A76717A4D702F39392F131377C5FC35D41454D5D41D29AD1A6029598146E6BE166E41AD0DBD4054033C9F33BBDA8224A2F3D772E7636E48B33CBF708372E8F1B9933EC5127743BE2206209EF02DF9CBF2F6E880D3382F627573 dev="loop2" ino=21 res=1 02:46:42 executing program 4: syz_mount_image$f2fs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x200080, &(0x7f0000000140)={[{@jqfmt_vfsv1}, {@nolazytime}, {@noinline_dentry}]}, 0x1, 0x54f3, &(0x7f0000005640)="$eJzs3EtvG1UbB/DHSdP72zdCLNh1pAopkWqrTi+CXYFWXESqiMuCFTi2Y7m1PVHsOCGrLlgiFnwTBBIrlnwGFqzZIRYgdkggz5lUDRcJKU5Mmt9PGv9njsfPPMeqqpyx5QBOrcXs158rcSUuRMR8RFyOKPYr5Va4m+KFiLgaEXNPbZVy/MnA2Yi4GBFXJsVTzUr51OfXx9du//TWL998d+7MpS++/n52swZm7cWI6G+m/Z1+yryT8mE53hh3i+zfGpeZnug/Ko/zlDvt9aLCTmP/vEaRNzvp/HxzezjJjV6jOclOd6MY3xykCw7Hnf06xQseNraK41Z7vcjuMC+ys5f62t1L/7ftDUepTqus93FRPkaj/Uzj7d12ms/moyKbg1E5nurmrfbuJMdllpeLZt5rFX2sH+ad/m97uzvY3s3G7a1hNx9kt2v1l2r1O9X6Vt5qj9q3qo1+686tbKnTm5xWHbUb/budPO/02rVm3l/OljrNZrVez5butde7jUFWr9du1m5Uby+Xe9ez1x+8n/Va2dIkX+0Otkfd3jDbyLey9IrlbKV28+Xl7Fo9e3d1LVt75/791bX3Prz3wYNXVt98rTzpL21lSys3Vlaq9RvVlfryKZr/J2XTU5w/HMqTP1Tj8Uz7ADhBrP+BWTjp6/+w/p+KE7X+Pe3r/yOYPxxKZdYNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwKz8sfPlGsbOYji+V4/8rh54rjysRMRcRv/+N+Th7oOZ8WWfhH85f+FMP31aiqDC5xrlyuxgRd8vtt/8f9bsAAAAAz66vHl/9LK3W08PirBviOKWbNnOXP5pSvUpELCz+OKVqc5OH56dUrPj3fSZ2p1StuIF1fkrF0i23M9Oq9q/MH4jzT0UlxdyxtgMAAByLgyuB412FAAAAcJw+nXUDzEAlfV4b5Xfxyy/wn0tRfiB44cARAAAAcAJVZt0AAAAAcOSK9b/f/wMAAIBnW/r9PwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP5g525yUoeiOICfFvoe7yuPGOduxRkswyU4dGhYgJtgCbgFN8AacOYSDBh6S7QGjUm/Ivn9kvZyG/LnQJice5sCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB06bFYze9vL+6a5mx3zbTzbQAAAIBjNsVqXr6Ypvmf6vq/6tJZNc8iIo+IY737KH7UMkdVTvHB+4t3NTxElAn7z/hZHb8j4rI6nv93/SsAAADA6VovlrPUrafTdOiC6FNatMn/XrWUl0VEMX1qKS3fn85bCiv/3+O4aSmtXMCatBSWltzGbaV9yag2TN4MWRryXssBAAB6Ue8E+u1CAAAA6NP10AUwjCwOW5mHveDyzvvXDcFftRkAAADwDWVDFwAAAAB0KN3tX/b/nv8HAAAApy09/w8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIAubYrVfL1YzprmbHfNfJadZU2rAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOCF/Xk3ARAIgzC4vjWT679YWdAaTGZA+PgXgwMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAanq/zF8sjTvJ2mtj63kk2Ts1jk6Ns3Pj6g/j79cAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP+/OSAiEQBFEwZ/zvpO9/WEnQM4gQAQ2PKmrRAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAF/0u1/+T0yNM8ncaWPpeCRZu2psXTX2HjSOHoy3fwMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAXO/fzGkcVBwD8zczO1lbFNcoeIqLgQS92u62tvXpQggf/BCGk2xrd+qPNwZYi5OJNcs5F9CgiKPGW/yHnBHKJtxz2EMGzMrMzyeQHuBo6s0k+H3jzvjsM875vEkK+814CAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACl0XsHcZIdOuM4Ls5t7j1ZyPqtI31mfWV7NmtZHNWZ9NnwavVD1G0uEQAAAC6OpKzvQwg76dpc1sedvP5Py2uymv+H58dxWc8frfvLvqz9s/b7b7sv7w/UGY+T3fTu4nBw7Xgqrac3y+n2wr9e0cqffP7uJcm/IPGHyy+N0vx5Rt9tbLzfzsNLdWQLAPwfV8u+CMrfh7K+32RiAFwYrUrhXdb/SafZnAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADqMFoOz5ZxFEKYbR3Ema29Jwsn9esr27Nlu7W6ulK9Z3aLNIRwd3E4uFbjXKbdw0ePP5sfDgcP6g9eCyE0N3oRfDzBNSE0maHgtEFcfK9PSz5nI2j4BxMAAOdOWrSsrt9J1+ayc9FMCH//eLj+f7MShwnr/91Pbm1Wx6rW//3aZjj9ekv3v+w9fPT47cX78/cG9wafv3O9/27/xu2bN2/38nclPW9MAAAAOJ120ar1fzxzfP3/SiUOE9b/X33f/6Y6VqL+P9HBol/TmQAAAFxsL77+15/RCeejdjt8Pb+09KA/Pu5/vj4+NpDqf3apaNX6P5lpOisAAACgDqPl6ND6/51KHCZc/3/up1d+qd4zCSFcLtb/ry58MbxT33SmWh1/Ttz0HAEAAGjW5aJV1//TfP9/vL/lIQ4hvPXGOC7+DeBE9X/ywbc/V8eq7v+/Ud8Up1LcHT+PvO+G0Oo2nREAAADn2TNFy4r9P9K1uU9/vfJR2/5/AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgLr9EwAA///n7EHs") mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000100)='./file1\x00', 0x200) 02:46:42 executing program 5: ioctl$USBDEVFS_DROP_PRIVILEGES(0xffffffffffffffff, 0x4004551e, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x3, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)=@getqdisc={0x48, 0x26, 0x8, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x1, 0x4}, {0x0, 0xc}, {0xfff3, 0xffff}}, [{0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}]}, 0x48}, 0x1, 0x0, 0x0, 0x44054}, 0x881) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000130000000000000000010000d50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r4}, 0x10) r6 = getpgid(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, r5, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000500)={'\x00', 0x1000, 0x26d88cab, 0x1f, 0x9, 0x3f, r6}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r8 = syz_open_dev$audion(&(0x7f0000000540), 0x8, 0x222800) bind$inet6(r8, &(0x7f0000000580)={0xa, 0x4e24, 0xffff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x2}, 0x1c) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f00000002c0)='#@g\xc0\x90\x15\x1f\x13\x1b5y\xaaV*j\x8d\xb9O\t\x87\xd8\xa9Z\x96\xd1\x1dG\xaf0\xe1\x91\xd8\a\x00') preadv(r7, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x6e}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000140)={'\x00', 0x7, 0xcc, 0x2b, 0x40, 0x8}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) 02:46:42 executing program 0: ioctl$USBDEVFS_DROP_PRIVILEGES(0xffffffffffffffff, 0x4004551e, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x3, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)=@getqdisc={0x48, 0x26, 0x8, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x1, 0x4}, {0x0, 0xc}, {0xfff3, 0xffff}}, [{0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}]}, 0x48}, 0x1, 0x0, 0x0, 0x44054}, 0x881) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000130000000000000000010000d50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r4}, 0x10) r6 = getpgid(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, r5, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000500)={'\x00', 0x1000, 0x26d88cab, 0x1f, 0x9, 0x3f, r6}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r8 = syz_open_dev$audion(&(0x7f0000000540), 0x8, 0x222800) bind$inet6(r8, &(0x7f0000000580)={0xa, 0x4e24, 0xffff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x2}, 0x1c) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f00000002c0)='#@g\xc0\x90\x15\x1f\x13\x1b5y\xaaV*j\x8d\xb9O\t\x87\xd8\xa9Z\x96\xd1\x1dG\xaf0\xe1\x91\xd8\a\x00') preadv(r7, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x6e}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000140)={'\x00', 0x7, 0xcc, 0x2b, 0x40, 0x8}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) 02:46:42 executing program 2: ioctl$USBDEVFS_DROP_PRIVILEGES(0xffffffffffffffff, 0x4004551e, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x3, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)=@getqdisc={0x48, 0x26, 0x8, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x1, 0x4}, {0x0, 0xc}, {0xfff3, 0xffff}}, [{0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}]}, 0x48}, 0x1, 0x0, 0x0, 0x44054}, 0x881) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000130000000000000000010000d50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r4}, 0x10) r6 = getpgid(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, r5, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000500)={'\x00', 0x1000, 0x26d88cab, 0x1f, 0x9, 0x3f, r6}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r8 = syz_open_dev$audion(&(0x7f0000000540), 0x8, 0x222800) bind$inet6(r8, &(0x7f0000000580)={0xa, 0x4e24, 0xffff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x2}, 0x1c) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f00000002c0)='#@g\xc0\x90\x15\x1f\x13\x1b5y\xaaV*j\x8d\xb9O\t\x87\xd8\xa9Z\x96\xd1\x1dG\xaf0\xe1\x91\xd8\a\x00') preadv(r7, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x6e}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000140)={'\x00', 0x7, 0xcc, 0x2b, 0x40, 0x8}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) 02:46:42 executing program 3: syz_mount_image$hfs(&(0x7f0000000080), &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x8000, &(0x7f0000000140)={[{@codepage={'codepage', 0x3d, 'iso8859-9'}}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}]}, 0x1, 0x27c, &(0x7f0000000180)="$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") perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x14d27e, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) 02:46:42 executing program 1: syz_mount_image$hfs(&(0x7f0000000080), &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x8000, &(0x7f0000000140)={[{@codepage={'codepage', 0x3d, 'iso8859-9'}}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}]}, 0x1, 0x27c, &(0x7f0000000180)="$eJzs3U9rE08cx/HPbNI2v19LXdtKwWO14EnaehEviuRBeBBRmwjFUKGtYD2pZxFvgndvnsXH4El8Anry5MlT8LIys5NkE3eTJjSZpn2/IMuuO3++X2f/zARKBODMul39/uHaT/sxUkklSTekSFJFKku6oNXK092DnYNGvdavoZKrYT9GaU3zT5nt3XpeVVvP1fBie1TWQvbfMB5JkiQ/Bpb6PZFYEI67+3NE0py/O935ysQjG48XoQMIITPCpqmmnmkxZDgAgPD8+z/yb4kFP3+PImndv/ZP1fu/GTqAwNrv/yg9Towd33PuVGe955Zwdu4XtVaJo/Q1q/TK6ppgmkGrShdL9N+jnUb96vaTRi3SK930MsVW3LamViLOgGjXctamfYye+7zLYcbmsFUQ//IoPb4bPpQ288V8NfdMrPeqted/5cTYYXIjFfeMVBr/RnGLLss4LVWQ5XnXyUXfgz5/PEKWFZVsLHlmfZtdXxDErTjfzvaptdRTK81uszg7V2s5t9ZW+/hPbq2V3lqdq7m4v3Ezb8wds6Zf+qRqZv4f2UFfV/Gd2fXkN66kvzL65lN2JQvGsUs0dCoY3Ws91HUt7h8+f/yg0ajvsXOCd8qaRF8z/tIInbKN4Zakk/A/v7d/qNxTrRlEqMBKmssP7Lh2wj2aMDmdQdfq3dDBIAQ77zLp+i+zXtlwDzi7ifvM05NBjWda3CxYGyy57f9DreDmi1dwR11zXboiXS7s8WVvs7GP85QwVX3Tfb7/BwAAAAAAAAAAAAAAAAAAmDaT+IuF0DkCAAAAAAAAAAAAAAAAAAAAADDtpvb3f82Z/AVP4Fj9DQAA//+L3Xr8") perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x14d27e, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) [ 886.057707] blktrace: Concurrent blktraces are not allowed on sg0 [ 886.067563] blktrace: Concurrent blktraces are not allowed on sg0 02:46:42 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) syz_open_dev$ptys(0xc, 0x3, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty, 0x8001}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 02:46:42 executing program 3: syz_mount_image$hfs(&(0x7f0000000080), &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x8000, &(0x7f0000000140)={[{@codepage={'codepage', 0x3d, 'iso8859-9'}}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}]}, 0x1, 0x27c, &(0x7f0000000180)="$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") perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x14d27e, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) [ 886.204387] audit: type=1800 audit(1675392402.324:1129): pid=29944 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="loop3" ino=21 res=0 02:46:42 executing program 1: syz_mount_image$hfs(&(0x7f0000000080), &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x8000, &(0x7f0000000140)={[{@codepage={'codepage', 0x3d, 'iso8859-9'}}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}]}, 0x1, 0x27c, &(0x7f0000000180)="$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") perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x14d27e, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) 02:46:42 executing program 0: ioctl$USBDEVFS_DROP_PRIVILEGES(0xffffffffffffffff, 0x4004551e, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x3, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)=@getqdisc={0x48, 0x26, 0x8, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x1, 0x4}, {0x0, 0xc}, {0xfff3, 0xffff}}, [{0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}]}, 0x48}, 0x1, 0x0, 0x0, 0x44054}, 0x881) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000130000000000000000010000d50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r4}, 0x10) r6 = getpgid(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, r5, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000500)={'\x00', 0x1000, 0x26d88cab, 0x1f, 0x9, 0x3f, r6}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r8 = syz_open_dev$audion(&(0x7f0000000540), 0x8, 0x222800) bind$inet6(r8, &(0x7f0000000580)={0xa, 0x4e24, 0xffff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x2}, 0x1c) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f00000002c0)='#@g\xc0\x90\x15\x1f\x13\x1b5y\xaaV*j\x8d\xb9O\t\x87\xd8\xa9Z\x96\xd1\x1dG\xaf0\xe1\x91\xd8\a\x00') preadv(r7, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x6e}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000140)={'\x00', 0x7, 0xcc, 0x2b, 0x40, 0x8}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) 02:46:42 executing program 2: ioctl$USBDEVFS_DROP_PRIVILEGES(0xffffffffffffffff, 0x4004551e, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x3, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)=@getqdisc={0x48, 0x26, 0x8, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x1, 0x4}, {0x0, 0xc}, {0xfff3, 0xffff}}, [{0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}]}, 0x48}, 0x1, 0x0, 0x0, 0x44054}, 0x881) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000130000000000000000010000d50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r4}, 0x10) r6 = getpgid(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, r5, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000500)={'\x00', 0x1000, 0x26d88cab, 0x1f, 0x9, 0x3f, r6}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r8 = syz_open_dev$audion(&(0x7f0000000540), 0x8, 0x222800) bind$inet6(r8, &(0x7f0000000580)={0xa, 0x4e24, 0xffff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x2}, 0x1c) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f00000002c0)='#@g\xc0\x90\x15\x1f\x13\x1b5y\xaaV*j\x8d\xb9O\t\x87\xd8\xa9Z\x96\xd1\x1dG\xaf0\xe1\x91\xd8\a\x00') preadv(r7, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x6e}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000140)={'\x00', 0x7, 0xcc, 0x2b, 0x40, 0x8}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) [ 886.273763] blktrace: Concurrent blktraces are not allowed on sg0 02:46:42 executing program 3: syz_mount_image$hfs(&(0x7f0000000080), &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x8000, &(0x7f0000000140)={[{@codepage={'codepage', 0x3d, 'iso8859-9'}}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}]}, 0x1, 0x27c, &(0x7f0000000180)="$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") perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x14d27e, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) [ 886.344136] audit: type=1804 audit(1675392402.354:1130): pid=29944 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name=2F726F6F742F73797A6B616C6C65722D746573746469723930363833393937372F73797A6B616C6C65722E6E56423864482F3131302F131377C5FC35D41454D5D41D29AD1A6029598146E6BE166E41AD0DBD4054033C9F33BBDA8224A2F3D772E7636E48B33CBF708372E8F1B9933EC5127743BE2206209EF02DF9CBF2F6E880D3382F627573 dev="loop3" ino=21 res=1 [ 886.423949] blktrace: Concurrent blktraces are not allowed on sg0 [ 886.432410] blktrace: Concurrent blktraces are not allowed on sg0 [ 886.541924] blktrace: Concurrent blktraces are not allowed on sg0 02:46:42 executing program 2: ioctl$USBDEVFS_DROP_PRIVILEGES(0xffffffffffffffff, 0x4004551e, 0x0) r0 = perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008, 0x3, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000002780)={0x53, 0xfffffffffffffffc, 0xb7, 0x6, @buffer={0x0, 0x39, &(0x7f0000002540)=""/57}, &(0x7f0000002580)="1d41df66ca0e63543275d6434567826e202cc58b57e46da58493848a0fc9abf320926f45cf304cd38476c333ad1dfb886dfb097b6295d73604257aa8f53e7c72d3a4d5e99bafdba2d606ae0a947fc254979ee9d7e1f81ef1721252b993ab6a88f13f86546eb51b7bc0b5bb83fece25279312d8d04a551b25a315c0d6bda325c9152f53264001a398e24b75a5aa18c68fb2e762f79f297e2abb3e54c5eac5497ab43c3f7f1083fcd0e6915446dfb372644b62995d650cca", &(0x7f0000002640)=""/248, 0x2, 0x10, 0xffffffffffffffff, &(0x7f0000002740)}) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={'\x00', 0x0, 0x8bc, 0x80001, 0x3, 0x8}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)=@getqdisc={0x48, 0x26, 0x8, 0x70bd29, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x1, 0x4}, {0x0, 0xc}, {0xfff3, 0xffff}}, [{0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}, {0x4}]}, 0x48}, 0x1, 0x0, 0x0, 0x44054}, 0x881) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000080)='\xe9\x11\xbdD\x16\xeaqS\xbb\xed\xc3r99m\x1f\xb1\'\xef\xbf') r2 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000130000000000000000010000d50000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x45) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='9p_client_req\x00', r4}, 0x10) r6 = getpgid(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, r5, 0x0, 0x2, &(0x7f0000000000)=']\x00'}, 0x30) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000500)={'\x00', 0x1000, 0x26d88cab, 0x1f, 0x9, 0x3f, r6}) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r8 = syz_open_dev$audion(&(0x7f0000000540), 0x8, 0x222800) bind$inet6(r8, &(0x7f0000000580)={0xa, 0x4e24, 0xffff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x2}, 0x1c) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x40082406, &(0x7f00000002c0)='#@g\xc0\x90\x15\x1f\x13\x1b5y\xaaV*j\x8d\xb9O\t\x87\xd8\xa9Z\x96\xd1\x1dG\xaf0\xe1\x91\xd8\a\x00') preadv(r7, &(0x7f0000001800)=[{&(0x7f00000003c0)=""/110, 0x6e}], 0x1, 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000140)={'\x00', 0x7, 0xcc, 0x2b, 0x40, 0x8}) ioctl$BLKTRACESTART(r1, 0x1274, 0x0) 02:46:42 executing program 1: syz_mount_image$hfs(&(0x7f0000000080), &(0x7f0000000400)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x8000, &(0x7f0000000140)={[{@codepage={'codepage', 0x3d, 'iso8859-9'}}, {@iocharset={'iocharset', 0x3d, 'iso8859-15'}}]}, 0x1, 0x27c, &(0x7f0000000180)="$eJzs3U9rE08cx/HPbNI2v19LXdtKwWO14EnaehEviuRBeBBRmwjFUKGtYD2pZxFvgndvnsXH4El8Anry5MlT8LIys5NkE3eTJjSZpn2/IMuuO3++X2f/zARKBODMul39/uHaT/sxUkklSTekSFJFKku6oNXK092DnYNGvdavoZKrYT9GaU3zT5nt3XpeVVvP1fBie1TWQvbfMB5JkiQ/Bpb6PZFYEI67+3NE0py/O935ysQjG48XoQMIITPCpqmmnmkxZDgAgPD8+z/yb4kFP3+PImndv/ZP1fu/GTqAwNrv/yg9Towd33PuVGe955Zwdu4XtVaJo/Q1q/TK6ppgmkGrShdL9N+jnUb96vaTRi3SK930MsVW3LamViLOgGjXctamfYye+7zLYcbmsFUQ//IoPb4bPpQ288V8NfdMrPeqted/5cTYYXIjFfeMVBr/RnGLLss4LVWQ5XnXyUXfgz5/PEKWFZVsLHlmfZtdXxDErTjfzvaptdRTK81uszg7V2s5t9ZW+/hPbq2V3lqdq7m4v3Ezb8wds6Zf+qRqZv4f2UFfV/Gd2fXkN66kvzL65lN2JQvGsUs0dCoY3Ws91HUt7h8+f/yg0ajvsXOCd8qaRF8z/tIInbKN4Zakk/A/v7d/qNxTrRlEqMBKmssP7Lh2wj2aMDmdQdfq3dDBIAQ77zLp+i+zXtlwDzi7ifvM05NBjWda3CxYGyy57f9DreDmi1dwR11zXboiXS7s8WVvs7GP85QwVX3Tfb7/BwAAAAAAAAAAAAAAAAAAmDaT+IuF0DkCAAAAAAAAAAAAAAAAAAAAADDtpvb3f82Z/AVP4Fj9DQAA//+L3Xr8") perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x14d27e, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./bus\x00', 0x0, 0x0) 02:46:42 executing program 0: symlinkat(&(0x7f0000000100)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00') readlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000006c0)=""/4096, 0x1000) readlink(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)=""/67, 0x43) 02:46:42 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000080)={0x1, 0x0, [{0x40000080, 0x0, 0x3}]}) 02:46:43 executing program 0: symlinkat(&(0x7f0000000100)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00') readlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000006c0)=""/4096, 0x1000) readlink(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)=""/67, 0x43) [ 886.861762] blktrace: Concurrent blktraces are not allowed on sg0 02:46:43 executing program 4: symlinkat(&(0x7f0000000100)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00') readlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000006c0)=""/4096, 0x1000) readlink(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)=""/67, 0x43) 02:46:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) syz_open_dev$ptys(0xc, 0x3, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty, 0x8001}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 02:46:43 executing program 0: symlinkat(&(0x7f0000000100)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00') readlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000006c0)=""/4096, 0x1000) readlink(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)=""/67, 0x43) 02:46:43 executing program 1: socket(0x22, 0x0, 0x7ff) 02:46:43 executing program 4: symlinkat(&(0x7f0000000100)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00') readlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000006c0)=""/4096, 0x1000) readlink(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)=""/67, 0x43) 02:46:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) syz_open_dev$ptys(0xc, 0x3, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty, 0x8001}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 02:46:43 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) recvmsg$can_bcm(r0, &(0x7f0000001780)={&(0x7f0000000040)=@sco={0x1f, @none}, 0x80, 0x0}, 0x0) 02:46:43 executing program 1: ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) syz_open_dev$sndctrl(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r0, 0x12) ptrace(0x4208, r0) 02:46:43 executing program 0: symlinkat(&(0x7f0000000100)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00') readlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000006c0)=""/4096, 0x1000) readlink(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)=""/67, 0x43) 02:46:43 executing program 4: symlinkat(&(0x7f0000000100)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00') readlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000006c0)=""/4096, 0x1000) readlink(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)=""/67, 0x43) 02:46:43 executing program 0: open(&(0x7f0000000440)='./file0\x00', 0x110000141042, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f00000011c0)=0x0) clock_gettime(0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000, 0x0, 0x0, 0x0, 0x3}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, &(0x7f0000000000)) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="5b643a3a5d2c303a3a363a2f60158dcdfd966461a178dd7ebe46bf0c3115843850853060a755488f2ce8d22af1a6ca9289a950"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) futex(&(0x7f0000000340)=0x1, 0x4, 0x1, &(0x7f0000000400), &(0x7f0000000480)=0x1, 0x0) pselect6(0x40, &(0x7f0000000140)={0x2, 0x101, 0xdb0, 0x3f, 0x80000000, 0x0, 0x81, 0x791b}, &(0x7f00000001c0)={0x1, 0x101, 0x9, 0xff, 0xff, 0x3, 0x3, 0x3}, 0x0, &(0x7f0000000280), &(0x7f0000000300)={&(0x7f00000002c0)={[0x5]}, 0x8}) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) timer_create(0x5, &(0x7f0000000200)={0x0, 0x3d, 0x2, @tid=r3}, &(0x7f0000000240)) 02:46:43 executing program 1: ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) syz_open_dev$sndctrl(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r0, 0x12) ptrace(0x4208, r0) 02:46:43 executing program 4: ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) syz_open_dev$sndctrl(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r0, 0x12) ptrace(0x4208, r0) 02:46:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) syz_open_dev$ptys(0xc, 0x3, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty, 0x8001}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 02:46:44 executing program 1: ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) syz_open_dev$sndctrl(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r0, 0x12) ptrace(0x4208, r0) 02:46:44 executing program 4: ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) syz_open_dev$sndctrl(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r0, 0x12) ptrace(0x4208, r0) 02:46:44 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) recvmsg$can_bcm(r0, &(0x7f0000001780)={&(0x7f0000000040)=@sco={0x1f, @none}, 0x80, 0x0}, 0x0) 02:46:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) syz_open_dev$ptys(0xc, 0x3, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty, 0x8001}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 02:46:44 executing program 1: ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) syz_open_dev$sndctrl(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r0, 0x12) ptrace(0x4208, r0) 02:46:44 executing program 4: ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) syz_open_dev$sndctrl(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r0, 0x12) ptrace(0x4208, r0) [ 888.130141] ceph: No mds server is up or the cluster is laggy 02:46:44 executing program 0: open(&(0x7f0000000440)='./file0\x00', 0x110000141042, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f00000011c0)=0x0) clock_gettime(0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000, 0x0, 0x0, 0x0, 0x3}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, &(0x7f0000000000)) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="5b643a3a5d2c303a3a363a2f60158dcdfd966461a178dd7ebe46bf0c3115843850853060a755488f2ce8d22af1a6ca9289a950"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) futex(&(0x7f0000000340)=0x1, 0x4, 0x1, &(0x7f0000000400), &(0x7f0000000480)=0x1, 0x0) pselect6(0x40, &(0x7f0000000140)={0x2, 0x101, 0xdb0, 0x3f, 0x80000000, 0x0, 0x81, 0x791b}, &(0x7f00000001c0)={0x1, 0x101, 0x9, 0xff, 0xff, 0x3, 0x3, 0x3}, 0x0, &(0x7f0000000280), &(0x7f0000000300)={&(0x7f00000002c0)={[0x5]}, 0x8}) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) timer_create(0x5, &(0x7f0000000200)={0x0, 0x3d, 0x2, @tid=r3}, &(0x7f0000000240)) 02:46:44 executing program 1: open(&(0x7f0000000440)='./file0\x00', 0x110000141042, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f00000011c0)=0x0) clock_gettime(0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000, 0x0, 0x0, 0x0, 0x3}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, &(0x7f0000000000)) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="5b643a3a5d2c303a3a363a2f60158dcdfd966461a178dd7ebe46bf0c3115843850853060a755488f2ce8d22af1a6ca9289a950"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) futex(&(0x7f0000000340)=0x1, 0x4, 0x1, &(0x7f0000000400), &(0x7f0000000480)=0x1, 0x0) pselect6(0x40, &(0x7f0000000140)={0x2, 0x101, 0xdb0, 0x3f, 0x80000000, 0x0, 0x81, 0x791b}, &(0x7f00000001c0)={0x1, 0x101, 0x9, 0xff, 0xff, 0x3, 0x3, 0x3}, 0x0, &(0x7f0000000280), &(0x7f0000000300)={&(0x7f00000002c0)={[0x5]}, 0x8}) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) timer_create(0x5, &(0x7f0000000200)={0x0, 0x3d, 0x2, @tid=r3}, &(0x7f0000000240)) 02:46:44 executing program 4: open(&(0x7f0000000440)='./file0\x00', 0x110000141042, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f00000011c0)=0x0) clock_gettime(0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000, 0x0, 0x0, 0x0, 0x3}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, &(0x7f0000000000)) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="5b643a3a5d2c303a3a363a2f60158dcdfd966461a178dd7ebe46bf0c3115843850853060a755488f2ce8d22af1a6ca9289a950"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) futex(&(0x7f0000000340)=0x1, 0x4, 0x1, &(0x7f0000000400), &(0x7f0000000480)=0x1, 0x0) pselect6(0x40, &(0x7f0000000140)={0x2, 0x101, 0xdb0, 0x3f, 0x80000000, 0x0, 0x81, 0x791b}, &(0x7f00000001c0)={0x1, 0x101, 0x9, 0xff, 0xff, 0x3, 0x3, 0x3}, 0x0, &(0x7f0000000280), &(0x7f0000000300)={&(0x7f00000002c0)={[0x5]}, 0x8}) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) timer_create(0x5, &(0x7f0000000200)={0x0, 0x3d, 0x2, @tid=r3}, &(0x7f0000000240)) 02:46:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) syz_open_dev$ptys(0xc, 0x3, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty, 0x8001}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) [ 888.737993] Bluetooth: hci0: command 0x0406 tx timeout [ 888.743689] Bluetooth: hci1: command 0x0406 tx timeout 02:46:45 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) recvmsg$can_bcm(r0, &(0x7f0000001780)={&(0x7f0000000040)=@sco={0x1f, @none}, 0x80, 0x0}, 0x0) 02:46:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) syz_open_dev$ptys(0xc, 0x3, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @empty, 0x8001}, 0x1c) listen(r0, 0x10001) r1 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) 02:46:45 executing program 0: open(&(0x7f0000000440)='./file0\x00', 0x110000141042, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f00000011c0)=0x0) clock_gettime(0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000, 0x0, 0x0, 0x0, 0x3}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, &(0x7f0000000000)) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="5b643a3a5d2c303a3a363a2f60158dcdfd966461a178dd7ebe46bf0c3115843850853060a755488f2ce8d22af1a6ca9289a950"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) futex(&(0x7f0000000340)=0x1, 0x4, 0x1, &(0x7f0000000400), &(0x7f0000000480)=0x1, 0x0) pselect6(0x40, &(0x7f0000000140)={0x2, 0x101, 0xdb0, 0x3f, 0x80000000, 0x0, 0x81, 0x791b}, &(0x7f00000001c0)={0x1, 0x101, 0x9, 0xff, 0xff, 0x3, 0x3, 0x3}, 0x0, &(0x7f0000000280), &(0x7f0000000300)={&(0x7f00000002c0)={[0x5]}, 0x8}) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) timer_create(0x5, &(0x7f0000000200)={0x0, 0x3d, 0x2, @tid=r3}, &(0x7f0000000240)) [ 889.183579] ceph: No mds server is up or the cluster is laggy 02:46:45 executing program 1: open(&(0x7f0000000440)='./file0\x00', 0x110000141042, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f00000011c0)=0x0) clock_gettime(0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000, 0x0, 0x0, 0x0, 0x3}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, &(0x7f0000000000)) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="5b643a3a5d2c303a3a363a2f60158dcdfd966461a178dd7ebe46bf0c3115843850853060a755488f2ce8d22af1a6ca9289a950"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) futex(&(0x7f0000000340)=0x1, 0x4, 0x1, &(0x7f0000000400), &(0x7f0000000480)=0x1, 0x0) pselect6(0x40, &(0x7f0000000140)={0x2, 0x101, 0xdb0, 0x3f, 0x80000000, 0x0, 0x81, 0x791b}, &(0x7f00000001c0)={0x1, 0x101, 0x9, 0xff, 0xff, 0x3, 0x3, 0x3}, 0x0, &(0x7f0000000280), &(0x7f0000000300)={&(0x7f00000002c0)={[0x5]}, 0x8}) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) timer_create(0x5, &(0x7f0000000200)={0x0, 0x3d, 0x2, @tid=r3}, &(0x7f0000000240)) [ 889.302074] ceph: No mds server is up or the cluster is laggy [ 889.379050] ceph: No mds server is up or the cluster is laggy [ 889.393965] libceph: connect [d::]:6789 error -101 [ 889.399371] libceph: mon0 [d::]:6789 connect error [ 889.416527] libceph: connect [d::]:6789 error -101 02:46:45 executing program 4: open(&(0x7f0000000440)='./file0\x00', 0x110000141042, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f00000011c0)=0x0) clock_gettime(0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000, 0x0, 0x0, 0x0, 0x3}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, &(0x7f0000000000)) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="5b643a3a5d2c303a3a363a2f60158dcdfd966461a178dd7ebe46bf0c3115843850853060a755488f2ce8d22af1a6ca9289a950"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) futex(&(0x7f0000000340)=0x1, 0x4, 0x1, &(0x7f0000000400), &(0x7f0000000480)=0x1, 0x0) pselect6(0x40, &(0x7f0000000140)={0x2, 0x101, 0xdb0, 0x3f, 0x80000000, 0x0, 0x81, 0x791b}, &(0x7f00000001c0)={0x1, 0x101, 0x9, 0xff, 0xff, 0x3, 0x3, 0x3}, 0x0, &(0x7f0000000280), &(0x7f0000000300)={&(0x7f00000002c0)={[0x5]}, 0x8}) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) timer_create(0x5, &(0x7f0000000200)={0x0, 0x3d, 0x2, @tid=r3}, &(0x7f0000000240)) [ 889.430245] libceph: mon0 [d::]:6789 connect error [ 889.492592] libceph: connect [d::]:6789 error -101 [ 889.497626] libceph: mon0 [d::]:6789 connect error [ 889.510941] libceph: connect [d::]:6789 error -101 [ 889.516615] libceph: mon0 [d::]:6789 connect error 02:46:45 executing program 5: open(&(0x7f0000000440)='./file0\x00', 0x110000141042, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f00000011c0)=0x0) clock_gettime(0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000, 0x0, 0x0, 0x0, 0x3}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, &(0x7f0000000000)) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="5b643a3a5d2c303a3a363a2f60158dcdfd966461a178dd7ebe46bf0c3115843850853060a755488f2ce8d22af1a6ca9289a950"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) futex(&(0x7f0000000340)=0x1, 0x4, 0x1, &(0x7f0000000400), &(0x7f0000000480)=0x1, 0x0) pselect6(0x40, &(0x7f0000000140)={0x2, 0x101, 0xdb0, 0x3f, 0x80000000, 0x0, 0x81, 0x791b}, &(0x7f00000001c0)={0x1, 0x101, 0x9, 0xff, 0xff, 0x3, 0x3, 0x3}, 0x0, &(0x7f0000000280), &(0x7f0000000300)={&(0x7f00000002c0)={[0x5]}, 0x8}) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) timer_create(0x5, &(0x7f0000000200)={0x0, 0x3d, 0x2, @tid=r3}, &(0x7f0000000240)) 02:46:45 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) recvmsg$can_bcm(r0, &(0x7f0000001780)={&(0x7f0000000040)=@sco={0x1f, @none}, 0x80, 0x0}, 0x0) [ 889.706168] libceph: connect [d::]:6789 error -101 [ 889.712392] libceph: mon0 [d::]:6789 connect error 02:46:45 executing program 3: open(&(0x7f0000000440)='./file0\x00', 0x110000141042, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f00000011c0)=0x0) clock_gettime(0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000, 0x0, 0x0, 0x0, 0x3}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, &(0x7f0000000000)) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="5b643a3a5d2c303a3a363a2f60158dcdfd966461a178dd7ebe46bf0c3115843850853060a755488f2ce8d22af1a6ca9289a950"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) futex(&(0x7f0000000340)=0x1, 0x4, 0x1, &(0x7f0000000400), &(0x7f0000000480)=0x1, 0x0) pselect6(0x40, &(0x7f0000000140)={0x2, 0x101, 0xdb0, 0x3f, 0x80000000, 0x0, 0x81, 0x791b}, &(0x7f00000001c0)={0x1, 0x101, 0x9, 0xff, 0xff, 0x3, 0x3, 0x3}, 0x0, &(0x7f0000000280), &(0x7f0000000300)={&(0x7f00000002c0)={[0x5]}, 0x8}) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) timer_create(0x5, &(0x7f0000000200)={0x0, 0x3d, 0x2, @tid=r3}, &(0x7f0000000240)) [ 889.998994] libceph: connect [d::]:6789 error -101 [ 890.004016] libceph: mon0 [d::]:6789 connect error [ 890.010117] libceph: connect [d::]:6789 error -101 [ 890.015462] libceph: mon0 [d::]:6789 connect error [ 890.021573] libceph: connect [d::]:6789 error -101 [ 890.026949] libceph: mon0 [d::]:6789 connect error 02:46:46 executing program 0: open(&(0x7f0000000440)='./file0\x00', 0x110000141042, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f00000011c0)=0x0) clock_gettime(0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000, 0x0, 0x0, 0x0, 0x3}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, &(0x7f0000000000)) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="5b643a3a5d2c303a3a363a2f60158dcdfd966461a178dd7ebe46bf0c3115843850853060a755488f2ce8d22af1a6ca9289a950"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) futex(&(0x7f0000000340)=0x1, 0x4, 0x1, &(0x7f0000000400), &(0x7f0000000480)=0x1, 0x0) pselect6(0x40, &(0x7f0000000140)={0x2, 0x101, 0xdb0, 0x3f, 0x80000000, 0x0, 0x81, 0x791b}, &(0x7f00000001c0)={0x1, 0x101, 0x9, 0xff, 0xff, 0x3, 0x3, 0x3}, 0x0, &(0x7f0000000280), &(0x7f0000000300)={&(0x7f00000002c0)={[0x5]}, 0x8}) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) timer_create(0x5, &(0x7f0000000200)={0x0, 0x3d, 0x2, @tid=r3}, &(0x7f0000000240)) [ 890.144492] ceph: No mds server is up or the cluster is laggy 02:46:46 executing program 1: open(&(0x7f0000000440)='./file0\x00', 0x110000141042, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f00000011c0)=0x0) clock_gettime(0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000, 0x0, 0x0, 0x0, 0x3}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, &(0x7f0000000000)) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="5b643a3a5d2c303a3a363a2f60158dcdfd966461a178dd7ebe46bf0c3115843850853060a755488f2ce8d22af1a6ca9289a950"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) futex(&(0x7f0000000340)=0x1, 0x4, 0x1, &(0x7f0000000400), &(0x7f0000000480)=0x1, 0x0) pselect6(0x40, &(0x7f0000000140)={0x2, 0x101, 0xdb0, 0x3f, 0x80000000, 0x0, 0x81, 0x791b}, &(0x7f00000001c0)={0x1, 0x101, 0x9, 0xff, 0xff, 0x3, 0x3, 0x3}, 0x0, &(0x7f0000000280), &(0x7f0000000300)={&(0x7f00000002c0)={[0x5]}, 0x8}) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) timer_create(0x5, &(0x7f0000000200)={0x0, 0x3d, 0x2, @tid=r3}, &(0x7f0000000240)) [ 890.305613] ceph: No mds server is up or the cluster is laggy 02:46:46 executing program 4: open(&(0x7f0000000440)='./file0\x00', 0x110000141042, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f00000011c0)=0x0) clock_gettime(0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000, 0x0, 0x0, 0x0, 0x3}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, &(0x7f0000000000)) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="5b643a3a5d2c303a3a363a2f60158dcdfd966461a178dd7ebe46bf0c3115843850853060a755488f2ce8d22af1a6ca9289a950"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) futex(&(0x7f0000000340)=0x1, 0x4, 0x1, &(0x7f0000000400), &(0x7f0000000480)=0x1, 0x0) pselect6(0x40, &(0x7f0000000140)={0x2, 0x101, 0xdb0, 0x3f, 0x80000000, 0x0, 0x81, 0x791b}, &(0x7f00000001c0)={0x1, 0x101, 0x9, 0xff, 0xff, 0x3, 0x3, 0x3}, 0x0, &(0x7f0000000280), &(0x7f0000000300)={&(0x7f00000002c0)={[0x5]}, 0x8}) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) timer_create(0x5, &(0x7f0000000200)={0x0, 0x3d, 0x2, @tid=r3}, &(0x7f0000000240)) [ 890.379816] ceph: No mds server is up or the cluster is laggy [ 890.478899] libceph: connect [d::]:6789 error -101 [ 890.483941] libceph: mon0 [d::]:6789 connect error 02:46:46 executing program 5: open(&(0x7f0000000440)='./file0\x00', 0x110000141042, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f00000011c0)=0x0) clock_gettime(0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000, 0x0, 0x0, 0x0, 0x3}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, &(0x7f0000000000)) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="5b643a3a5d2c303a3a363a2f60158dcdfd966461a178dd7ebe46bf0c3115843850853060a755488f2ce8d22af1a6ca9289a950"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) futex(&(0x7f0000000340)=0x1, 0x4, 0x1, &(0x7f0000000400), &(0x7f0000000480)=0x1, 0x0) pselect6(0x40, &(0x7f0000000140)={0x2, 0x101, 0xdb0, 0x3f, 0x80000000, 0x0, 0x81, 0x791b}, &(0x7f00000001c0)={0x1, 0x101, 0x9, 0xff, 0xff, 0x3, 0x3, 0x3}, 0x0, &(0x7f0000000280), &(0x7f0000000300)={&(0x7f00000002c0)={[0x5]}, 0x8}) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) timer_create(0x5, &(0x7f0000000200)={0x0, 0x3d, 0x2, @tid=r3}, &(0x7f0000000240)) [ 890.543280] ceph: No mds server is up or the cluster is laggy 02:46:46 executing program 2: open(&(0x7f0000000440)='./file0\x00', 0x110000141042, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f00000011c0)=0x0) clock_gettime(0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000, 0x0, 0x0, 0x0, 0x3}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, &(0x7f0000000000)) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="5b643a3a5d2c303a3a363a2f60158dcdfd966461a178dd7ebe46bf0c3115843850853060a755488f2ce8d22af1a6ca9289a950"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) futex(&(0x7f0000000340)=0x1, 0x4, 0x1, &(0x7f0000000400), &(0x7f0000000480)=0x1, 0x0) pselect6(0x40, &(0x7f0000000140)={0x2, 0x101, 0xdb0, 0x3f, 0x80000000, 0x0, 0x81, 0x791b}, &(0x7f00000001c0)={0x1, 0x101, 0x9, 0xff, 0xff, 0x3, 0x3, 0x3}, 0x0, &(0x7f0000000280), &(0x7f0000000300)={&(0x7f00000002c0)={[0x5]}, 0x8}) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) timer_create(0x5, &(0x7f0000000200)={0x0, 0x3d, 0x2, @tid=r3}, &(0x7f0000000240)) [ 890.652337] libceph: connect [::6]:6789 error -101 [ 890.657360] libceph: mon1 [::6]:6789 connect error [ 890.679201] libceph: connect [::6]:6789 error -101 [ 890.686036] libceph: mon1 [::6]:6789 connect error 02:46:46 executing program 3: open(&(0x7f0000000440)='./file0\x00', 0x110000141042, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f00000011c0)=0x0) clock_gettime(0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000, 0x0, 0x0, 0x0, 0x3}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, &(0x7f0000000000)) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="5b643a3a5d2c303a3a363a2f60158dcdfd966461a178dd7ebe46bf0c3115843850853060a755488f2ce8d22af1a6ca9289a950"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) futex(&(0x7f0000000340)=0x1, 0x4, 0x1, &(0x7f0000000400), &(0x7f0000000480)=0x1, 0x0) pselect6(0x40, &(0x7f0000000140)={0x2, 0x101, 0xdb0, 0x3f, 0x80000000, 0x0, 0x81, 0x791b}, &(0x7f00000001c0)={0x1, 0x101, 0x9, 0xff, 0xff, 0x3, 0x3, 0x3}, 0x0, &(0x7f0000000280), &(0x7f0000000300)={&(0x7f00000002c0)={[0x5]}, 0x8}) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) timer_create(0x5, &(0x7f0000000200)={0x0, 0x3d, 0x2, @tid=r3}, &(0x7f0000000240)) [ 890.736646] ceph: No mds server is up or the cluster is laggy [ 890.773797] libceph: connect [d::]:6789 error -101 [ 890.779170] libceph: mon0 [d::]:6789 connect error [ 890.784790] libceph: connect [d::]:6789 error -101 [ 890.794550] libceph: mon0 [d::]:6789 connect error [ 890.862362] libceph: connect [d::]:6789 error -101 [ 890.867400] libceph: mon0 [d::]:6789 connect error [ 890.882505] libceph: connect [d::]:6789 error -101 [ 890.888962] libceph: mon0 [d::]:6789 connect error [ 890.998223] libceph: connect [d::]:6789 error -101 [ 891.003502] libceph: mon0 [d::]:6789 connect error [ 891.042410] libceph: connect [::6]:6789 error -101 [ 891.047428] libceph: mon1 [::6]:6789 connect error 02:46:47 executing program 0: open(&(0x7f0000000440)='./file0\x00', 0x110000141042, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f00000011c0)=0x0) clock_gettime(0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000, 0x0, 0x0, 0x0, 0x3}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, &(0x7f0000000000)) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="5b643a3a5d2c303a3a363a2f60158dcdfd966461a178dd7ebe46bf0c3115843850853060a755488f2ce8d22af1a6ca9289a950"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) futex(&(0x7f0000000340)=0x1, 0x4, 0x1, &(0x7f0000000400), &(0x7f0000000480)=0x1, 0x0) pselect6(0x40, &(0x7f0000000140)={0x2, 0x101, 0xdb0, 0x3f, 0x80000000, 0x0, 0x81, 0x791b}, &(0x7f00000001c0)={0x1, 0x101, 0x9, 0xff, 0xff, 0x3, 0x3, 0x3}, 0x0, &(0x7f0000000280), &(0x7f0000000300)={&(0x7f00000002c0)={[0x5]}, 0x8}) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) timer_create(0x5, &(0x7f0000000200)={0x0, 0x3d, 0x2, @tid=r3}, &(0x7f0000000240)) [ 891.100390] ceph: No mds server is up or the cluster is laggy 02:46:47 executing program 1: ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) syz_open_dev$sndctrl(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r0, 0x12) ptrace(0x4208, r0) [ 891.265188] ceph: No mds server is up or the cluster is laggy [ 891.339604] ceph: No mds server is up or the cluster is laggy 02:46:47 executing program 1: ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) syz_open_dev$sndctrl(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r0, 0x12) ptrace(0x4208, r0) 02:46:47 executing program 4: ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) syz_open_dev$sndctrl(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r0, 0x12) ptrace(0x4208, r0) 02:46:47 executing program 4: ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) syz_open_dev$sndctrl(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r0, 0x12) ptrace(0x4208, r0) [ 891.586442] ceph: No mds server is up or the cluster is laggy [ 891.625516] ceph: No mds server is up or the cluster is laggy 02:46:47 executing program 5: open(&(0x7f0000000440)='./file0\x00', 0x110000141042, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f00000011c0)=0x0) clock_gettime(0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000, 0x0, 0x0, 0x0, 0x3}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, &(0x7f0000000000)) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="5b643a3a5d2c303a3a363a2f60158dcdfd966461a178dd7ebe46bf0c3115843850853060a755488f2ce8d22af1a6ca9289a950"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) futex(&(0x7f0000000340)=0x1, 0x4, 0x1, &(0x7f0000000400), &(0x7f0000000480)=0x1, 0x0) pselect6(0x40, &(0x7f0000000140)={0x2, 0x101, 0xdb0, 0x3f, 0x80000000, 0x0, 0x81, 0x791b}, &(0x7f00000001c0)={0x1, 0x101, 0x9, 0xff, 0xff, 0x3, 0x3, 0x3}, 0x0, &(0x7f0000000280), &(0x7f0000000300)={&(0x7f00000002c0)={[0x5]}, 0x8}) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) timer_create(0x5, &(0x7f0000000200)={0x0, 0x3d, 0x2, @tid=r3}, &(0x7f0000000240)) 02:46:47 executing program 1: ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) syz_open_dev$sndctrl(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r0, 0x12) ptrace(0x4208, r0) 02:46:47 executing program 2: open(&(0x7f0000000440)='./file0\x00', 0x110000141042, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f00000011c0)=0x0) clock_gettime(0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000, 0x0, 0x0, 0x0, 0x3}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, &(0x7f0000000000)) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="5b643a3a5d2c303a3a363a2f60158dcdfd966461a178dd7ebe46bf0c3115843850853060a755488f2ce8d22af1a6ca9289a950"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) futex(&(0x7f0000000340)=0x1, 0x4, 0x1, &(0x7f0000000400), &(0x7f0000000480)=0x1, 0x0) pselect6(0x40, &(0x7f0000000140)={0x2, 0x101, 0xdb0, 0x3f, 0x80000000, 0x0, 0x81, 0x791b}, &(0x7f00000001c0)={0x1, 0x101, 0x9, 0xff, 0xff, 0x3, 0x3, 0x3}, 0x0, &(0x7f0000000280), &(0x7f0000000300)={&(0x7f00000002c0)={[0x5]}, 0x8}) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) timer_create(0x5, &(0x7f0000000200)={0x0, 0x3d, 0x2, @tid=r3}, &(0x7f0000000240)) 02:46:47 executing program 3: open(&(0x7f0000000440)='./file0\x00', 0x110000141042, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f00000011c0)=0x0) clock_gettime(0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000, 0x0, 0x0, 0x0, 0x3}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, &(0x7f0000000000)) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="5b643a3a5d2c303a3a363a2f60158dcdfd966461a178dd7ebe46bf0c3115843850853060a755488f2ce8d22af1a6ca9289a950"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) futex(&(0x7f0000000340)=0x1, 0x4, 0x1, &(0x7f0000000400), &(0x7f0000000480)=0x1, 0x0) pselect6(0x40, &(0x7f0000000140)={0x2, 0x101, 0xdb0, 0x3f, 0x80000000, 0x0, 0x81, 0x791b}, &(0x7f00000001c0)={0x1, 0x101, 0x9, 0xff, 0xff, 0x3, 0x3, 0x3}, 0x0, &(0x7f0000000280), &(0x7f0000000300)={&(0x7f00000002c0)={[0x5]}, 0x8}) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) timer_create(0x5, &(0x7f0000000200)={0x0, 0x3d, 0x2, @tid=r3}, &(0x7f0000000240)) [ 891.720347] ceph: No mds server is up or the cluster is laggy 02:46:47 executing program 4: ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) syz_open_dev$sndctrl(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r0, 0x12) ptrace(0x4208, r0) 02:46:48 executing program 1: ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) syz_open_dev$sndctrl(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r0, 0x12) ptrace(0x4208, r0) [ 891.964768] libceph: connect [d::]:6789 error -101 [ 891.970143] libceph: mon0 [d::]:6789 connect error [ 892.009104] libceph: connect [d::]:6789 error -101 [ 892.048382] libceph: mon0 [d::]:6789 connect error 02:46:48 executing program 4: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macvtap0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000080)) [ 892.114311] ceph: No mds server is up or the cluster is laggy 02:46:48 executing program 0: open(&(0x7f0000000440)='./file0\x00', 0x110000141042, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f00000011c0)=0x0) clock_gettime(0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000, 0x0, 0x0, 0x0, 0x3}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, &(0x7f0000000000)) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="5b643a3a5d2c303a3a363a2f60158dcdfd966461a178dd7ebe46bf0c3115843850853060a755488f2ce8d22af1a6ca9289a950"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) futex(&(0x7f0000000340)=0x1, 0x4, 0x1, &(0x7f0000000400), &(0x7f0000000480)=0x1, 0x0) pselect6(0x40, &(0x7f0000000140)={0x2, 0x101, 0xdb0, 0x3f, 0x80000000, 0x0, 0x81, 0x791b}, &(0x7f00000001c0)={0x1, 0x101, 0x9, 0xff, 0xff, 0x3, 0x3, 0x3}, 0x0, &(0x7f0000000280), &(0x7f0000000300)={&(0x7f00000002c0)={[0x5]}, 0x8}) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) timer_create(0x5, &(0x7f0000000200)={0x0, 0x3d, 0x2, @tid=r3}, &(0x7f0000000240)) [ 892.169187] libceph: connect [d::]:6789 error -101 [ 892.174256] libceph: mon0 [d::]:6789 connect error [ 892.212885] libceph: connect [d::]:6789 error -101 [ 892.225577] libceph: mon0 [d::]:6789 connect error 02:46:48 executing program 1: ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) syz_open_dev$sndctrl(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r0, 0x12) ptrace(0x4208, r0) [ 892.266344] device veth0_macvtap left promiscuous mode [ 892.532626] libceph: connect [d::]:6789 error -101 [ 892.538172] libceph: mon0 [d::]:6789 connect error [ 892.570156] libceph: connect [d::]:6789 error -101 02:46:48 executing program 1: ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) syz_open_dev$sndctrl(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) tkill(r0, 0x12) ptrace(0x4208, r0) [ 892.606182] libceph: mon0 [d::]:6789 connect error [ 892.945733] ceph: No mds server is up or the cluster is laggy [ 892.985173] ceph: No mds server is up or the cluster is laggy 02:46:49 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, &(0x7f0000000680)='&@[\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000003c0)='&@[\x00') socketpair(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xa) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8922, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc87,\x00\xd2\x97C\x00\x00\x00') openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x3) write$cgroup_int(r1, &(0x7f0000000180), 0x12) [ 893.028454] libceph: connect [d::]:6789 error -101 [ 893.033510] libceph: mon0 [d::]:6789 connect error 02:46:49 executing program 5: r0 = syz_open_dev$radio(&(0x7f0000000040), 0x0, 0x2) ioctl$VIDIOC_G_FREQUENCY(r0, 0xc02c5638, &(0x7f0000000080)={0x3}) 02:46:49 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) write$bt_hci(r0, &(0x7f0000000080)={0x1, @le_accept_cis={{0x2066, 0x2}}}, 0x6) [ 893.160019] ceph: No mds server is up or the cluster is laggy 02:46:49 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) write$bt_hci(r0, &(0x7f0000000080)={0x1, @le_accept_cis={{0x2066, 0x2}}}, 0x6) 02:46:49 executing program 2: open(&(0x7f0000000440)='./file0\x00', 0x110000141042, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f00000011c0)=0x0) clock_gettime(0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000, 0x0, 0x0, 0x0, 0x3}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, &(0x7f0000000000)) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="5b643a3a5d2c303a3a363a2f60158dcdfd966461a178dd7ebe46bf0c3115843850853060a755488f2ce8d22af1a6ca9289a950"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) futex(&(0x7f0000000340)=0x1, 0x4, 0x1, &(0x7f0000000400), &(0x7f0000000480)=0x1, 0x0) pselect6(0x40, &(0x7f0000000140)={0x2, 0x101, 0xdb0, 0x3f, 0x80000000, 0x0, 0x81, 0x791b}, &(0x7f00000001c0)={0x1, 0x101, 0x9, 0xff, 0xff, 0x3, 0x3, 0x3}, 0x0, &(0x7f0000000280), &(0x7f0000000300)={&(0x7f00000002c0)={[0x5]}, 0x8}) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) timer_create(0x5, &(0x7f0000000200)={0x0, 0x3d, 0x2, @tid=r3}, &(0x7f0000000240)) 02:46:49 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) write$bt_hci(r0, &(0x7f0000000080)={0x1, @le_accept_cis={{0x2066, 0x2}}}, 0x6) 02:46:49 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) write$bt_hci(r0, &(0x7f0000000080)={0x1, @le_accept_cis={{0x2066, 0x2}}}, 0x6) 02:46:49 executing program 0: open(&(0x7f0000000440)='./file0\x00', 0x110000141042, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f00000003c0)={{}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, &(0x7f00000011c0)=0x0) clock_gettime(0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000, 0x0, 0x0, 0x0, 0x3}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, &(0x7f0000000000)) timer_settime(r0, 0x0, &(0x7f0000000180)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="5b643a3a5d2c303a3a363a2f60158dcdfd966461a178dd7ebe46bf0c3115843850853060a755488f2ce8d22af1a6ca9289a950"], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='ceph\x00', 0x0, 0x0) futex(&(0x7f0000000340)=0x1, 0x4, 0x1, &(0x7f0000000400), &(0x7f0000000480)=0x1, 0x0) pselect6(0x40, &(0x7f0000000140)={0x2, 0x101, 0xdb0, 0x3f, 0x80000000, 0x0, 0x81, 0x791b}, &(0x7f00000001c0)={0x1, 0x101, 0x9, 0xff, 0xff, 0x3, 0x3, 0x3}, 0x0, &(0x7f0000000280), &(0x7f0000000300)={&(0x7f00000002c0)={[0x5]}, 0x8}) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) timer_create(0x5, &(0x7f0000000200)={0x0, 0x3d, 0x2, @tid=r3}, &(0x7f0000000240)) [ 893.352251] ceph: No mds server is up or the cluster is laggy 02:46:49 executing program 4: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macvtap0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000080)) 02:46:49 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) write$bt_hci(r0, &(0x7f0000000080)={0x1, @le_accept_cis={{0x2066, 0x2}}}, 0x6) 02:46:49 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) write$bt_hci(r0, &(0x7f0000000080)={0x1, @le_accept_cis={{0x2066, 0x2}}}, 0x6) 02:46:49 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, &(0x7f0000000680)='&@[\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000003c0)='&@[\x00') socketpair(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xa) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8922, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc87,\x00\xd2\x97C\x00\x00\x00') openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x3) write$cgroup_int(r1, &(0x7f0000000180), 0x12) 02:46:49 executing program 4: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macvtap0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000080)) 02:46:49 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) write$bt_hci(r0, &(0x7f0000000080)={0x1, @le_accept_cis={{0x2066, 0x2}}}, 0x6) 02:46:49 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, &(0x7f0000000680)='&@[\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000003c0)='&@[\x00') socketpair(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xa) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8922, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc87,\x00\xd2\x97C\x00\x00\x00') openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x3) write$cgroup_int(r1, &(0x7f0000000180), 0x12) 02:46:49 executing program 5: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x5) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x14) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x5) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x14) dup3(r1, r0, 0x0) 02:46:50 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, &(0x7f0000000680)='&@[\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000003c0)='&@[\x00') socketpair(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xa) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8922, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc87,\x00\xd2\x97C\x00\x00\x00') openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x3) write$cgroup_int(r1, &(0x7f0000000180), 0x12) 02:46:50 executing program 4: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macvtap0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000080)) 02:46:50 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, &(0x7f0000000680)='&@[\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000003c0)='&@[\x00') socketpair(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xa) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8922, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc87,\x00\xd2\x97C\x00\x00\x00') openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x3) write$cgroup_int(r1, &(0x7f0000000180), 0x12) [ 894.188585] ceph: No mds server is up or the cluster is laggy 02:46:50 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, &(0x7f0000000680)='&@[\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000003c0)='&@[\x00') socketpair(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xa) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8922, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc87,\x00\xd2\x97C\x00\x00\x00') openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x3) write$cgroup_int(r1, &(0x7f0000000180), 0x12) 02:46:50 executing program 5: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x5) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x14) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x5) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x14) dup3(r1, r0, 0x0) 02:46:50 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x5) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x14) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x5) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x14) dup3(r1, r0, 0x0) 02:46:50 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a1, &(0x7f0000000680)='&@[\x00') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='memory.max\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000003c0)='&@[\x00') socketpair(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xa) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8922, &(0x7f0000000040)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc87,\x00\xd2\x97C\x00\x00\x00') openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x3) write$cgroup_int(r1, &(0x7f0000000180), 0x12) 02:46:50 executing program 4: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x5) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x14) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x5) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x14) dup3(r1, r0, 0x0) 02:46:50 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@private, @in6=@local, 0x0, 0x6, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x0, 0x32}, 0x0, @in6=@ipv4={'\x00', '\xff\xff', @remote}}}, 0xe8) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x7}, 0x1c) [ 894.366604] ceph: No mds server is up or the cluster is laggy 02:46:50 executing program 4: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x5) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x14) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x5) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x14) dup3(r1, r0, 0x0) 02:46:50 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@private, @in6=@local, 0x0, 0x6, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x0, 0x32}, 0x0, @in6=@ipv4={'\x00', '\xff\xff', @remote}}}, 0xe8) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x7}, 0x1c) 02:46:50 executing program 5: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x5) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x14) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x5) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x14) dup3(r1, r0, 0x0) 02:46:50 executing program 4: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x5) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x14) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x5) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x14) dup3(r1, r0, 0x0) 02:46:50 executing program 5: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x5) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x14) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x5) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x14) dup3(r1, r0, 0x0) 02:46:50 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x5) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x14) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x5) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x14) dup3(r1, r0, 0x0) 02:46:50 executing program 2: r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r0, 0x402, 0x5) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x14) r2 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x5) r3 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r3, 0x402, 0x14) dup3(r1, r0, 0x0) 02:46:50 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@private, @in6=@local, 0x0, 0x6, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x0, 0x32}, 0x0, @in6=@ipv4={'\x00', '\xff\xff', @remote}}}, 0xe8) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x7}, 0x1c) 02:46:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET={0x18, 0x2, 0x0, 0x1, {0x7, 0x1, 0x0, 0x1, [{0x8}, {0x8}]}}]}]}, 0x3c}}, 0x0) 02:46:50 executing program 4: r0 = socket(0x2, 0x6, 0x0) bind$unix(r0, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e) 02:46:50 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x38}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60932b1c00142b00fe80000000000000000000c943c38d1ebe87459ce800000000bbfe8000000000000000000000000000aa0000003a", @ANYRES32=0x41424344, @ANYRES64=r0], 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/204, 0xcc}, {&(0x7f0000000780)=""/251, 0xfb}], 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r2, 0x5414, &(0x7f0000000000)=0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_debug_messages', 0x288401, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0x14e6}}, './file0\x00'}) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f00000000c0)={0x5, 0x9, 0x135, 0xffffffff, 0x0, "1db8a98d1924fa2471f348b7c0214bbaf41102", 0x51, 0x9}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x4) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r6, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}, 0x0, {[0x0, 0x0, 0x0, 0x200000, 0x2]}}, 0x5c) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000000)=0x20, 0x4) r7 = fcntl$dupfd(r6, 0x406, r6) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000080), 0x10) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f0000000280)={&(0x7f0000000000)={0x1d, r10}, 0x10, &(0x7f0000000200)={&(0x7f00000002c0)={0x2, 0x11, 0x0, {0x0, 0x2710}, {}, {}, 0x300, @can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "e428269dbde6b9b1"}}, 0x48}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) setsockopt$MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000040)={0x0, 0x0, 0x7f, r10, 0x1}, 0xc) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x1e8, 0x9403, 0x0, 0x0, 0x2c0, 0x2d8, 0x3d8, 0x3d8, 0x2d8, 0x3d8, 0x3, 0x0, {[{{@ipv6={@remote, @local, [0xffffffff, 0xff, 0xffffff00, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], 'erspan0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x2f, 0x3, 0x1, 0x7f}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@dscp={{0x28}, {0x9, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x8, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x11000, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x88001, 0x0) 02:46:50 executing program 5: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x2000, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0) sendmsg$inet(r2, &(0x7f0000000680)={&(0x7f0000000480)={0x2, 0x4e20, @loopback}, 0x10, 0x0}, 0xc000) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="0338613e541540a2f4f2a082fe504227d165b3b726547d6333cb1581b224fb9350b8bd81b262cb727143aebd767bc6110f9442e05524d10c8e569039b323a83891665291bad6f1e09410a74aff9824f850ac1f03372687b76a041f19f7bd618863ec5898e455c9dc319ec2d553e23b7030285b39250d3c3b36b29c3c516b773a7084578ba1203ca96b031cf6aaa123ef810026112d4d7bf2651b2c77b2ca02e5e8685f49ad01720637e60f222b5ef1d1c088642b4400069716a1c04a", 0xbc, 0x800, &(0x7f0000000100)={0xa, 0x4e21, 0x6, @private2={0xfc, 0x2, '\x00', 0x1}, 0xfff}, 0x1c) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x1c}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_ext={0x1c, 0x4, &(0x7f0000000880)=ANY=[@ANYBLOB="182b0000", @ANYRES32, @ANYBLOB="00000000030000002434000104000000000a400200000000"], &(0x7f00000008c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000a00)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000a40)={0x5, 0xc, 0x8000, 0x7f}, 0x10, 0xbeaf, r2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x10) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0xfff7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shutdown(r1, 0x2) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, &(0x7f0000000140)) pipe2$watch_queue(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000240)=ANY=[@ANYBLOB="01000000010008747b223f00", @ANYRES32=r0]) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xbaf, 0x88, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3ff, 0x4, @perf_bp={&(0x7f0000000340), 0x6}, 0x48824, 0x3ff, 0x0, 0x8, 0x2, 0x0, 0x0, 0x0, 0x6, 0x0, 0xfffffffffffff800}, 0x0, 0x6, r0, 0x2) open(&(0x7f0000000040)='./bus\x00', 0x1410c2, 0x0) 02:46:50 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2f) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@private, @in6=@local, 0x0, 0x6, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@broadcast, 0x0, 0x32}, 0x0, @in6=@ipv4={'\x00', '\xff\xff', @remote}}}, 0xe8) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x7}, 0x1c) 02:46:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET={0x18, 0x2, 0x0, 0x1, {0x7, 0x1, 0x0, 0x1, [{0x8}, {0x8}]}}]}]}, 0x3c}}, 0x0) 02:46:50 executing program 4: r0 = socket(0x2, 0x6, 0x0) bind$unix(r0, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e) 02:46:50 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21}}, 0x24) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x62, &(0x7f0000000180)=""/98}, &(0x7f0000000240), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000000)={0x2, 0x0, 0x0, "fd0a"}) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000300)={0x53, 0x0, 0x69, 0x0, @scatter={0x3, 0x0, &(0x7f0000000440)=[{&(0x7f0000000380)=""/169, 0xa9}, {0x0}, {&(0x7f00000002c0)=""/52, 0x34}]}, &(0x7f0000000080)="9f9e6eb304d5f821a9be1f0aa017a2572aefda0b61d98cfcf3d075377bbb83364827d8fdbc1630fd7f79eb88f4589a55e51c3de0a2b0e6c2f73e1c7505da6b1947334be95df2afb0a383dc82e67431dbe93e7a10a10162575c9a711619192d9c149557988b74ff0322", 0x0, 0x4, 0x0, 0x0, 0x0}) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000000)={0x2, 0x0, 0xead, "fd0a"}) syz_mount_image$romfs(0x0, &(0x7f0000002e00)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000005780)={{{@in6=@mcast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@empty}}, &(0x7f0000005880)=0xe8) r2 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)={0x28, r3, 0x2f4b41cae783dc41, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}]}, 0x28}}, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f0000000040)={0x6, 'dvmrp0\x00', {0x5}, 0x5}) 02:46:50 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET={0x18, 0x2, 0x0, 0x1, {0x7, 0x1, 0x0, 0x1, [{0x8}, {0x8}]}}]}]}, 0x3c}}, 0x0) 02:46:50 executing program 4: r0 = socket(0x2, 0x6, 0x0) bind$unix(r0, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e) 02:46:50 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="050000000000000000002e00000008000300", @ANYRES32=r2, @ANYBLOB="0a00340002020202020200000a000600080211000000000008003500000099"], 0x44}}, 0x0) [ 894.840562] sd 0:0:1:0: [sg0] tag#5748 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 894.849396] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables [ 894.849628] xt_CT: You must specify a L4 protocol and not use inversions on it [ 894.858982] sd 0:0:1:0: [sg0] tag#5748 CDB: Service action out(16), sa=0x1e [ 894.874579] sd 0:0:1:0: [sg0] tag#5748 CDB[00]: 9f 9e 6e b3 04 d5 f8 21 a9 be 1f 0a a0 17 a2 57 02:46:51 executing program 4: r0 = socket(0x2, 0x6, 0x0) bind$unix(r0, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e) [ 894.883943] sd 0:0:1:0: [sg0] tag#5748 CDB[10]: 2a ef da 0b 61 d9 8c fc f3 d0 75 37 7b bb 83 36 [ 894.893679] sd 0:0:1:0: [sg0] tag#5748 CDB[20]: 48 27 d8 fd bc 16 30 fd 7f 79 eb 88 f4 58 9a 55 02:46:51 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=@newlink={0x3c, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_AF_SPEC={0x1c, 0x1a, 0x0, 0x1, [@AF_INET={0x18, 0x2, 0x0, 0x1, {0x7, 0x1, 0x0, 0x1, [{0x8}, {0x8}]}}]}]}, 0x3c}}, 0x0) [ 894.943955] sd 0:0:1:0: [sg0] tag#5748 CDB[30]: e5 1c 3d e0 a2 b0 e6 c2 f7 3e 1c 75 05 da 6b 19 [ 894.953658] sd 0:0:1:0: [sg0] tag#5748 CDB[40]: 47 33 4b e9 5d f2 af b0 a3 83 dc 82 e6 74 31 db [ 894.962990] sd 0:0:1:0: [sg0] tag#5748 CDB[50]: e9 3e 7a 10 a1 01 62 57 5c 9a 71 16 19 19 2d 9c [ 894.972957] sd 0:0:1:0: [sg0] tag#5748 CDB[60]: 14 95 57 98 8b 74 ff 03 22 [ 894.983302] nla_parse: 4 callbacks suppressed 02:46:51 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x400000000001, 0x84) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r3 = accept$alg(r2, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000280)=ANY=[], 0xffffffef) recvmmsg(r3, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/89, 0x59}, {&(0x7f0000000140)=""/72, 0x20000188}], 0x2}}], 0x2, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r4, 0x541d, &(0x7f0000000000)={0x2, {0x3, 0x0, 0x0, 0x400}}) bind$alg(r2, &(0x7f0000000280)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha384\x00'}, 0x58) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, &(0x7f0000000080)) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x2, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}}, 0x40) socket$inet_tcp(0x2, 0x1, 0x0) r6 = perf_event_open(&(0x7f0000002440)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = dup3(0xffffffffffffffff, r6, 0x80000) read$FUSE(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000300)) mkdirat$cgroup(r7, &(0x7f0000000140)='syz0\x00', 0x1ff) read$FUSE(r7, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x10, r7, &(0x7f0000000000)='./file0\x00') r8 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) mkdirat$cgroup(r8, &(0x7f0000000140)='syz0\x00', 0x1ff) read$FUSE(r8, 0x0, 0x0) openat$cgroup_ro(r8, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) [ 894.983312] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 02:46:51 executing program 5: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x2000, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0) sendmsg$inet(r2, &(0x7f0000000680)={&(0x7f0000000480)={0x2, 0x4e20, @loopback}, 0x10, 0x0}, 0xc000) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="0338613e541540a2f4f2a082fe504227d165b3b726547d6333cb1581b224fb9350b8bd81b262cb727143aebd767bc6110f9442e05524d10c8e569039b323a83891665291bad6f1e09410a74aff9824f850ac1f03372687b76a041f19f7bd618863ec5898e455c9dc319ec2d553e23b7030285b39250d3c3b36b29c3c516b773a7084578ba1203ca96b031cf6aaa123ef810026112d4d7bf2651b2c77b2ca02e5e8685f49ad01720637e60f222b5ef1d1c088642b4400069716a1c04a", 0xbc, 0x800, &(0x7f0000000100)={0xa, 0x4e21, 0x6, @private2={0xfc, 0x2, '\x00', 0x1}, 0xfff}, 0x1c) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x1c}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_ext={0x1c, 0x4, &(0x7f0000000880)=ANY=[@ANYBLOB="182b0000", @ANYRES32, @ANYBLOB="00000000030000002434000104000000000a400200000000"], &(0x7f00000008c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000a00)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000a40)={0x5, 0xc, 0x8000, 0x7f}, 0x10, 0xbeaf, r2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x10) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0xfff7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shutdown(r1, 0x2) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, &(0x7f0000000140)) pipe2$watch_queue(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000240)=ANY=[@ANYBLOB="01000000010008747b223f00", @ANYRES32=r0]) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xbaf, 0x88, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3ff, 0x4, @perf_bp={&(0x7f0000000340), 0x6}, 0x48824, 0x3ff, 0x0, 0x8, 0x2, 0x0, 0x0, 0x0, 0x6, 0x0, 0xfffffffffffff800}, 0x0, 0x6, r0, 0x2) open(&(0x7f0000000040)='./bus\x00', 0x1410c2, 0x0) 02:46:51 executing program 1: write$binfmt_script(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="2321202e2f66696c65302073797a0a2500363ccff96ffbb1a15acc111fe6a5a0dcdb9040647b52e5720e9e2bf61bb087f5015b8bbc452f021c2e299de43e669db3a9485775ae6375452ac6810aa81fa8c4332f02f2250a82cd87fc723a125df02a2b97710843694ab6460fe7f51d146afd45185abea173b2984ffeacca2cd984f8ce7e600d760d9b2ea73400"/150], 0x4a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x4) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, 0x0, 0x40) r2 = dup3(r1, r0, 0x0) sendmsg$NL80211_CMD_SET_BEACON(r2, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x4008014) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r3, 0x401870c8, &(0x7f0000000040)={0xf18}) keyctl$set_reqkey_keyring(0xe, 0x1) r4 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r4, 0x2e, 0xce, 0x53c132ef) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) r5 = socket(0x1, 0x3, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newlink={0x90, 0x10, 0x401, 0x70bd27, 0x25dfdbfa, {0x0, 0x0, 0x0, 0x0, 0x0, 0x184a0}, [@IFLA_LINKINFO={0x68, 0x12, 0x0, 0x1, @ip6erspan={{0xe}, {0x54, 0x2, 0x0, 0x1, [@IFLA_GRE_ERSPAN_INDEX={0x8, 0x15, 0x82605}, @IFLA_GRE_ENCAP_FLAGS={0x6, 0xf, 0x2}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_FLOWINFO={0x8, 0xc, 0x9}, @IFLA_GRE_ERSPAN_VER={0x5, 0x16, 0x1}, @IFLA_GRE_ERSPAN_INDEX={0x8, 0x15, 0x9bde8}, @IFLA_GRE_ERSPAN_DIR={0x5}, @IFLA_GRE_LOCAL={0x14, 0x6, @loopback}, @IFLA_GRE_ERSPAN_HWID={0x6, 0x18, 0x80}]}}}, @IFLA_MASTER={0x8, 0x3, r6}]}, 0x90}}, 0x20009000) 02:46:51 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21}}, 0x24) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x62, &(0x7f0000000180)=""/98}, &(0x7f0000000240), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000000)={0x2, 0x0, 0x0, "fd0a"}) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000300)={0x53, 0x0, 0x69, 0x0, @scatter={0x3, 0x0, &(0x7f0000000440)=[{&(0x7f0000000380)=""/169, 0xa9}, {0x0}, {&(0x7f00000002c0)=""/52, 0x34}]}, &(0x7f0000000080)="9f9e6eb304d5f821a9be1f0aa017a2572aefda0b61d98cfcf3d075377bbb83364827d8fdbc1630fd7f79eb88f4589a55e51c3de0a2b0e6c2f73e1c7505da6b1947334be95df2afb0a383dc82e67431dbe93e7a10a10162575c9a711619192d9c149557988b74ff0322", 0x0, 0x4, 0x0, 0x0, 0x0}) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000000)={0x2, 0x0, 0xead, "fd0a"}) syz_mount_image$romfs(0x0, &(0x7f0000002e00)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000005780)={{{@in6=@mcast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@empty}}, &(0x7f0000005880)=0xe8) r2 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)={0x28, r3, 0x2f4b41cae783dc41, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}]}, 0x28}}, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f0000000040)={0x6, 'dvmrp0\x00', {0x5}, 0x5}) 02:46:51 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x38}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60932b1c00142b00fe80000000000000000000c943c38d1ebe87459ce800000000bbfe8000000000000000000000000000aa0000003a", @ANYRES32=0x41424344, @ANYRES64=r0], 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/204, 0xcc}, {&(0x7f0000000780)=""/251, 0xfb}], 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r2, 0x5414, &(0x7f0000000000)=0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_debug_messages', 0x288401, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0x14e6}}, './file0\x00'}) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f00000000c0)={0x5, 0x9, 0x135, 0xffffffff, 0x0, "1db8a98d1924fa2471f348b7c0214bbaf41102", 0x51, 0x9}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x4) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r6, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}, 0x0, {[0x0, 0x0, 0x0, 0x200000, 0x2]}}, 0x5c) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000000)=0x20, 0x4) r7 = fcntl$dupfd(r6, 0x406, r6) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000080), 0x10) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f0000000280)={&(0x7f0000000000)={0x1d, r10}, 0x10, &(0x7f0000000200)={&(0x7f00000002c0)={0x2, 0x11, 0x0, {0x0, 0x2710}, {}, {}, 0x300, @can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "e428269dbde6b9b1"}}, 0x48}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) setsockopt$MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000040)={0x0, 0x0, 0x7f, r10, 0x1}, 0xc) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x1e8, 0x9403, 0x0, 0x0, 0x2c0, 0x2d8, 0x3d8, 0x3d8, 0x2d8, 0x3d8, 0x3, 0x0, {[{{@ipv6={@remote, @local, [0xffffffff, 0xff, 0xffffff00, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], 'erspan0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x2f, 0x3, 0x1, 0x7f}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@dscp={{0x28}, {0x9, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x8, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x11000, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x88001, 0x0) 02:46:51 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="050000000000000000002e00000008000300", @ANYRES32=r2, @ANYBLOB="0a00340002020202020200000a000600080211000000000008003500000099"], 0x44}}, 0x0) [ 895.235417] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 895.260559] sd 0:0:1:0: [sg0] tag#5748 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 895.270754] sd 0:0:1:0: [sg0] tag#5748 CDB: Service action out(16), sa=0x1e [ 895.278759] sd 0:0:1:0: [sg0] tag#5748 CDB[00]: 9f 9e 6e b3 04 d5 f8 21 a9 be 1f 0a a0 17 a2 57 [ 895.288820] sd 0:0:1:0: [sg0] tag#5748 CDB[10]: 2a ef da 0b 61 d9 8c fc f3 d0 75 37 7b bb 83 36 [ 895.302069] sd 0:0:1:0: [sg0] tag#5748 CDB[20]: 48 27 d8 fd bc 16 30 fd 7f 79 eb 88 f4 58 9a 55 [ 895.373743] sd 0:0:1:0: [sg0] tag#5748 CDB[30]: e5 1c 3d e0 a2 b0 e6 c2 f7 3e 1c 75 05 da 6b 19 [ 895.383200] sd 0:0:1:0: [sg0] tag#5748 CDB[40]: 47 33 4b e9 5d f2 af b0 a3 83 dc 82 e6 74 31 db [ 895.393860] sd 0:0:1:0: [sg0] tag#5748 CDB[50]: e9 3e 7a 10 a1 01 62 57 5c 9a 71 16 19 19 2d 9c [ 895.403703] sd 0:0:1:0: [sg0] tag#5748 CDB[60]: 14 95 57 98 8b 74 ff 03 22 [ 895.619269] xt_CT: You must specify a L4 protocol and not use inversions on it 02:46:51 executing program 5: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x2000, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0) sendmsg$inet(r2, &(0x7f0000000680)={&(0x7f0000000480)={0x2, 0x4e20, @loopback}, 0x10, 0x0}, 0xc000) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="0338613e541540a2f4f2a082fe504227d165b3b726547d6333cb1581b224fb9350b8bd81b262cb727143aebd767bc6110f9442e05524d10c8e569039b323a83891665291bad6f1e09410a74aff9824f850ac1f03372687b76a041f19f7bd618863ec5898e455c9dc319ec2d553e23b7030285b39250d3c3b36b29c3c516b773a7084578ba1203ca96b031cf6aaa123ef810026112d4d7bf2651b2c77b2ca02e5e8685f49ad01720637e60f222b5ef1d1c088642b4400069716a1c04a", 0xbc, 0x800, &(0x7f0000000100)={0xa, 0x4e21, 0x6, @private2={0xfc, 0x2, '\x00', 0x1}, 0xfff}, 0x1c) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x1c}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_ext={0x1c, 0x4, &(0x7f0000000880)=ANY=[@ANYBLOB="182b0000", @ANYRES32, @ANYBLOB="00000000030000002434000104000000000a400200000000"], &(0x7f00000008c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000a00)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000a40)={0x5, 0xc, 0x8000, 0x7f}, 0x10, 0xbeaf, r2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x10) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0xfff7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shutdown(r1, 0x2) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, &(0x7f0000000140)) pipe2$watch_queue(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000240)=ANY=[@ANYBLOB="01000000010008747b223f00", @ANYRES32=r0]) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xbaf, 0x88, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3ff, 0x4, @perf_bp={&(0x7f0000000340), 0x6}, 0x48824, 0x3ff, 0x0, 0x8, 0x2, 0x0, 0x0, 0x0, 0x6, 0x0, 0xfffffffffffff800}, 0x0, 0x6, r0, 0x2) open(&(0x7f0000000040)='./bus\x00', 0x1410c2, 0x0) 02:46:51 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="380000000d0601040000000000000000000000000500010006000000050005000300000012000300686173683a6e65742c706f72740000004f9fd5a2f4179f8da014cb3666c33ef83874469e971a5e4b874cc862604839043936da70eb12e4cec1621ac38abec2e4192e471edb0f6e181e30f12e48f92197521399cda241c8750e229d3655fa022d50b2c9ba03b1792318054d45a5d3fd662a067f89bae78c01b236f38e3ac4cacd6b76e3a78eb8a7a021c4489f285074b458f9ea4a564c453f417696b81ea3b8f1d4d7277dc24ac113c91ea096e05ec5a4996648fb5886dfd109754ab1df27cbe3b2a3140964ff3cb712347c774d7da8bd9de9a7c963c1aae45f6807f0dfd43955b596c182181ae7"], 0x38}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60932b1c00142b00fe80000000000000000000c943c38d1ebe87459ce800000000bbfe8000000000000000000000000000aa0000003a", @ANYRES32=0x41424344, @ANYRES64=r0], 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/204, 0xcc}, {&(0x7f0000000780)=""/251, 0xfb}], 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r2, 0x5414, &(0x7f0000000000)=0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_debug_messages', 0x288401, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0x14e6}}, './file0\x00'}) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f00000000c0)={0x5, 0x9, 0x135, 0xffffffff, 0x0, "1db8a98d1924fa2471f348b7c0214bbaf41102", 0x51, 0x9}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x4) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r6, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}, 0x0, {[0x0, 0x0, 0x0, 0x200000, 0x2]}}, 0x5c) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000000)=0x20, 0x4) r7 = fcntl$dupfd(r6, 0x406, r6) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000080), 0x10) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f0000000280)={&(0x7f0000000000)={0x1d, r10}, 0x10, &(0x7f0000000200)={&(0x7f00000002c0)={0x2, 0x11, 0x0, {0x0, 0x2710}, {}, {}, 0x300, @can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "e428269dbde6b9b1"}}, 0x48}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) setsockopt$MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000040)={0x0, 0x0, 0x7f, r10, 0x1}, 0xc) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x1e8, 0x9403, 0x0, 0x0, 0x2c0, 0x2d8, 0x3d8, 0x3d8, 0x2d8, 0x3d8, 0x3, 0x0, {[{{@ipv6={@remote, @local, [0xffffffff, 0xff, 0xffffff00, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], 'erspan0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x2f, 0x3, 0x1, 0x7f}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@dscp={{0x28}, {0x9, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x8, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x11000, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x88001, 0x0) 02:46:51 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21}}, 0x24) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x62, &(0x7f0000000180)=""/98}, &(0x7f0000000240), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000000)={0x2, 0x0, 0x0, "fd0a"}) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000300)={0x53, 0x0, 0x69, 0x0, @scatter={0x3, 0x0, &(0x7f0000000440)=[{&(0x7f0000000380)=""/169, 0xa9}, {0x0}, {&(0x7f00000002c0)=""/52, 0x34}]}, &(0x7f0000000080)="9f9e6eb304d5f821a9be1f0aa017a2572aefda0b61d98cfcf3d075377bbb83364827d8fdbc1630fd7f79eb88f4589a55e51c3de0a2b0e6c2f73e1c7505da6b1947334be95df2afb0a383dc82e67431dbe93e7a10a10162575c9a711619192d9c149557988b74ff0322", 0x0, 0x4, 0x0, 0x0, 0x0}) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000000)={0x2, 0x0, 0xead, "fd0a"}) syz_mount_image$romfs(0x0, &(0x7f0000002e00)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000005780)={{{@in6=@mcast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@empty}}, &(0x7f0000005880)=0xe8) r2 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)={0x28, r3, 0x2f4b41cae783dc41, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}]}, 0x28}}, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f0000000040)={0x6, 'dvmrp0\x00', {0x5}, 0x5}) 02:46:51 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="050000000000000000002e00000008000300", @ANYRES32=r2, @ANYBLOB="0a00340002020202020200000a000600080211000000000008003500000099"], 0x44}}, 0x0) 02:46:51 executing program 1: write$binfmt_script(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="2321202e2f66696c65302073797a0a2500363ccff96ffbb1a15acc111fe6a5a0dcdb9040647b52e5720e9e2bf61bb087f5015b8bbc452f021c2e299de43e669db3a9485775ae6375452ac6810aa81fa8c4332f02f2250a82cd87fc723a125df02a2b97710843694ab6460fe7f51d146afd45185abea173b2984ffeacca2cd984f8ce7e600d760d9b2ea73400"/150], 0x4a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x4) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, 0x0, 0x40) r2 = dup3(r1, r0, 0x0) sendmsg$NL80211_CMD_SET_BEACON(r2, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x4008014) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r3, 0x401870c8, &(0x7f0000000040)={0xf18}) keyctl$set_reqkey_keyring(0xe, 0x1) r4 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r4, 0x2e, 0xce, 0x53c132ef) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) r5 = socket(0x1, 0x3, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newlink={0x90, 0x10, 0x401, 0x70bd27, 0x25dfdbfa, {0x0, 0x0, 0x0, 0x0, 0x0, 0x184a0}, [@IFLA_LINKINFO={0x68, 0x12, 0x0, 0x1, @ip6erspan={{0xe}, {0x54, 0x2, 0x0, 0x1, [@IFLA_GRE_ERSPAN_INDEX={0x8, 0x15, 0x82605}, @IFLA_GRE_ENCAP_FLAGS={0x6, 0xf, 0x2}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_FLOWINFO={0x8, 0xc, 0x9}, @IFLA_GRE_ERSPAN_VER={0x5, 0x16, 0x1}, @IFLA_GRE_ERSPAN_INDEX={0x8, 0x15, 0x9bde8}, @IFLA_GRE_ERSPAN_DIR={0x5}, @IFLA_GRE_LOCAL={0x14, 0x6, @loopback}, @IFLA_GRE_ERSPAN_HWID={0x6, 0x18, 0x80}]}}}, @IFLA_MASTER={0x8, 0x3, r6}]}, 0x90}}, 0x20009000) [ 895.896357] sd 0:0:1:0: [sg0] tag#5749 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 895.907168] sd 0:0:1:0: [sg0] tag#5749 CDB: Service action out(16), sa=0x1e [ 895.915684] sd 0:0:1:0: [sg0] tag#5749 CDB[00]: 9f 9e 6e b3 04 d5 f8 21 a9 be 1f 0a a0 17 a2 57 [ 895.925293] sd 0:0:1:0: [sg0] tag#5749 CDB[10]: 2a ef da 0b 61 d9 8c fc f3 d0 75 37 7b bb 83 36 [ 895.934627] sd 0:0:1:0: [sg0] tag#5749 CDB[20]: 48 27 d8 fd bc 16 30 fd 7f 79 eb 88 f4 58 9a 55 02:46:52 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x400000000001, 0x84) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r3 = accept$alg(r2, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000280)=ANY=[], 0xffffffef) recvmmsg(r3, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/89, 0x59}, {&(0x7f0000000140)=""/72, 0x20000188}], 0x2}}], 0x2, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r4, 0x541d, &(0x7f0000000000)={0x2, {0x3, 0x0, 0x0, 0x400}}) bind$alg(r2, &(0x7f0000000280)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha384\x00'}, 0x58) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, &(0x7f0000000080)) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x2, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}}, 0x40) socket$inet_tcp(0x2, 0x1, 0x0) r6 = perf_event_open(&(0x7f0000002440)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = dup3(0xffffffffffffffff, r6, 0x80000) read$FUSE(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000300)) mkdirat$cgroup(r7, &(0x7f0000000140)='syz0\x00', 0x1ff) read$FUSE(r7, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x10, r7, &(0x7f0000000000)='./file0\x00') r8 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) mkdirat$cgroup(r8, &(0x7f0000000140)='syz0\x00', 0x1ff) read$FUSE(r8, 0x0, 0x0) openat$cgroup_ro(r8, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) [ 895.939237] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 895.944034] sd 0:0:1:0: [sg0] tag#5749 CDB[30]: e5 1c 3d e0 a2 b0 e6 c2 f7 3e 1c 75 05 da 6b 19 [ 895.962164] sd 0:0:1:0: [sg0] tag#5749 CDB[40]: 47 33 4b e9 5d f2 af b0 a3 83 dc 82 e6 74 31 db [ 895.971713] sd 0:0:1:0: [sg0] tag#5749 CDB[50]: e9 3e 7a 10 a1 01 62 57 5c 9a 71 16 19 19 2d 9c [ 895.981199] sd 0:0:1:0: [sg0] tag#5749 CDB[60]: 14 95 57 98 8b 74 ff 03 22 02:46:52 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="050000000000000000002e00000008000300", @ANYRES32=r2, @ANYBLOB="0a00340002020202020200000a000600080211000000000008003500000099"], 0x44}}, 0x0) 02:46:52 executing program 5: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x2000, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0) sendmsg$inet(r2, &(0x7f0000000680)={&(0x7f0000000480)={0x2, 0x4e20, @loopback}, 0x10, 0x0}, 0xc000) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="0338613e541540a2f4f2a082fe504227d165b3b726547d6333cb1581b224fb9350b8bd81b262cb727143aebd767bc6110f9442e05524d10c8e569039b323a83891665291bad6f1e09410a74aff9824f850ac1f03372687b76a041f19f7bd618863ec5898e455c9dc319ec2d553e23b7030285b39250d3c3b36b29c3c516b773a7084578ba1203ca96b031cf6aaa123ef810026112d4d7bf2651b2c77b2ca02e5e8685f49ad01720637e60f222b5ef1d1c088642b4400069716a1c04a", 0xbc, 0x800, &(0x7f0000000100)={0xa, 0x4e21, 0x6, @private2={0xfc, 0x2, '\x00', 0x1}, 0xfff}, 0x1c) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x1c}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_ext={0x1c, 0x4, &(0x7f0000000880)=ANY=[@ANYBLOB="182b0000", @ANYRES32, @ANYBLOB="00000000030000002434000104000000000a400200000000"], &(0x7f00000008c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000a00)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000a40)={0x5, 0xc, 0x8000, 0x7f}, 0x10, 0xbeaf, r2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x10) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0xfff7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shutdown(r1, 0x2) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, &(0x7f0000000140)) pipe2$watch_queue(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000240)=ANY=[@ANYBLOB="01000000010008747b223f00", @ANYRES32=r0]) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xbaf, 0x88, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3ff, 0x4, @perf_bp={&(0x7f0000000340), 0x6}, 0x48824, 0x3ff, 0x0, 0x8, 0x2, 0x0, 0x0, 0x0, 0x6, 0x0, 0xfffffffffffff800}, 0x0, 0x6, r0, 0x2) open(&(0x7f0000000040)='./bus\x00', 0x1410c2, 0x0) [ 896.132350] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 02:46:52 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21}}, 0x24) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x62, &(0x7f0000000180)=""/98}, &(0x7f0000000240), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000000)={0x2, 0x0, 0x0, "fd0a"}) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000300)={0x53, 0x0, 0x69, 0x0, @scatter={0x3, 0x0, &(0x7f0000000440)=[{&(0x7f0000000380)=""/169, 0xa9}, {0x0}, {&(0x7f00000002c0)=""/52, 0x34}]}, &(0x7f0000000080)="9f9e6eb304d5f821a9be1f0aa017a2572aefda0b61d98cfcf3d075377bbb83364827d8fdbc1630fd7f79eb88f4589a55e51c3de0a2b0e6c2f73e1c7505da6b1947334be95df2afb0a383dc82e67431dbe93e7a10a10162575c9a711619192d9c149557988b74ff0322", 0x0, 0x4, 0x0, 0x0, 0x0}) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000000)={0x2, 0x0, 0xead, "fd0a"}) syz_mount_image$romfs(0x0, &(0x7f0000002e00)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000005780)={{{@in6=@mcast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@empty}}, &(0x7f0000005880)=0xe8) r2 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)={0x28, r3, 0x2f4b41cae783dc41, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}]}, 0x28}}, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f0000000040)={0x6, 'dvmrp0\x00', {0x5}, 0x5}) [ 896.223057] xt_CT: You must specify a L4 protocol and not use inversions on it 02:46:52 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x400000000001, 0x84) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r3 = accept$alg(r2, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000280)=ANY=[], 0xffffffef) recvmmsg(r3, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/89, 0x59}, {&(0x7f0000000140)=""/72, 0x20000188}], 0x2}}], 0x2, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r4, 0x541d, &(0x7f0000000000)={0x2, {0x3, 0x0, 0x0, 0x400}}) bind$alg(r2, &(0x7f0000000280)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha384\x00'}, 0x58) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, &(0x7f0000000080)) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x2, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}}, 0x40) socket$inet_tcp(0x2, 0x1, 0x0) r6 = perf_event_open(&(0x7f0000002440)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = dup3(0xffffffffffffffff, r6, 0x80000) read$FUSE(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000300)) mkdirat$cgroup(r7, &(0x7f0000000140)='syz0\x00', 0x1ff) read$FUSE(r7, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x10, r7, &(0x7f0000000000)='./file0\x00') r8 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) mkdirat$cgroup(r8, &(0x7f0000000140)='syz0\x00', 0x1ff) read$FUSE(r8, 0x0, 0x0) openat$cgroup_ro(r8, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) 02:46:52 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x38}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60932b1c00142b00fe80000000000000000000c943c38d1ebe87459ce800000000bbfe8000000000000000000000000000aa0000003a", @ANYRES32=0x41424344, @ANYRES64=r0], 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/204, 0xcc}, {&(0x7f0000000780)=""/251, 0xfb}], 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r2, 0x5414, &(0x7f0000000000)=0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_debug_messages', 0x288401, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0x14e6}}, './file0\x00'}) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f00000000c0)={0x5, 0x9, 0x135, 0xffffffff, 0x0, "1db8a98d1924fa2471f348b7c0214bbaf41102", 0x51, 0x9}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x4) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r6, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}, 0x0, {[0x0, 0x0, 0x0, 0x200000, 0x2]}}, 0x5c) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000000)=0x20, 0x4) r7 = fcntl$dupfd(r6, 0x406, r6) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000080), 0x10) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f0000000280)={&(0x7f0000000000)={0x1d, r10}, 0x10, &(0x7f0000000200)={&(0x7f00000002c0)={0x2, 0x11, 0x0, {0x0, 0x2710}, {}, {}, 0x300, @can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "e428269dbde6b9b1"}}, 0x48}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) setsockopt$MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000040)={0x0, 0x0, 0x7f, r10, 0x1}, 0xc) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x1e8, 0x9403, 0x0, 0x0, 0x2c0, 0x2d8, 0x3d8, 0x3d8, 0x2d8, 0x3d8, 0x3, 0x0, {[{{@ipv6={@remote, @local, [0xffffffff, 0xff, 0xffffff00, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], 'erspan0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x2f, 0x3, 0x1, 0x7f}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@dscp={{0x28}, {0x9, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x8, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x11000, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x88001, 0x0) [ 896.432608] sd 0:0:1:0: [sg0] tag#5749 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 896.443602] sd 0:0:1:0: [sg0] tag#5749 CDB: Service action out(16), sa=0x1e [ 896.453116] sd 0:0:1:0: [sg0] tag#5749 CDB[00]: 9f 9e 6e b3 04 d5 f8 21 a9 be 1f 0a a0 17 a2 57 [ 896.464116] sd 0:0:1:0: [sg0] tag#5749 CDB[10]: 2a ef da 0b 61 d9 8c fc f3 d0 75 37 7b bb 83 36 02:46:52 executing program 1: write$binfmt_script(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="2321202e2f66696c65302073797a0a2500363ccff96ffbb1a15acc111fe6a5a0dcdb9040647b52e5720e9e2bf61bb087f5015b8bbc452f021c2e299de43e669db3a9485775ae6375452ac6810aa81fa8c4332f02f2250a82cd87fc723a125df02a2b97710843694ab6460fe7f51d146afd45185abea173b2984ffeacca2cd984f8ce7e600d760d9b2ea73400"/150], 0x4a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x4) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, 0x0, 0x40) r2 = dup3(r1, r0, 0x0) sendmsg$NL80211_CMD_SET_BEACON(r2, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x4008014) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r3, 0x401870c8, &(0x7f0000000040)={0xf18}) keyctl$set_reqkey_keyring(0xe, 0x1) r4 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r4, 0x2e, 0xce, 0x53c132ef) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) r5 = socket(0x1, 0x3, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newlink={0x90, 0x10, 0x401, 0x70bd27, 0x25dfdbfa, {0x0, 0x0, 0x0, 0x0, 0x0, 0x184a0}, [@IFLA_LINKINFO={0x68, 0x12, 0x0, 0x1, @ip6erspan={{0xe}, {0x54, 0x2, 0x0, 0x1, [@IFLA_GRE_ERSPAN_INDEX={0x8, 0x15, 0x82605}, @IFLA_GRE_ENCAP_FLAGS={0x6, 0xf, 0x2}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_FLOWINFO={0x8, 0xc, 0x9}, @IFLA_GRE_ERSPAN_VER={0x5, 0x16, 0x1}, @IFLA_GRE_ERSPAN_INDEX={0x8, 0x15, 0x9bde8}, @IFLA_GRE_ERSPAN_DIR={0x5}, @IFLA_GRE_LOCAL={0x14, 0x6, @loopback}, @IFLA_GRE_ERSPAN_HWID={0x6, 0x18, 0x80}]}}}, @IFLA_MASTER={0x8, 0x3, r6}]}, 0x90}}, 0x20009000) [ 896.474269] sd 0:0:1:0: [sg0] tag#5749 CDB[20]: 48 27 d8 fd bc 16 30 fd 7f 79 eb 88 f4 58 9a 55 [ 896.483238] sd 0:0:1:0: [sg0] tag#5749 CDB[30]: e5 1c 3d e0 a2 b0 e6 c2 f7 3e 1c 75 05 da 6b 19 [ 896.493634] sd 0:0:1:0: [sg0] tag#5749 CDB[40]: 47 33 4b e9 5d f2 af b0 a3 83 dc 82 e6 74 31 db [ 896.503119] sd 0:0:1:0: [sg0] tag#5749 CDB[50]: e9 3e 7a 10 a1 01 62 57 5c 9a 71 16 19 19 2d 9c [ 896.513022] sd 0:0:1:0: [sg0] tag#5749 CDB[60]: 14 95 57 98 8b 74 ff 03 22 02:46:53 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x400000000001, 0x84) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r3 = accept$alg(r2, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000280)=ANY=[], 0xffffffef) recvmmsg(r3, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/89, 0x59}, {&(0x7f0000000140)=""/72, 0x20000188}], 0x2}}], 0x2, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r4, 0x541d, &(0x7f0000000000)={0x2, {0x3, 0x0, 0x0, 0x400}}) bind$alg(r2, &(0x7f0000000280)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha384\x00'}, 0x58) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, &(0x7f0000000080)) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x2, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}}, 0x40) socket$inet_tcp(0x2, 0x1, 0x0) r6 = perf_event_open(&(0x7f0000002440)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = dup3(0xffffffffffffffff, r6, 0x80000) read$FUSE(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000300)) mkdirat$cgroup(r7, &(0x7f0000000140)='syz0\x00', 0x1ff) read$FUSE(r7, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x10, r7, &(0x7f0000000000)='./file0\x00') r8 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) mkdirat$cgroup(r8, &(0x7f0000000140)='syz0\x00', 0x1ff) read$FUSE(r8, 0x0, 0x0) openat$cgroup_ro(r8, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) 02:46:53 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x400000000001, 0x84) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r3 = accept$alg(r2, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000280)=ANY=[], 0xffffffef) recvmmsg(r3, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/89, 0x59}, {&(0x7f0000000140)=""/72, 0x20000188}], 0x2}}], 0x2, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r4, 0x541d, &(0x7f0000000000)={0x2, {0x3, 0x0, 0x0, 0x400}}) bind$alg(r2, &(0x7f0000000280)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha384\x00'}, 0x58) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, &(0x7f0000000080)) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x2, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}}, 0x40) socket$inet_tcp(0x2, 0x1, 0x0) r6 = perf_event_open(&(0x7f0000002440)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = dup3(0xffffffffffffffff, r6, 0x80000) read$FUSE(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000300)) mkdirat$cgroup(r7, &(0x7f0000000140)='syz0\x00', 0x1ff) read$FUSE(r7, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x10, r7, &(0x7f0000000000)='./file0\x00') r8 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) mkdirat$cgroup(r8, &(0x7f0000000140)='syz0\x00', 0x1ff) read$FUSE(r8, 0x0, 0x0) openat$cgroup_ro(r8, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) [ 897.028792] xt_CT: You must specify a L4 protocol and not use inversions on it 02:46:53 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x400000000001, 0x84) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r3 = accept$alg(r2, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000280)=ANY=[], 0xffffffef) recvmmsg(r3, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/89, 0x59}, {&(0x7f0000000140)=""/72, 0x20000188}], 0x2}}], 0x2, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r4, 0x541d, &(0x7f0000000000)={0x2, {0x3, 0x0, 0x0, 0x400}}) bind$alg(r2, &(0x7f0000000280)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha384\x00'}, 0x58) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, &(0x7f0000000080)) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x2, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}}, 0x40) socket$inet_tcp(0x2, 0x1, 0x0) r6 = perf_event_open(&(0x7f0000002440)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = dup3(0xffffffffffffffff, r6, 0x80000) read$FUSE(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000300)) mkdirat$cgroup(r7, &(0x7f0000000140)='syz0\x00', 0x1ff) read$FUSE(r7, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x10, r7, &(0x7f0000000000)='./file0\x00') r8 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) mkdirat$cgroup(r8, &(0x7f0000000140)='syz0\x00', 0x1ff) read$FUSE(r8, 0x0, 0x0) openat$cgroup_ro(r8, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) 02:46:53 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x400000000001, 0x84) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r3 = accept$alg(r2, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000280)=ANY=[], 0xffffffef) recvmmsg(r3, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/89, 0x59}, {&(0x7f0000000140)=""/72, 0x20000188}], 0x2}}], 0x2, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r4, 0x541d, &(0x7f0000000000)={0x2, {0x3, 0x0, 0x0, 0x400}}) bind$alg(r2, &(0x7f0000000280)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha384\x00'}, 0x58) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, &(0x7f0000000080)) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x2, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}}, 0x40) socket$inet_tcp(0x2, 0x1, 0x0) r6 = perf_event_open(&(0x7f0000002440)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = dup3(0xffffffffffffffff, r6, 0x80000) read$FUSE(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000300)) mkdirat$cgroup(r7, &(0x7f0000000140)='syz0\x00', 0x1ff) read$FUSE(r7, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x10, r7, &(0x7f0000000000)='./file0\x00') r8 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) mkdirat$cgroup(r8, &(0x7f0000000140)='syz0\x00', 0x1ff) read$FUSE(r8, 0x0, 0x0) openat$cgroup_ro(r8, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) 02:46:53 executing program 1: write$binfmt_script(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="2321202e2f66696c65302073797a0a2500363ccff96ffbb1a15acc111fe6a5a0dcdb9040647b52e5720e9e2bf61bb087f5015b8bbc452f021c2e299de43e669db3a9485775ae6375452ac6810aa81fa8c4332f02f2250a82cd87fc723a125df02a2b97710843694ab6460fe7f51d146afd45185abea173b2984ffeacca2cd984f8ce7e600d760d9b2ea73400"/150], 0x4a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x4) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, 0x0, 0x40) r2 = dup3(r1, r0, 0x0) sendmsg$NL80211_CMD_SET_BEACON(r2, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x4008014) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r3, 0x401870c8, &(0x7f0000000040)={0xf18}) keyctl$set_reqkey_keyring(0xe, 0x1) r4 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r4, 0x2e, 0xce, 0x53c132ef) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) r5 = socket(0x1, 0x3, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newlink={0x90, 0x10, 0x401, 0x70bd27, 0x25dfdbfa, {0x0, 0x0, 0x0, 0x0, 0x0, 0x184a0}, [@IFLA_LINKINFO={0x68, 0x12, 0x0, 0x1, @ip6erspan={{0xe}, {0x54, 0x2, 0x0, 0x1, [@IFLA_GRE_ERSPAN_INDEX={0x8, 0x15, 0x82605}, @IFLA_GRE_ENCAP_FLAGS={0x6, 0xf, 0x2}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_FLOWINFO={0x8, 0xc, 0x9}, @IFLA_GRE_ERSPAN_VER={0x5, 0x16, 0x1}, @IFLA_GRE_ERSPAN_INDEX={0x8, 0x15, 0x9bde8}, @IFLA_GRE_ERSPAN_DIR={0x5}, @IFLA_GRE_LOCAL={0x14, 0x6, @loopback}, @IFLA_GRE_ERSPAN_HWID={0x6, 0x18, 0x80}]}}}, @IFLA_MASTER={0x8, 0x3, r6}]}, 0x90}}, 0x20009000) 02:46:56 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x400000000001, 0x84) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r3 = accept$alg(r2, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000280)=ANY=[], 0xffffffef) recvmmsg(r3, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/89, 0x59}, {&(0x7f0000000140)=""/72, 0x20000188}], 0x2}}], 0x2, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r4, 0x541d, &(0x7f0000000000)={0x2, {0x3, 0x0, 0x0, 0x400}}) bind$alg(r2, &(0x7f0000000280)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha384\x00'}, 0x58) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, &(0x7f0000000080)) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x2, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}}, 0x40) socket$inet_tcp(0x2, 0x1, 0x0) r6 = perf_event_open(&(0x7f0000002440)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = dup3(0xffffffffffffffff, r6, 0x80000) read$FUSE(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000300)) mkdirat$cgroup(r7, &(0x7f0000000140)='syz0\x00', 0x1ff) read$FUSE(r7, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x10, r7, &(0x7f0000000000)='./file0\x00') r8 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) mkdirat$cgroup(r8, &(0x7f0000000140)='syz0\x00', 0x1ff) read$FUSE(r8, 0x0, 0x0) openat$cgroup_ro(r8, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) 02:46:56 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x400000000001, 0x84) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r3 = accept$alg(r2, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000280)=ANY=[], 0xffffffef) recvmmsg(r3, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/89, 0x59}, {&(0x7f0000000140)=""/72, 0x20000188}], 0x2}}], 0x2, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r4, 0x541d, &(0x7f0000000000)={0x2, {0x3, 0x0, 0x0, 0x400}}) bind$alg(r2, &(0x7f0000000280)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha384\x00'}, 0x58) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, &(0x7f0000000080)) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x2, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}}, 0x40) socket$inet_tcp(0x2, 0x1, 0x0) r6 = perf_event_open(&(0x7f0000002440)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = dup3(0xffffffffffffffff, r6, 0x80000) read$FUSE(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000300)) mkdirat$cgroup(r7, &(0x7f0000000140)='syz0\x00', 0x1ff) read$FUSE(r7, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x10, r7, &(0x7f0000000000)='./file0\x00') r8 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) mkdirat$cgroup(r8, &(0x7f0000000140)='syz0\x00', 0x1ff) read$FUSE(r8, 0x0, 0x0) openat$cgroup_ro(r8, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) 02:46:56 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x400000000001, 0x84) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r3 = accept$alg(r2, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000280)=ANY=[], 0xffffffef) recvmmsg(r3, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/89, 0x59}, {&(0x7f0000000140)=""/72, 0x20000188}], 0x2}}], 0x2, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r4, 0x541d, &(0x7f0000000000)={0x2, {0x3, 0x0, 0x0, 0x400}}) bind$alg(r2, &(0x7f0000000280)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha384\x00'}, 0x58) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, &(0x7f0000000080)) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x2, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}}, 0x40) socket$inet_tcp(0x2, 0x1, 0x0) r6 = perf_event_open(&(0x7f0000002440)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = dup3(0xffffffffffffffff, r6, 0x80000) read$FUSE(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000300)) mkdirat$cgroup(r7, &(0x7f0000000140)='syz0\x00', 0x1ff) read$FUSE(r7, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x10, r7, &(0x7f0000000000)='./file0\x00') r8 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) mkdirat$cgroup(r8, &(0x7f0000000140)='syz0\x00', 0x1ff) read$FUSE(r8, 0x0, 0x0) openat$cgroup_ro(r8, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) 02:46:56 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x400000000001, 0x84) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r3 = accept$alg(r2, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000280)=ANY=[], 0xffffffef) recvmmsg(r3, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/89, 0x59}, {&(0x7f0000000140)=""/72, 0x20000188}], 0x2}}], 0x2, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r4, 0x541d, &(0x7f0000000000)={0x2, {0x3, 0x0, 0x0, 0x400}}) bind$alg(r2, &(0x7f0000000280)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha384\x00'}, 0x58) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, &(0x7f0000000080)) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x2, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}}, 0x40) socket$inet_tcp(0x2, 0x1, 0x0) r6 = perf_event_open(&(0x7f0000002440)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = dup3(0xffffffffffffffff, r6, 0x80000) read$FUSE(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000300)) mkdirat$cgroup(r7, &(0x7f0000000140)='syz0\x00', 0x1ff) read$FUSE(r7, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x10, r7, &(0x7f0000000000)='./file0\x00') r8 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) mkdirat$cgroup(r8, &(0x7f0000000140)='syz0\x00', 0x1ff) read$FUSE(r8, 0x0, 0x0) openat$cgroup_ro(r8, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) 02:46:57 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x400000000001, 0x84) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r3 = accept$alg(r2, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000280)=ANY=[], 0xffffffef) recvmmsg(r3, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/89, 0x59}, {&(0x7f0000000140)=""/72, 0x20000188}], 0x2}}], 0x2, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r4, 0x541d, &(0x7f0000000000)={0x2, {0x3, 0x0, 0x0, 0x400}}) bind$alg(r2, &(0x7f0000000280)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha384\x00'}, 0x58) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, &(0x7f0000000080)) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x2, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}}, 0x40) socket$inet_tcp(0x2, 0x1, 0x0) r6 = perf_event_open(&(0x7f0000002440)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = dup3(0xffffffffffffffff, r6, 0x80000) read$FUSE(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000300)) mkdirat$cgroup(r7, &(0x7f0000000140)='syz0\x00', 0x1ff) read$FUSE(r7, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x10, r7, &(0x7f0000000000)='./file0\x00') r8 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) mkdirat$cgroup(r8, &(0x7f0000000140)='syz0\x00', 0x1ff) read$FUSE(r8, 0x0, 0x0) openat$cgroup_ro(r8, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) 02:46:58 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x400000000001, 0x84) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r3 = accept$alg(r2, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000280)=ANY=[], 0xffffffef) recvmmsg(r3, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/89, 0x59}, {&(0x7f0000000140)=""/72, 0x20000188}], 0x2}}], 0x2, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r4, 0x541d, &(0x7f0000000000)={0x2, {0x3, 0x0, 0x0, 0x400}}) bind$alg(r2, &(0x7f0000000280)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha384\x00'}, 0x58) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, &(0x7f0000000080)) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x2, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}}, 0x40) socket$inet_tcp(0x2, 0x1, 0x0) r6 = perf_event_open(&(0x7f0000002440)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = dup3(0xffffffffffffffff, r6, 0x80000) read$FUSE(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000300)) mkdirat$cgroup(r7, &(0x7f0000000140)='syz0\x00', 0x1ff) read$FUSE(r7, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x10, r7, &(0x7f0000000000)='./file0\x00') r8 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) mkdirat$cgroup(r8, &(0x7f0000000140)='syz0\x00', 0x1ff) read$FUSE(r8, 0x0, 0x0) openat$cgroup_ro(r8, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) 02:46:59 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x400000000001, 0x84) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r3 = accept$alg(r2, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000280)=ANY=[], 0xffffffef) recvmmsg(r3, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/89, 0x59}, {&(0x7f0000000140)=""/72, 0x20000188}], 0x2}}], 0x2, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r4, 0x541d, &(0x7f0000000000)={0x2, {0x3, 0x0, 0x0, 0x400}}) bind$alg(r2, &(0x7f0000000280)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha384\x00'}, 0x58) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, &(0x7f0000000080)) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x2, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}}, 0x40) socket$inet_tcp(0x2, 0x1, 0x0) r6 = perf_event_open(&(0x7f0000002440)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = dup3(0xffffffffffffffff, r6, 0x80000) read$FUSE(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000300)) mkdirat$cgroup(r7, &(0x7f0000000140)='syz0\x00', 0x1ff) read$FUSE(r7, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x10, r7, &(0x7f0000000000)='./file0\x00') r8 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) mkdirat$cgroup(r8, &(0x7f0000000140)='syz0\x00', 0x1ff) read$FUSE(r8, 0x0, 0x0) openat$cgroup_ro(r8, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) 02:46:59 executing program 0: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x400000000001, 0x84) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r3 = accept$alg(r2, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000280)=ANY=[], 0xffffffef) recvmmsg(r3, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/89, 0x59}, {&(0x7f0000000140)=""/72, 0x20000188}], 0x2}}], 0x2, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r4, 0x541d, &(0x7f0000000000)={0x2, {0x3, 0x0, 0x0, 0x400}}) bind$alg(r2, &(0x7f0000000280)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha384\x00'}, 0x58) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, &(0x7f0000000080)) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x2, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}}, 0x40) socket$inet_tcp(0x2, 0x1, 0x0) r6 = perf_event_open(&(0x7f0000002440)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = dup3(0xffffffffffffffff, r6, 0x80000) read$FUSE(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000300)) mkdirat$cgroup(r7, &(0x7f0000000140)='syz0\x00', 0x1ff) read$FUSE(r7, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x10, r7, &(0x7f0000000000)='./file0\x00') r8 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) mkdirat$cgroup(r8, &(0x7f0000000140)='syz0\x00', 0x1ff) read$FUSE(r8, 0x0, 0x0) openat$cgroup_ro(r8, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) 02:46:59 executing program 3: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x400000000001, 0x84) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r3 = accept$alg(r2, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000280)=ANY=[], 0xffffffef) recvmmsg(r3, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/89, 0x59}, {&(0x7f0000000140)=""/72, 0x20000188}], 0x2}}], 0x2, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r4, 0x541d, &(0x7f0000000000)={0x2, {0x3, 0x0, 0x0, 0x400}}) bind$alg(r2, &(0x7f0000000280)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha384\x00'}, 0x58) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, &(0x7f0000000080)) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x2, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}}, 0x40) socket$inet_tcp(0x2, 0x1, 0x0) r6 = perf_event_open(&(0x7f0000002440)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = dup3(0xffffffffffffffff, r6, 0x80000) read$FUSE(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000300)) mkdirat$cgroup(r7, &(0x7f0000000140)='syz0\x00', 0x1ff) read$FUSE(r7, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x10, r7, &(0x7f0000000000)='./file0\x00') r8 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) mkdirat$cgroup(r8, &(0x7f0000000140)='syz0\x00', 0x1ff) read$FUSE(r8, 0x0, 0x0) openat$cgroup_ro(r8, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) 02:47:00 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x400000000001, 0x84) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r3 = accept$alg(r2, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000280)=ANY=[], 0xffffffef) recvmmsg(r3, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/89, 0x59}, {&(0x7f0000000140)=""/72, 0x20000188}], 0x2}}], 0x2, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r4, 0x541d, &(0x7f0000000000)={0x2, {0x3, 0x0, 0x0, 0x400}}) bind$alg(r2, &(0x7f0000000280)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha384\x00'}, 0x58) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, &(0x7f0000000080)) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x2, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}}, 0x40) socket$inet_tcp(0x2, 0x1, 0x0) r6 = perf_event_open(&(0x7f0000002440)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = dup3(0xffffffffffffffff, r6, 0x80000) read$FUSE(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000300)) mkdirat$cgroup(r7, &(0x7f0000000140)='syz0\x00', 0x1ff) read$FUSE(r7, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x10, r7, &(0x7f0000000000)='./file0\x00') r8 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) mkdirat$cgroup(r8, &(0x7f0000000140)='syz0\x00', 0x1ff) read$FUSE(r8, 0x0, 0x0) openat$cgroup_ro(r8, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) 02:47:00 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x400000000001, 0x84) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r3 = accept$alg(r2, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000280)=ANY=[], 0xffffffef) recvmmsg(r3, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/89, 0x59}, {&(0x7f0000000140)=""/72, 0x20000188}], 0x2}}], 0x2, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r4, 0x541d, &(0x7f0000000000)={0x2, {0x3, 0x0, 0x0, 0x400}}) bind$alg(r2, &(0x7f0000000280)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha384\x00'}, 0x58) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, &(0x7f0000000080)) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x2, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}}, 0x40) socket$inet_tcp(0x2, 0x1, 0x0) r6 = perf_event_open(&(0x7f0000002440)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = dup3(0xffffffffffffffff, r6, 0x80000) read$FUSE(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000300)) mkdirat$cgroup(r7, &(0x7f0000000140)='syz0\x00', 0x1ff) read$FUSE(r7, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x10, r7, &(0x7f0000000000)='./file0\x00') r8 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) mkdirat$cgroup(r8, &(0x7f0000000140)='syz0\x00', 0x1ff) read$FUSE(r8, 0x0, 0x0) openat$cgroup_ro(r8, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) 02:47:02 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x400000000001, 0x84) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r3 = accept$alg(r2, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000280)=ANY=[], 0xffffffef) recvmmsg(r3, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/89, 0x59}, {&(0x7f0000000140)=""/72, 0x20000188}], 0x2}}], 0x2, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r4, 0x541d, &(0x7f0000000000)={0x2, {0x3, 0x0, 0x0, 0x400}}) bind$alg(r2, &(0x7f0000000280)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha384\x00'}, 0x58) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, &(0x7f0000000080)) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x2, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}}, 0x40) socket$inet_tcp(0x2, 0x1, 0x0) r6 = perf_event_open(&(0x7f0000002440)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = dup3(0xffffffffffffffff, r6, 0x80000) read$FUSE(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000300)) mkdirat$cgroup(r7, &(0x7f0000000140)='syz0\x00', 0x1ff) read$FUSE(r7, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x10, r7, &(0x7f0000000000)='./file0\x00') r8 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) mkdirat$cgroup(r8, &(0x7f0000000140)='syz0\x00', 0x1ff) read$FUSE(r8, 0x0, 0x0) openat$cgroup_ro(r8, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) 02:47:02 executing program 1: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x400000000001, 0x84) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r3 = accept$alg(r2, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000280)=ANY=[], 0xffffffef) recvmmsg(r3, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/89, 0x59}, {&(0x7f0000000140)=""/72, 0x20000188}], 0x2}}], 0x2, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r4, 0x541d, &(0x7f0000000000)={0x2, {0x3, 0x0, 0x0, 0x400}}) bind$alg(r2, &(0x7f0000000280)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha384\x00'}, 0x58) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, &(0x7f0000000080)) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x2, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}}, 0x40) socket$inet_tcp(0x2, 0x1, 0x0) r6 = perf_event_open(&(0x7f0000002440)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = dup3(0xffffffffffffffff, r6, 0x80000) read$FUSE(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000300)) mkdirat$cgroup(r7, &(0x7f0000000140)='syz0\x00', 0x1ff) read$FUSE(r7, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x10, r7, &(0x7f0000000000)='./file0\x00') r8 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) mkdirat$cgroup(r8, &(0x7f0000000140)='syz0\x00', 0x1ff) read$FUSE(r8, 0x0, 0x0) openat$cgroup_ro(r8, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) 02:47:02 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x400000000001, 0x84) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r3 = accept$alg(r2, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000280)=ANY=[], 0xffffffef) recvmmsg(r3, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/89, 0x59}, {&(0x7f0000000140)=""/72, 0x20000188}], 0x2}}], 0x2, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r4, 0x541d, &(0x7f0000000000)={0x2, {0x3, 0x0, 0x0, 0x400}}) bind$alg(r2, &(0x7f0000000280)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha384\x00'}, 0x58) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, &(0x7f0000000080)) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x2, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}}, 0x40) socket$inet_tcp(0x2, 0x1, 0x0) r6 = perf_event_open(&(0x7f0000002440)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = dup3(0xffffffffffffffff, r6, 0x80000) read$FUSE(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000300)) mkdirat$cgroup(r7, &(0x7f0000000140)='syz0\x00', 0x1ff) read$FUSE(r7, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x10, r7, &(0x7f0000000000)='./file0\x00') r8 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) mkdirat$cgroup(r8, &(0x7f0000000140)='syz0\x00', 0x1ff) read$FUSE(r8, 0x0, 0x0) openat$cgroup_ro(r8, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) 02:47:02 executing program 0: write$binfmt_script(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="2321202e2f66696c65302073797a0a2500363ccff96ffbb1a15acc111fe6a5a0dcdb9040647b52e5720e9e2bf61bb087f5015b8bbc452f021c2e299de43e669db3a9485775ae6375452ac6810aa81fa8c4332f02f2250a82cd87fc723a125df02a2b97710843694ab6460fe7f51d146afd45185abea173b2984ffeacca2cd984f8ce7e600d760d9b2ea73400"/150], 0x4a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x4) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, 0x0, 0x40) r2 = dup3(r1, r0, 0x0) sendmsg$NL80211_CMD_SET_BEACON(r2, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x4008014) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r3, 0x401870c8, &(0x7f0000000040)={0xf18}) keyctl$set_reqkey_keyring(0xe, 0x1) r4 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r4, 0x2e, 0xce, 0x53c132ef) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) r5 = socket(0x1, 0x3, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newlink={0x90, 0x10, 0x401, 0x70bd27, 0x25dfdbfa, {0x0, 0x0, 0x0, 0x0, 0x0, 0x184a0}, [@IFLA_LINKINFO={0x68, 0x12, 0x0, 0x1, @ip6erspan={{0xe}, {0x54, 0x2, 0x0, 0x1, [@IFLA_GRE_ERSPAN_INDEX={0x8, 0x15, 0x82605}, @IFLA_GRE_ENCAP_FLAGS={0x6, 0xf, 0x2}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_FLOWINFO={0x8, 0xc, 0x9}, @IFLA_GRE_ERSPAN_VER={0x5, 0x16, 0x1}, @IFLA_GRE_ERSPAN_INDEX={0x8, 0x15, 0x9bde8}, @IFLA_GRE_ERSPAN_DIR={0x5}, @IFLA_GRE_LOCAL={0x14, 0x6, @loopback}, @IFLA_GRE_ERSPAN_HWID={0x6, 0x18, 0x80}]}}}, @IFLA_MASTER={0x8, 0x3, r6}]}, 0x90}}, 0x20009000) 02:47:02 executing program 5: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x400000000001, 0x84) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r3 = accept$alg(r2, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000280)=ANY=[], 0xffffffef) recvmmsg(r3, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/89, 0x59}, {&(0x7f0000000140)=""/72, 0x20000188}], 0x2}}], 0x2, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r4, 0x541d, &(0x7f0000000000)={0x2, {0x3, 0x0, 0x0, 0x400}}) bind$alg(r2, &(0x7f0000000280)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha384\x00'}, 0x58) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, &(0x7f0000000080)) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x2, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}}, 0x40) socket$inet_tcp(0x2, 0x1, 0x0) r6 = perf_event_open(&(0x7f0000002440)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = dup3(0xffffffffffffffff, r6, 0x80000) read$FUSE(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000300)) mkdirat$cgroup(r7, &(0x7f0000000140)='syz0\x00', 0x1ff) read$FUSE(r7, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x10, r7, &(0x7f0000000000)='./file0\x00') r8 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) mkdirat$cgroup(r8, &(0x7f0000000140)='syz0\x00', 0x1ff) read$FUSE(r8, 0x0, 0x0) openat$cgroup_ro(r8, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) 02:47:02 executing program 3: write$binfmt_script(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="2321202e2f66696c65302073797a0a2500363ccff96ffbb1a15acc111fe6a5a0dcdb9040647b52e5720e9e2bf61bb087f5015b8bbc452f021c2e299de43e669db3a9485775ae6375452ac6810aa81fa8c4332f02f2250a82cd87fc723a125df02a2b97710843694ab6460fe7f51d146afd45185abea173b2984ffeacca2cd984f8ce7e600d760d9b2ea73400"/150], 0x4a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x4) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, 0x0, 0x40) r2 = dup3(r1, r0, 0x0) sendmsg$NL80211_CMD_SET_BEACON(r2, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x4008014) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r3, 0x401870c8, &(0x7f0000000040)={0xf18}) keyctl$set_reqkey_keyring(0xe, 0x1) r4 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r4, 0x2e, 0xce, 0x53c132ef) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) r5 = socket(0x1, 0x3, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newlink={0x90, 0x10, 0x401, 0x70bd27, 0x25dfdbfa, {0x0, 0x0, 0x0, 0x0, 0x0, 0x184a0}, [@IFLA_LINKINFO={0x68, 0x12, 0x0, 0x1, @ip6erspan={{0xe}, {0x54, 0x2, 0x0, 0x1, [@IFLA_GRE_ERSPAN_INDEX={0x8, 0x15, 0x82605}, @IFLA_GRE_ENCAP_FLAGS={0x6, 0xf, 0x2}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_FLOWINFO={0x8, 0xc, 0x9}, @IFLA_GRE_ERSPAN_VER={0x5, 0x16, 0x1}, @IFLA_GRE_ERSPAN_INDEX={0x8, 0x15, 0x9bde8}, @IFLA_GRE_ERSPAN_DIR={0x5}, @IFLA_GRE_LOCAL={0x14, 0x6, @loopback}, @IFLA_GRE_ERSPAN_HWID={0x6, 0x18, 0x80}]}}}, @IFLA_MASTER={0x8, 0x3, r6}]}, 0x90}}, 0x20009000) 02:47:03 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x400000000001, 0x84) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r3 = accept$alg(r2, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000280)=ANY=[], 0xffffffef) recvmmsg(r3, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/89, 0x59}, {&(0x7f0000000140)=""/72, 0x20000188}], 0x2}}], 0x2, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r4, 0x541d, &(0x7f0000000000)={0x2, {0x3, 0x0, 0x0, 0x400}}) bind$alg(r2, &(0x7f0000000280)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha384\x00'}, 0x58) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, &(0x7f0000000080)) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x2, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}}, 0x40) socket$inet_tcp(0x2, 0x1, 0x0) r6 = perf_event_open(&(0x7f0000002440)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = dup3(0xffffffffffffffff, r6, 0x80000) read$FUSE(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000300)) mkdirat$cgroup(r7, &(0x7f0000000140)='syz0\x00', 0x1ff) read$FUSE(r7, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x10, r7, &(0x7f0000000000)='./file0\x00') r8 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) mkdirat$cgroup(r8, &(0x7f0000000140)='syz0\x00', 0x1ff) read$FUSE(r8, 0x0, 0x0) openat$cgroup_ro(r8, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) 02:47:03 executing program 0: write$binfmt_script(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="2321202e2f66696c65302073797a0a2500363ccff96ffbb1a15acc111fe6a5a0dcdb9040647b52e5720e9e2bf61bb087f5015b8bbc452f021c2e299de43e669db3a9485775ae6375452ac6810aa81fa8c4332f02f2250a82cd87fc723a125df02a2b97710843694ab6460fe7f51d146afd45185abea173b2984ffeacca2cd984f8ce7e600d760d9b2ea73400"/150], 0x4a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x4) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, 0x0, 0x40) r2 = dup3(r1, r0, 0x0) sendmsg$NL80211_CMD_SET_BEACON(r2, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x4008014) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r3, 0x401870c8, &(0x7f0000000040)={0xf18}) keyctl$set_reqkey_keyring(0xe, 0x1) r4 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r4, 0x2e, 0xce, 0x53c132ef) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) r5 = socket(0x1, 0x3, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newlink={0x90, 0x10, 0x401, 0x70bd27, 0x25dfdbfa, {0x0, 0x0, 0x0, 0x0, 0x0, 0x184a0}, [@IFLA_LINKINFO={0x68, 0x12, 0x0, 0x1, @ip6erspan={{0xe}, {0x54, 0x2, 0x0, 0x1, [@IFLA_GRE_ERSPAN_INDEX={0x8, 0x15, 0x82605}, @IFLA_GRE_ENCAP_FLAGS={0x6, 0xf, 0x2}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_FLOWINFO={0x8, 0xc, 0x9}, @IFLA_GRE_ERSPAN_VER={0x5, 0x16, 0x1}, @IFLA_GRE_ERSPAN_INDEX={0x8, 0x15, 0x9bde8}, @IFLA_GRE_ERSPAN_DIR={0x5}, @IFLA_GRE_LOCAL={0x14, 0x6, @loopback}, @IFLA_GRE_ERSPAN_HWID={0x6, 0x18, 0x80}]}}}, @IFLA_MASTER={0x8, 0x3, r6}]}, 0x90}}, 0x20009000) 02:47:03 executing program 5: write$binfmt_script(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="2321202e2f66696c65302073797a0a2500363ccff96ffbb1a15acc111fe6a5a0dcdb9040647b52e5720e9e2bf61bb087f5015b8bbc452f021c2e299de43e669db3a9485775ae6375452ac6810aa81fa8c4332f02f2250a82cd87fc723a125df02a2b97710843694ab6460fe7f51d146afd45185abea173b2984ffeacca2cd984f8ce7e600d760d9b2ea73400"/150], 0x4a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x4) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, 0x0, 0x40) r2 = dup3(r1, r0, 0x0) sendmsg$NL80211_CMD_SET_BEACON(r2, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x4008014) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r3, 0x401870c8, &(0x7f0000000040)={0xf18}) keyctl$set_reqkey_keyring(0xe, 0x1) r4 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r4, 0x2e, 0xce, 0x53c132ef) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) r5 = socket(0x1, 0x3, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newlink={0x90, 0x10, 0x401, 0x70bd27, 0x25dfdbfa, {0x0, 0x0, 0x0, 0x0, 0x0, 0x184a0}, [@IFLA_LINKINFO={0x68, 0x12, 0x0, 0x1, @ip6erspan={{0xe}, {0x54, 0x2, 0x0, 0x1, [@IFLA_GRE_ERSPAN_INDEX={0x8, 0x15, 0x82605}, @IFLA_GRE_ENCAP_FLAGS={0x6, 0xf, 0x2}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_FLOWINFO={0x8, 0xc, 0x9}, @IFLA_GRE_ERSPAN_VER={0x5, 0x16, 0x1}, @IFLA_GRE_ERSPAN_INDEX={0x8, 0x15, 0x9bde8}, @IFLA_GRE_ERSPAN_DIR={0x5}, @IFLA_GRE_LOCAL={0x14, 0x6, @loopback}, @IFLA_GRE_ERSPAN_HWID={0x6, 0x18, 0x80}]}}}, @IFLA_MASTER={0x8, 0x3, r6}]}, 0x90}}, 0x20009000) 02:47:03 executing program 3: write$binfmt_script(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="2321202e2f66696c65302073797a0a2500363ccff96ffbb1a15acc111fe6a5a0dcdb9040647b52e5720e9e2bf61bb087f5015b8bbc452f021c2e299de43e669db3a9485775ae6375452ac6810aa81fa8c4332f02f2250a82cd87fc723a125df02a2b97710843694ab6460fe7f51d146afd45185abea173b2984ffeacca2cd984f8ce7e600d760d9b2ea73400"/150], 0x4a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x4) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, 0x0, 0x40) r2 = dup3(r1, r0, 0x0) sendmsg$NL80211_CMD_SET_BEACON(r2, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x4008014) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r3, 0x401870c8, &(0x7f0000000040)={0xf18}) keyctl$set_reqkey_keyring(0xe, 0x1) r4 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r4, 0x2e, 0xce, 0x53c132ef) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) r5 = socket(0x1, 0x3, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newlink={0x90, 0x10, 0x401, 0x70bd27, 0x25dfdbfa, {0x0, 0x0, 0x0, 0x0, 0x0, 0x184a0}, [@IFLA_LINKINFO={0x68, 0x12, 0x0, 0x1, @ip6erspan={{0xe}, {0x54, 0x2, 0x0, 0x1, [@IFLA_GRE_ERSPAN_INDEX={0x8, 0x15, 0x82605}, @IFLA_GRE_ENCAP_FLAGS={0x6, 0xf, 0x2}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_FLOWINFO={0x8, 0xc, 0x9}, @IFLA_GRE_ERSPAN_VER={0x5, 0x16, 0x1}, @IFLA_GRE_ERSPAN_INDEX={0x8, 0x15, 0x9bde8}, @IFLA_GRE_ERSPAN_DIR={0x5}, @IFLA_GRE_LOCAL={0x14, 0x6, @loopback}, @IFLA_GRE_ERSPAN_HWID={0x6, 0x18, 0x80}]}}}, @IFLA_MASTER={0x8, 0x3, r6}]}, 0x90}}, 0x20009000) 02:47:04 executing program 5: write$binfmt_script(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="2321202e2f66696c65302073797a0a2500363ccff96ffbb1a15acc111fe6a5a0dcdb9040647b52e5720e9e2bf61bb087f5015b8bbc452f021c2e299de43e669db3a9485775ae6375452ac6810aa81fa8c4332f02f2250a82cd87fc723a125df02a2b97710843694ab6460fe7f51d146afd45185abea173b2984ffeacca2cd984f8ce7e600d760d9b2ea73400"/150], 0x4a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x4) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, 0x0, 0x40) r2 = dup3(r1, r0, 0x0) sendmsg$NL80211_CMD_SET_BEACON(r2, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x4008014) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r3, 0x401870c8, &(0x7f0000000040)={0xf18}) keyctl$set_reqkey_keyring(0xe, 0x1) r4 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r4, 0x2e, 0xce, 0x53c132ef) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) r5 = socket(0x1, 0x3, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newlink={0x90, 0x10, 0x401, 0x70bd27, 0x25dfdbfa, {0x0, 0x0, 0x0, 0x0, 0x0, 0x184a0}, [@IFLA_LINKINFO={0x68, 0x12, 0x0, 0x1, @ip6erspan={{0xe}, {0x54, 0x2, 0x0, 0x1, [@IFLA_GRE_ERSPAN_INDEX={0x8, 0x15, 0x82605}, @IFLA_GRE_ENCAP_FLAGS={0x6, 0xf, 0x2}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_FLOWINFO={0x8, 0xc, 0x9}, @IFLA_GRE_ERSPAN_VER={0x5, 0x16, 0x1}, @IFLA_GRE_ERSPAN_INDEX={0x8, 0x15, 0x9bde8}, @IFLA_GRE_ERSPAN_DIR={0x5}, @IFLA_GRE_LOCAL={0x14, 0x6, @loopback}, @IFLA_GRE_ERSPAN_HWID={0x6, 0x18, 0x80}]}}}, @IFLA_MASTER={0x8, 0x3, r6}]}, 0x90}}, 0x20009000) 02:47:04 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x400000000001, 0x84) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r3 = accept$alg(r2, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000280)=ANY=[], 0xffffffef) recvmmsg(r3, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/89, 0x59}, {&(0x7f0000000140)=""/72, 0x20000188}], 0x2}}], 0x2, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r4, 0x541d, &(0x7f0000000000)={0x2, {0x3, 0x0, 0x0, 0x400}}) bind$alg(r2, &(0x7f0000000280)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha384\x00'}, 0x58) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, &(0x7f0000000080)) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x2, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}}, 0x40) socket$inet_tcp(0x2, 0x1, 0x0) r6 = perf_event_open(&(0x7f0000002440)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = dup3(0xffffffffffffffff, r6, 0x80000) read$FUSE(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000300)) mkdirat$cgroup(r7, &(0x7f0000000140)='syz0\x00', 0x1ff) read$FUSE(r7, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x10, r7, &(0x7f0000000000)='./file0\x00') r8 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) mkdirat$cgroup(r8, &(0x7f0000000140)='syz0\x00', 0x1ff) read$FUSE(r8, 0x0, 0x0) openat$cgroup_ro(r8, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) 02:47:04 executing program 0: write$binfmt_script(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="2321202e2f66696c65302073797a0a2500363ccff96ffbb1a15acc111fe6a5a0dcdb9040647b52e5720e9e2bf61bb087f5015b8bbc452f021c2e299de43e669db3a9485775ae6375452ac6810aa81fa8c4332f02f2250a82cd87fc723a125df02a2b97710843694ab6460fe7f51d146afd45185abea173b2984ffeacca2cd984f8ce7e600d760d9b2ea73400"/150], 0x4a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x4) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, 0x0, 0x40) r2 = dup3(r1, r0, 0x0) sendmsg$NL80211_CMD_SET_BEACON(r2, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x4008014) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r3, 0x401870c8, &(0x7f0000000040)={0xf18}) keyctl$set_reqkey_keyring(0xe, 0x1) r4 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r4, 0x2e, 0xce, 0x53c132ef) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) r5 = socket(0x1, 0x3, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newlink={0x90, 0x10, 0x401, 0x70bd27, 0x25dfdbfa, {0x0, 0x0, 0x0, 0x0, 0x0, 0x184a0}, [@IFLA_LINKINFO={0x68, 0x12, 0x0, 0x1, @ip6erspan={{0xe}, {0x54, 0x2, 0x0, 0x1, [@IFLA_GRE_ERSPAN_INDEX={0x8, 0x15, 0x82605}, @IFLA_GRE_ENCAP_FLAGS={0x6, 0xf, 0x2}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_FLOWINFO={0x8, 0xc, 0x9}, @IFLA_GRE_ERSPAN_VER={0x5, 0x16, 0x1}, @IFLA_GRE_ERSPAN_INDEX={0x8, 0x15, 0x9bde8}, @IFLA_GRE_ERSPAN_DIR={0x5}, @IFLA_GRE_LOCAL={0x14, 0x6, @loopback}, @IFLA_GRE_ERSPAN_HWID={0x6, 0x18, 0x80}]}}}, @IFLA_MASTER={0x8, 0x3, r6}]}, 0x90}}, 0x20009000) 02:47:04 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="380000000d0601040000000000000000000000000500010006000000050005000300000012000300686173683a6e65742c706f72740000004f9fd5a2f4179f8da014cb3666c33ef83874469e971a5e4b874cc862604839043936da70eb12e4cec1621ac38abec2e4192e471edb0f6e181e30f12e48f92197521399cda241c8750e229d3655fa022d50b2c9ba03b1792318054d45a5d3fd662a067f89bae78c01b236f38e3ac4cacd6b76e3a78eb8a7a021c4489f285074b458f9ea4a564c453f417696b81ea3b8f1d4d7277dc24ac113c91ea096e05ec5a4996648fb5886dfd109754ab1df27cbe3b2a3140964ff3cb712347c774d7da8bd9de9a7c963c1aae45f6807f0dfd43955b596c182181ae7"], 0x38}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60932b1c00142b00fe80000000000000000000c943c38d1ebe87459ce800000000bbfe8000000000000000000000000000aa0000003a", @ANYRES32=0x41424344, @ANYRES64=r0], 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/204, 0xcc}, {&(0x7f0000000780)=""/251, 0xfb}], 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r2, 0x5414, &(0x7f0000000000)=0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_debug_messages', 0x288401, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0x14e6}}, './file0\x00'}) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f00000000c0)={0x5, 0x9, 0x135, 0xffffffff, 0x0, "1db8a98d1924fa2471f348b7c0214bbaf41102", 0x51, 0x9}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x4) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r6, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}, 0x0, {[0x0, 0x0, 0x0, 0x200000, 0x2]}}, 0x5c) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000000)=0x20, 0x4) r7 = fcntl$dupfd(r6, 0x406, r6) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000080), 0x10) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f0000000280)={&(0x7f0000000000)={0x1d, r10}, 0x10, &(0x7f0000000200)={&(0x7f00000002c0)={0x2, 0x11, 0x0, {0x0, 0x2710}, {}, {}, 0x300, @can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "e428269dbde6b9b1"}}, 0x48}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) setsockopt$MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000040)={0x0, 0x0, 0x7f, r10, 0x1}, 0xc) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x1e8, 0x9403, 0x0, 0x0, 0x2c0, 0x2d8, 0x3d8, 0x3d8, 0x2d8, 0x3d8, 0x3, 0x0, {[{{@ipv6={@remote, @local, [0xffffffff, 0xff, 0xffffff00, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], 'erspan0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x2f, 0x3, 0x1, 0x7f}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@dscp={{0x28}, {0x9, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x8, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x11000, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x88001, 0x0) 02:47:04 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x38}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60932b1c00142b00fe80000000000000000000c943c38d1ebe87459ce800000000bbfe8000000000000000000000000000aa0000003a", @ANYRES32=0x41424344, @ANYRES64=r0], 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/204, 0xcc}, {&(0x7f0000000780)=""/251, 0xfb}], 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r2, 0x5414, &(0x7f0000000000)=0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_debug_messages', 0x288401, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0x14e6}}, './file0\x00'}) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f00000000c0)={0x5, 0x9, 0x135, 0xffffffff, 0x0, "1db8a98d1924fa2471f348b7c0214bbaf41102", 0x51, 0x9}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x4) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r6, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}, 0x0, {[0x0, 0x0, 0x0, 0x200000, 0x2]}}, 0x5c) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000000)=0x20, 0x4) r7 = fcntl$dupfd(r6, 0x406, r6) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000080), 0x10) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f0000000280)={&(0x7f0000000000)={0x1d, r10}, 0x10, &(0x7f0000000200)={&(0x7f00000002c0)={0x2, 0x11, 0x0, {0x0, 0x2710}, {}, {}, 0x300, @can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "e428269dbde6b9b1"}}, 0x48}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) setsockopt$MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000040)={0x0, 0x0, 0x7f, r10, 0x1}, 0xc) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x1e8, 0x9403, 0x0, 0x0, 0x2c0, 0x2d8, 0x3d8, 0x3d8, 0x2d8, 0x3d8, 0x3, 0x0, {[{{@ipv6={@remote, @local, [0xffffffff, 0xff, 0xffffff00, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], 'erspan0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x2f, 0x3, 0x1, 0x7f}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@dscp={{0x28}, {0x9, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x8, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x11000, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x88001, 0x0) 02:47:04 executing program 5: write$binfmt_script(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="2321202e2f66696c65302073797a0a2500363ccff96ffbb1a15acc111fe6a5a0dcdb9040647b52e5720e9e2bf61bb087f5015b8bbc452f021c2e299de43e669db3a9485775ae6375452ac6810aa81fa8c4332f02f2250a82cd87fc723a125df02a2b97710843694ab6460fe7f51d146afd45185abea173b2984ffeacca2cd984f8ce7e600d760d9b2ea73400"/150], 0x4a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x4) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, 0x0, 0x40) r2 = dup3(r1, r0, 0x0) sendmsg$NL80211_CMD_SET_BEACON(r2, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x4008014) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r3, 0x401870c8, &(0x7f0000000040)={0xf18}) keyctl$set_reqkey_keyring(0xe, 0x1) r4 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r4, 0x2e, 0xce, 0x53c132ef) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) r5 = socket(0x1, 0x3, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newlink={0x90, 0x10, 0x401, 0x70bd27, 0x25dfdbfa, {0x0, 0x0, 0x0, 0x0, 0x0, 0x184a0}, [@IFLA_LINKINFO={0x68, 0x12, 0x0, 0x1, @ip6erspan={{0xe}, {0x54, 0x2, 0x0, 0x1, [@IFLA_GRE_ERSPAN_INDEX={0x8, 0x15, 0x82605}, @IFLA_GRE_ENCAP_FLAGS={0x6, 0xf, 0x2}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_FLOWINFO={0x8, 0xc, 0x9}, @IFLA_GRE_ERSPAN_VER={0x5, 0x16, 0x1}, @IFLA_GRE_ERSPAN_INDEX={0x8, 0x15, 0x9bde8}, @IFLA_GRE_ERSPAN_DIR={0x5}, @IFLA_GRE_LOCAL={0x14, 0x6, @loopback}, @IFLA_GRE_ERSPAN_HWID={0x6, 0x18, 0x80}]}}}, @IFLA_MASTER={0x8, 0x3, r6}]}, 0x90}}, 0x20009000) 02:47:04 executing program 3: write$binfmt_script(0xffffffffffffffff, &(0x7f00000003c0)=ANY=[@ANYBLOB="2321202e2f66696c65302073797a0a2500363ccff96ffbb1a15acc111fe6a5a0dcdb9040647b52e5720e9e2bf61bb087f5015b8bbc452f021c2e299de43e669db3a9485775ae6375452ac6810aa81fa8c4332f02f2250a82cd87fc723a125df02a2b97710843694ab6460fe7f51d146afd45185abea173b2984ffeacca2cd984f8ce7e600d760d9b2ea73400"/150], 0x4a) r0 = socket$nl_route(0x10, 0x3, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x4) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x2001001, 0x0) r1 = perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x40000}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) sendmsg$DEVLINK_CMD_SB_OCC_MAX_CLEAR(0xffffffffffffffff, 0x0, 0x40) r2 = dup3(r1, r0, 0x0) sendmsg$NL80211_CMD_SET_BEACON(r2, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000000}, 0x4008014) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='syscall\x00') ioctl$IOC_PR_REGISTER(r3, 0x401870c8, &(0x7f0000000040)={0xf18}) keyctl$set_reqkey_keyring(0xe, 0x1) r4 = socket$nl_route(0x10, 0x3, 0x0) fallocate(r4, 0x2e, 0xce, 0x53c132ef) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x7) r5 = socket(0x1, 0x3, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newlink={0x90, 0x10, 0x401, 0x70bd27, 0x25dfdbfa, {0x0, 0x0, 0x0, 0x0, 0x0, 0x184a0}, [@IFLA_LINKINFO={0x68, 0x12, 0x0, 0x1, @ip6erspan={{0xe}, {0x54, 0x2, 0x0, 0x1, [@IFLA_GRE_ERSPAN_INDEX={0x8, 0x15, 0x82605}, @IFLA_GRE_ENCAP_FLAGS={0x6, 0xf, 0x2}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_FLOWINFO={0x8, 0xc, 0x9}, @IFLA_GRE_ERSPAN_VER={0x5, 0x16, 0x1}, @IFLA_GRE_ERSPAN_INDEX={0x8, 0x15, 0x9bde8}, @IFLA_GRE_ERSPAN_DIR={0x5}, @IFLA_GRE_LOCAL={0x14, 0x6, @loopback}, @IFLA_GRE_ERSPAN_HWID={0x6, 0x18, 0x80}]}}}, @IFLA_MASTER={0x8, 0x3, r6}]}, 0x90}}, 0x20009000) 02:47:05 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x38}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60932b1c00142b00fe80000000000000000000c943c38d1ebe87459ce800000000bbfe8000000000000000000000000000aa0000003a", @ANYRES32=0x41424344, @ANYRES64=r0], 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/204, 0xcc}, {&(0x7f0000000780)=""/251, 0xfb}], 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r2, 0x5414, &(0x7f0000000000)=0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_debug_messages', 0x288401, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0x14e6}}, './file0\x00'}) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f00000000c0)={0x5, 0x9, 0x135, 0xffffffff, 0x0, "1db8a98d1924fa2471f348b7c0214bbaf41102", 0x51, 0x9}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x4) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r6, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}, 0x0, {[0x0, 0x0, 0x0, 0x200000, 0x2]}}, 0x5c) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000000)=0x20, 0x4) r7 = fcntl$dupfd(r6, 0x406, r6) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000080), 0x10) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f0000000280)={&(0x7f0000000000)={0x1d, r10}, 0x10, &(0x7f0000000200)={&(0x7f00000002c0)={0x2, 0x11, 0x0, {0x0, 0x2710}, {}, {}, 0x300, @can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "e428269dbde6b9b1"}}, 0x48}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) setsockopt$MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000040)={0x0, 0x0, 0x7f, r10, 0x1}, 0xc) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x1e8, 0x9403, 0x0, 0x0, 0x2c0, 0x2d8, 0x3d8, 0x3d8, 0x2d8, 0x3d8, 0x3, 0x0, {[{{@ipv6={@remote, @local, [0xffffffff, 0xff, 0xffffff00, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], 'erspan0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x2f, 0x3, 0x1, 0x7f}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@dscp={{0x28}, {0x9, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x8, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x11000, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x88001, 0x0) [ 909.037933] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables 02:47:05 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x38}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60932b1c00142b00fe80000000000000000000c943c38d1ebe87459ce800000000bbfe8000000000000000000000000000aa0000003a", @ANYRES32=0x41424344, @ANYRES64=r0], 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/204, 0xcc}, {&(0x7f0000000780)=""/251, 0xfb}], 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r2, 0x5414, &(0x7f0000000000)=0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_debug_messages', 0x288401, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0x14e6}}, './file0\x00'}) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f00000000c0)={0x5, 0x9, 0x135, 0xffffffff, 0x0, "1db8a98d1924fa2471f348b7c0214bbaf41102", 0x51, 0x9}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x4) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r6, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}, 0x0, {[0x0, 0x0, 0x0, 0x200000, 0x2]}}, 0x5c) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000000)=0x20, 0x4) r7 = fcntl$dupfd(r6, 0x406, r6) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000080), 0x10) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f0000000280)={&(0x7f0000000000)={0x1d, r10}, 0x10, &(0x7f0000000200)={&(0x7f00000002c0)={0x2, 0x11, 0x0, {0x0, 0x2710}, {}, {}, 0x300, @can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "e428269dbde6b9b1"}}, 0x48}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) setsockopt$MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000040)={0x0, 0x0, 0x7f, r10, 0x1}, 0xc) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x1e8, 0x9403, 0x0, 0x0, 0x2c0, 0x2d8, 0x3d8, 0x3d8, 0x2d8, 0x3d8, 0x3, 0x0, {[{{@ipv6={@remote, @local, [0xffffffff, 0xff, 0xffffff00, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], 'erspan0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x2f, 0x3, 0x1, 0x7f}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@dscp={{0x28}, {0x9, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x8, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x11000, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x88001, 0x0) [ 909.083732] xt_CT: You must specify a L4 protocol and not use inversions on it [ 909.093732] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables [ 909.115130] xt_CT: You must specify a L4 protocol and not use inversions on it 02:47:05 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x38}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60932b1c00142b00fe80000000000000000000c943c38d1ebe87459ce800000000bbfe8000000000000000000000000000aa0000003a", @ANYRES32=0x41424344, @ANYRES64=r0], 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/204, 0xcc}, {&(0x7f0000000780)=""/251, 0xfb}], 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r2, 0x5414, &(0x7f0000000000)=0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_debug_messages', 0x288401, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0x14e6}}, './file0\x00'}) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f00000000c0)={0x5, 0x9, 0x135, 0xffffffff, 0x0, "1db8a98d1924fa2471f348b7c0214bbaf41102", 0x51, 0x9}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x4) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r6, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}, 0x0, {[0x0, 0x0, 0x0, 0x200000, 0x2]}}, 0x5c) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000000)=0x20, 0x4) r7 = fcntl$dupfd(r6, 0x406, r6) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000080), 0x10) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f0000000280)={&(0x7f0000000000)={0x1d, r10}, 0x10, &(0x7f0000000200)={&(0x7f00000002c0)={0x2, 0x11, 0x0, {0x0, 0x2710}, {}, {}, 0x300, @can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "e428269dbde6b9b1"}}, 0x48}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) setsockopt$MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000040)={0x0, 0x0, 0x7f, r10, 0x1}, 0xc) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x1e8, 0x9403, 0x0, 0x0, 0x2c0, 0x2d8, 0x3d8, 0x3d8, 0x2d8, 0x3d8, 0x3, 0x0, {[{{@ipv6={@remote, @local, [0xffffffff, 0xff, 0xffffff00, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], 'erspan0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x2f, 0x3, 0x1, 0x7f}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@dscp={{0x28}, {0x9, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x8, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x11000, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x88001, 0x0) 02:47:05 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x38}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60932b1c00142b00fe80000000000000000000c943c38d1ebe87459ce800000000bbfe8000000000000000000000000000aa0000003a", @ANYRES32=0x41424344, @ANYRES64=r0], 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/204, 0xcc}, {&(0x7f0000000780)=""/251, 0xfb}], 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r2, 0x5414, &(0x7f0000000000)=0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_debug_messages', 0x288401, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0x14e6}}, './file0\x00'}) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f00000000c0)={0x5, 0x9, 0x135, 0xffffffff, 0x0, "1db8a98d1924fa2471f348b7c0214bbaf41102", 0x51, 0x9}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x4) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r6, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}, 0x0, {[0x0, 0x0, 0x0, 0x200000, 0x2]}}, 0x5c) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000000)=0x20, 0x4) r7 = fcntl$dupfd(r6, 0x406, r6) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000080), 0x10) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f0000000280)={&(0x7f0000000000)={0x1d, r10}, 0x10, &(0x7f0000000200)={&(0x7f00000002c0)={0x2, 0x11, 0x0, {0x0, 0x2710}, {}, {}, 0x300, @can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "e428269dbde6b9b1"}}, 0x48}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) setsockopt$MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000040)={0x0, 0x0, 0x7f, r10, 0x1}, 0xc) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x1e8, 0x9403, 0x0, 0x0, 0x2c0, 0x2d8, 0x3d8, 0x3d8, 0x2d8, 0x3d8, 0x3, 0x0, {[{{@ipv6={@remote, @local, [0xffffffff, 0xff, 0xffffff00, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], 'erspan0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x2f, 0x3, 0x1, 0x7f}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@dscp={{0x28}, {0x9, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x8, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x11000, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x88001, 0x0) 02:47:05 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="380000000d0601040000000000000000000000000500010006000000050005000300000012000300686173683a6e65742c706f72740000004f9fd5a2f4179f8da014cb3666c33ef83874469e971a5e4b874cc862604839043936da70eb12e4cec1621ac38abec2e4192e471edb0f6e181e30f12e48f92197521399cda241c8750e229d3655fa022d50b2c9ba03b1792318054d45a5d3fd662a067f89bae78c01b236f38e3ac4cacd6b76e3a78eb8a7a021c4489f285074b458f9ea4a564c453f417696b81ea3b8f1d4d7277dc24ac113c91ea096e05ec5a4996648fb5886dfd109754ab1df27cbe3b2a3140964ff3cb712347c774d7da8bd9de9a7c963c1aae45f6807f0dfd43955b596c182181ae7"], 0x38}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60932b1c00142b00fe80000000000000000000c943c38d1ebe87459ce800000000bbfe8000000000000000000000000000aa0000003a", @ANYRES32=0x41424344, @ANYRES64=r0], 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/204, 0xcc}, {&(0x7f0000000780)=""/251, 0xfb}], 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r2, 0x5414, &(0x7f0000000000)=0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_debug_messages', 0x288401, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0x14e6}}, './file0\x00'}) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f00000000c0)={0x5, 0x9, 0x135, 0xffffffff, 0x0, "1db8a98d1924fa2471f348b7c0214bbaf41102", 0x51, 0x9}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x4) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r6, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}, 0x0, {[0x0, 0x0, 0x0, 0x200000, 0x2]}}, 0x5c) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000000)=0x20, 0x4) r7 = fcntl$dupfd(r6, 0x406, r6) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000080), 0x10) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f0000000280)={&(0x7f0000000000)={0x1d, r10}, 0x10, &(0x7f0000000200)={&(0x7f00000002c0)={0x2, 0x11, 0x0, {0x0, 0x2710}, {}, {}, 0x300, @can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "e428269dbde6b9b1"}}, 0x48}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) setsockopt$MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000040)={0x0, 0x0, 0x7f, r10, 0x1}, 0xc) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x1e8, 0x9403, 0x0, 0x0, 0x2c0, 0x2d8, 0x3d8, 0x3d8, 0x2d8, 0x3d8, 0x3, 0x0, {[{{@ipv6={@remote, @local, [0xffffffff, 0xff, 0xffffff00, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], 'erspan0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x2f, 0x3, 0x1, 0x7f}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@dscp={{0x28}, {0x9, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x8, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x11000, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x88001, 0x0) [ 909.321850] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables [ 909.357460] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables [ 909.402240] xt_CT: You must specify a L4 protocol and not use inversions on it [ 909.505151] xt_CT: You must specify a L4 protocol and not use inversions on it 02:47:05 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x38}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60932b1c00142b00fe80000000000000000000c943c38d1ebe87459ce800000000bbfe8000000000000000000000000000aa0000003a", @ANYRES32=0x41424344, @ANYRES64=r0], 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/204, 0xcc}, {&(0x7f0000000780)=""/251, 0xfb}], 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r2, 0x5414, &(0x7f0000000000)=0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_debug_messages', 0x288401, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0x14e6}}, './file0\x00'}) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f00000000c0)={0x5, 0x9, 0x135, 0xffffffff, 0x0, "1db8a98d1924fa2471f348b7c0214bbaf41102", 0x51, 0x9}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x4) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r6, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}, 0x0, {[0x0, 0x0, 0x0, 0x200000, 0x2]}}, 0x5c) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000000)=0x20, 0x4) r7 = fcntl$dupfd(r6, 0x406, r6) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000080), 0x10) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f0000000280)={&(0x7f0000000000)={0x1d, r10}, 0x10, &(0x7f0000000200)={&(0x7f00000002c0)={0x2, 0x11, 0x0, {0x0, 0x2710}, {}, {}, 0x300, @can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "e428269dbde6b9b1"}}, 0x48}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) setsockopt$MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000040)={0x0, 0x0, 0x7f, r10, 0x1}, 0xc) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x1e8, 0x9403, 0x0, 0x0, 0x2c0, 0x2d8, 0x3d8, 0x3d8, 0x2d8, 0x3d8, 0x3, 0x0, {[{{@ipv6={@remote, @local, [0xffffffff, 0xff, 0xffffff00, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], 'erspan0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x2f, 0x3, 0x1, 0x7f}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@dscp={{0x28}, {0x9, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x8, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x11000, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x88001, 0x0) 02:47:05 executing program 2: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_sctp(0x2, 0x400000000001, 0x84) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r3 = accept$alg(r2, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000280)=ANY=[], 0xffffffef) recvmmsg(r3, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000000c0)=""/89, 0x59}, {&(0x7f0000000140)=""/72, 0x20000188}], 0x2}}], 0x2, 0x0, 0x0) sendto$inet(r1, &(0x7f0000000140)='^', 0x34000, 0x0, &(0x7f0000004ff0)={0x2, 0x0, @rand_addr=0xfffffffffffffffe}, 0x10) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r4, 0x541d, &(0x7f0000000000)={0x2, {0x3, 0x0, 0x0, 0x400}}) bind$alg(r2, &(0x7f0000000280)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha384\x00'}, 0x58) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8946, &(0x7f0000000080)) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x2, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}}, 0x40) socket$inet_tcp(0x2, 0x1, 0x0) r6 = perf_event_open(&(0x7f0000002440)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = dup3(0xffffffffffffffff, r6, 0x80000) read$FUSE(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000300)) mkdirat$cgroup(r7, &(0x7f0000000140)='syz0\x00', 0x1ff) read$FUSE(r7, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x1, 0x10, r7, &(0x7f0000000000)='./file0\x00') r8 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) mkdirat$cgroup(r8, &(0x7f0000000140)='syz0\x00', 0x1ff) read$FUSE(r8, 0x0, 0x0) openat$cgroup_ro(r8, &(0x7f0000000040)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) 02:47:05 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x38}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60932b1c00142b00fe80000000000000000000c943c38d1ebe87459ce800000000bbfe8000000000000000000000000000aa0000003a", @ANYRES32=0x41424344, @ANYRES64=r0], 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/204, 0xcc}, {&(0x7f0000000780)=""/251, 0xfb}], 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r2, 0x5414, &(0x7f0000000000)=0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_debug_messages', 0x288401, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0x14e6}}, './file0\x00'}) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f00000000c0)={0x5, 0x9, 0x135, 0xffffffff, 0x0, "1db8a98d1924fa2471f348b7c0214bbaf41102", 0x51, 0x9}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x4) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r6, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}, 0x0, {[0x0, 0x0, 0x0, 0x200000, 0x2]}}, 0x5c) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000000)=0x20, 0x4) r7 = fcntl$dupfd(r6, 0x406, r6) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000080), 0x10) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f0000000280)={&(0x7f0000000000)={0x1d, r10}, 0x10, &(0x7f0000000200)={&(0x7f00000002c0)={0x2, 0x11, 0x0, {0x0, 0x2710}, {}, {}, 0x300, @can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "e428269dbde6b9b1"}}, 0x48}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) setsockopt$MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000040)={0x0, 0x0, 0x7f, r10, 0x1}, 0xc) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x1e8, 0x9403, 0x0, 0x0, 0x2c0, 0x2d8, 0x3d8, 0x3d8, 0x2d8, 0x3d8, 0x3, 0x0, {[{{@ipv6={@remote, @local, [0xffffffff, 0xff, 0xffffff00, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], 'erspan0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x2f, 0x3, 0x1, 0x7f}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@dscp={{0x28}, {0x9, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x8, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x11000, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x88001, 0x0) [ 909.634254] xt_CT: You must specify a L4 protocol and not use inversions on it [ 909.643165] xt_CT: You must specify a L4 protocol and not use inversions on it 02:47:05 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="380000000d0601040000000000000000000000000500010006000000050005000300000012000300686173683a6e65742c706f72740000004f9fd5a2f4179f8da014cb3666c33ef83874469e971a5e4b874cc862604839043936da70eb12e4cec1621ac38abec2e4192e471edb0f6e181e30f12e48f92197521399cda241c8750e229d3655fa022d50b2c9ba03b1792318054d45a5d3fd662a067f89bae78c01b236f38e3ac4cacd6b76e3a78eb8a7a021c4489f285074b458f9ea4a564c453f417696b81ea3b8f1d4d7277dc24ac113c91ea096e05ec5a4996648fb5886dfd109754ab1df27cbe3b2a3140964ff3cb712347c774d7da8bd9de9a7c963c1aae45f6807f0dfd43955b596c182181ae7"], 0x38}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60932b1c00142b00fe80000000000000000000c943c38d1ebe87459ce800000000bbfe8000000000000000000000000000aa0000003a", @ANYRES32=0x41424344, @ANYRES64=r0], 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/204, 0xcc}, {&(0x7f0000000780)=""/251, 0xfb}], 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r2, 0x5414, &(0x7f0000000000)=0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_debug_messages', 0x288401, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0x14e6}}, './file0\x00'}) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f00000000c0)={0x5, 0x9, 0x135, 0xffffffff, 0x0, "1db8a98d1924fa2471f348b7c0214bbaf41102", 0x51, 0x9}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x4) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r6, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}, 0x0, {[0x0, 0x0, 0x0, 0x200000, 0x2]}}, 0x5c) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000000)=0x20, 0x4) r7 = fcntl$dupfd(r6, 0x406, r6) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000080), 0x10) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f0000000280)={&(0x7f0000000000)={0x1d, r10}, 0x10, &(0x7f0000000200)={&(0x7f00000002c0)={0x2, 0x11, 0x0, {0x0, 0x2710}, {}, {}, 0x300, @can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "e428269dbde6b9b1"}}, 0x48}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) setsockopt$MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000040)={0x0, 0x0, 0x7f, r10, 0x1}, 0xc) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x1e8, 0x9403, 0x0, 0x0, 0x2c0, 0x2d8, 0x3d8, 0x3d8, 0x2d8, 0x3d8, 0x3, 0x0, {[{{@ipv6={@remote, @local, [0xffffffff, 0xff, 0xffffff00, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], 'erspan0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x2f, 0x3, 0x1, 0x7f}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@dscp={{0x28}, {0x9, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x8, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x11000, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x88001, 0x0) 02:47:05 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x38}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60932b1c00142b00fe80000000000000000000c943c38d1ebe87459ce800000000bbfe8000000000000000000000000000aa0000003a", @ANYRES32=0x41424344, @ANYRES64=r0], 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/204, 0xcc}, {&(0x7f0000000780)=""/251, 0xfb}], 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r2, 0x5414, &(0x7f0000000000)=0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_debug_messages', 0x288401, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0x14e6}}, './file0\x00'}) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f00000000c0)={0x5, 0x9, 0x135, 0xffffffff, 0x0, "1db8a98d1924fa2471f348b7c0214bbaf41102", 0x51, 0x9}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x4) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r6, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}, 0x0, {[0x0, 0x0, 0x0, 0x200000, 0x2]}}, 0x5c) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000000)=0x20, 0x4) r7 = fcntl$dupfd(r6, 0x406, r6) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000080), 0x10) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f0000000280)={&(0x7f0000000000)={0x1d, r10}, 0x10, &(0x7f0000000200)={&(0x7f00000002c0)={0x2, 0x11, 0x0, {0x0, 0x2710}, {}, {}, 0x300, @can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "e428269dbde6b9b1"}}, 0x48}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) setsockopt$MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000040)={0x0, 0x0, 0x7f, r10, 0x1}, 0xc) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x1e8, 0x9403, 0x0, 0x0, 0x2c0, 0x2d8, 0x3d8, 0x3d8, 0x2d8, 0x3d8, 0x3, 0x0, {[{{@ipv6={@remote, @local, [0xffffffff, 0xff, 0xffffff00, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], 'erspan0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x2f, 0x3, 0x1, 0x7f}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@dscp={{0x28}, {0x9, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x8, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x11000, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x88001, 0x0) [ 909.699706] xt_CT: You must specify a L4 protocol and not use inversions on it 02:47:05 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x38}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60932b1c00142b00fe80000000000000000000c943c38d1ebe87459ce800000000bbfe8000000000000000000000000000aa0000003a", @ANYRES32=0x41424344, @ANYRES64=r0], 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/204, 0xcc}, {&(0x7f0000000780)=""/251, 0xfb}], 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r2, 0x5414, &(0x7f0000000000)=0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_debug_messages', 0x288401, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0x14e6}}, './file0\x00'}) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f00000000c0)={0x5, 0x9, 0x135, 0xffffffff, 0x0, "1db8a98d1924fa2471f348b7c0214bbaf41102", 0x51, 0x9}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x4) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r6, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}, 0x0, {[0x0, 0x0, 0x0, 0x200000, 0x2]}}, 0x5c) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000000)=0x20, 0x4) r7 = fcntl$dupfd(r6, 0x406, r6) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000080), 0x10) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f0000000280)={&(0x7f0000000000)={0x1d, r10}, 0x10, &(0x7f0000000200)={&(0x7f00000002c0)={0x2, 0x11, 0x0, {0x0, 0x2710}, {}, {}, 0x300, @can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "e428269dbde6b9b1"}}, 0x48}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) setsockopt$MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000040)={0x0, 0x0, 0x7f, r10, 0x1}, 0xc) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x1e8, 0x9403, 0x0, 0x0, 0x2c0, 0x2d8, 0x3d8, 0x3d8, 0x2d8, 0x3d8, 0x3, 0x0, {[{{@ipv6={@remote, @local, [0xffffffff, 0xff, 0xffffff00, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], 'erspan0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x2f, 0x3, 0x1, 0x7f}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@dscp={{0x28}, {0x9, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x8, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x11000, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x88001, 0x0) [ 909.809684] xt_CT: You must specify a L4 protocol and not use inversions on it 02:47:06 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="380000000d0601040000000000000000000000000500010006000000050005000300000012000300686173683a6e65742c706f72740000004f9fd5a2f4179f8da014cb3666c33ef83874469e971a5e4b874cc862604839043936da70eb12e4cec1621ac38abec2e4192e471edb0f6e181e30f12e48f92197521399cda241c8750e229d3655fa022d50b2c9ba03b1792318054d45a5d3fd662a067f89bae78c01b236f38e3ac4cacd6b76e3a78eb8a7a021c4489f285074b458f9ea4a564c453f417696b81ea3b8f1d4d7277dc24ac113c91ea096e05ec5a4996648fb5886dfd109754ab1df27cbe3b2a3140964ff3cb712347c774d7da8bd9de9a7c963c1aae45f6807f0dfd43955b596c182181ae7"], 0x38}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60932b1c00142b00fe80000000000000000000c943c38d1ebe87459ce800000000bbfe8000000000000000000000000000aa0000003a", @ANYRES32=0x41424344, @ANYRES64=r0], 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/204, 0xcc}, {&(0x7f0000000780)=""/251, 0xfb}], 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r2, 0x5414, &(0x7f0000000000)=0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_debug_messages', 0x288401, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0x14e6}}, './file0\x00'}) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f00000000c0)={0x5, 0x9, 0x135, 0xffffffff, 0x0, "1db8a98d1924fa2471f348b7c0214bbaf41102", 0x51, 0x9}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x4) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r6, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}, 0x0, {[0x0, 0x0, 0x0, 0x200000, 0x2]}}, 0x5c) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000000)=0x20, 0x4) r7 = fcntl$dupfd(r6, 0x406, r6) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000080), 0x10) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f0000000280)={&(0x7f0000000000)={0x1d, r10}, 0x10, &(0x7f0000000200)={&(0x7f00000002c0)={0x2, 0x11, 0x0, {0x0, 0x2710}, {}, {}, 0x300, @can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "e428269dbde6b9b1"}}, 0x48}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) setsockopt$MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000040)={0x0, 0x0, 0x7f, r10, 0x1}, 0xc) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x1e8, 0x9403, 0x0, 0x0, 0x2c0, 0x2d8, 0x3d8, 0x3d8, 0x2d8, 0x3d8, 0x3, 0x0, {[{{@ipv6={@remote, @local, [0xffffffff, 0xff, 0xffffff00, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], 'erspan0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x2f, 0x3, 0x1, 0x7f}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@dscp={{0x28}, {0x9, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x8, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x11000, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x88001, 0x0) [ 909.875296] xt_CT: You must specify a L4 protocol and not use inversions on it 02:47:06 executing program 5: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="380000000d0601040000000000000000000000000500010006000000050005000300000012000300686173683a6e65742c706f72740000004f9fd5a2f4179f8da014cb3666c33ef83874469e971a5e4b874cc862604839043936da70eb12e4cec1621ac38abec2e4192e471edb0f6e181e30f12e48f92197521399cda241c8750e229d3655fa022d50b2c9ba03b1792318054d45a5d3fd662a067f89bae78c01b236f38e3ac4cacd6b76e3a78eb8a7a021c4489f285074b458f9ea4a564c453f417696b81ea3b8f1d4d7277dc24ac113c91ea096e05ec5a4996648fb5886dfd109754ab1df27cbe3b2a3140964ff3cb712347c774d7da8bd9de9a7c963c1aae45f6807f0dfd43955b596c182181ae7"], 0x38}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60932b1c00142b00fe80000000000000000000c943c38d1ebe87459ce800000000bbfe8000000000000000000000000000aa0000003a", @ANYRES32=0x41424344, @ANYRES64=r0], 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/204, 0xcc}, {&(0x7f0000000780)=""/251, 0xfb}], 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r2, 0x5414, &(0x7f0000000000)=0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_debug_messages', 0x288401, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0x14e6}}, './file0\x00'}) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f00000000c0)={0x5, 0x9, 0x135, 0xffffffff, 0x0, "1db8a98d1924fa2471f348b7c0214bbaf41102", 0x51, 0x9}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x4) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r6, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}, 0x0, {[0x0, 0x0, 0x0, 0x200000, 0x2]}}, 0x5c) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000000)=0x20, 0x4) r7 = fcntl$dupfd(r6, 0x406, r6) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000080), 0x10) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f0000000280)={&(0x7f0000000000)={0x1d, r10}, 0x10, &(0x7f0000000200)={&(0x7f00000002c0)={0x2, 0x11, 0x0, {0x0, 0x2710}, {}, {}, 0x300, @can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "e428269dbde6b9b1"}}, 0x48}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) setsockopt$MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000040)={0x0, 0x0, 0x7f, r10, 0x1}, 0xc) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x1e8, 0x9403, 0x0, 0x0, 0x2c0, 0x2d8, 0x3d8, 0x3d8, 0x2d8, 0x3d8, 0x3, 0x0, {[{{@ipv6={@remote, @local, [0xffffffff, 0xff, 0xffffff00, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], 'erspan0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x2f, 0x3, 0x1, 0x7f}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@dscp={{0x28}, {0x9, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x8, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x11000, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x88001, 0x0) [ 910.148871] xt_CT: You must specify a L4 protocol and not use inversions on it 02:47:06 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x38}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60932b1c00142b00fe80000000000000000000c943c38d1ebe87459ce800000000bbfe8000000000000000000000000000aa0000003a", @ANYRES32=0x41424344, @ANYRES64=r0], 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/204, 0xcc}, {&(0x7f0000000780)=""/251, 0xfb}], 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r2, 0x5414, &(0x7f0000000000)=0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_debug_messages', 0x288401, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0x14e6}}, './file0\x00'}) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f00000000c0)={0x5, 0x9, 0x135, 0xffffffff, 0x0, "1db8a98d1924fa2471f348b7c0214bbaf41102", 0x51, 0x9}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x4) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r6, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}, 0x0, {[0x0, 0x0, 0x0, 0x200000, 0x2]}}, 0x5c) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000000)=0x20, 0x4) r7 = fcntl$dupfd(r6, 0x406, r6) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000080), 0x10) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f0000000280)={&(0x7f0000000000)={0x1d, r10}, 0x10, &(0x7f0000000200)={&(0x7f00000002c0)={0x2, 0x11, 0x0, {0x0, 0x2710}, {}, {}, 0x300, @can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "e428269dbde6b9b1"}}, 0x48}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) setsockopt$MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000040)={0x0, 0x0, 0x7f, r10, 0x1}, 0xc) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x1e8, 0x9403, 0x0, 0x0, 0x2c0, 0x2d8, 0x3d8, 0x3d8, 0x2d8, 0x3d8, 0x3, 0x0, {[{{@ipv6={@remote, @local, [0xffffffff, 0xff, 0xffffff00, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], 'erspan0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x2f, 0x3, 0x1, 0x7f}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@dscp={{0x28}, {0x9, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x8, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x11000, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x88001, 0x0) 02:47:06 executing program 0: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x38}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60932b1c00142b00fe80000000000000000000c943c38d1ebe87459ce800000000bbfe8000000000000000000000000000aa0000003a", @ANYRES32=0x41424344, @ANYRES64=r0], 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/204, 0xcc}, {&(0x7f0000000780)=""/251, 0xfb}], 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r2, 0x5414, &(0x7f0000000000)=0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_debug_messages', 0x288401, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0x14e6}}, './file0\x00'}) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f00000000c0)={0x5, 0x9, 0x135, 0xffffffff, 0x0, "1db8a98d1924fa2471f348b7c0214bbaf41102", 0x51, 0x9}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x4) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r6, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}, 0x0, {[0x0, 0x0, 0x0, 0x200000, 0x2]}}, 0x5c) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000000)=0x20, 0x4) r7 = fcntl$dupfd(r6, 0x406, r6) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000080), 0x10) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f0000000280)={&(0x7f0000000000)={0x1d, r10}, 0x10, &(0x7f0000000200)={&(0x7f00000002c0)={0x2, 0x11, 0x0, {0x0, 0x2710}, {}, {}, 0x300, @can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "e428269dbde6b9b1"}}, 0x48}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) setsockopt$MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000040)={0x0, 0x0, 0x7f, r10, 0x1}, 0xc) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x1e8, 0x9403, 0x0, 0x0, 0x2c0, 0x2d8, 0x3d8, 0x3d8, 0x2d8, 0x3d8, 0x3, 0x0, {[{{@ipv6={@remote, @local, [0xffffffff, 0xff, 0xffffff00, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], 'erspan0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x2f, 0x3, 0x1, 0x7f}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@dscp={{0x28}, {0x9, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x8, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x11000, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x88001, 0x0) 02:47:06 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x38}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60932b1c00142b00fe80000000000000000000c943c38d1ebe87459ce800000000bbfe8000000000000000000000000000aa0000003a", @ANYRES32=0x41424344, @ANYRES64=r0], 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/204, 0xcc}, {&(0x7f0000000780)=""/251, 0xfb}], 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r2, 0x5414, &(0x7f0000000000)=0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_debug_messages', 0x288401, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0x14e6}}, './file0\x00'}) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f00000000c0)={0x5, 0x9, 0x135, 0xffffffff, 0x0, "1db8a98d1924fa2471f348b7c0214bbaf41102", 0x51, 0x9}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x4) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r6, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}, 0x0, {[0x0, 0x0, 0x0, 0x200000, 0x2]}}, 0x5c) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000000)=0x20, 0x4) r7 = fcntl$dupfd(r6, 0x406, r6) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000080), 0x10) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f0000000280)={&(0x7f0000000000)={0x1d, r10}, 0x10, &(0x7f0000000200)={&(0x7f00000002c0)={0x2, 0x11, 0x0, {0x0, 0x2710}, {}, {}, 0x300, @can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "e428269dbde6b9b1"}}, 0x48}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) setsockopt$MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000040)={0x0, 0x0, 0x7f, r10, 0x1}, 0xc) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x1e8, 0x9403, 0x0, 0x0, 0x2c0, 0x2d8, 0x3d8, 0x3d8, 0x2d8, 0x3d8, 0x3, 0x0, {[{{@ipv6={@remote, @local, [0xffffffff, 0xff, 0xffffff00, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], 'erspan0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x2f, 0x3, 0x1, 0x7f}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@dscp={{0x28}, {0x9, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x8, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x11000, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x88001, 0x0) 02:47:06 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="380000000d0601040000000000000000000000000500010006000000050005000300000012000300686173683a6e65742c706f72740000004f9fd5a2f4179f8da014cb3666c33ef83874469e971a5e4b874cc862604839043936da70eb12e4cec1621ac38abec2e4192e471edb0f6e181e30f12e48f92197521399cda241c8750e229d3655fa022d50b2c9ba03b1792318054d45a5d3fd662a067f89bae78c01b236f38e3ac4cacd6b76e3a78eb8a7a021c4489f285074b458f9ea4a564c453f417696b81ea3b8f1d4d7277dc24ac113c91ea096e05ec5a4996648fb5886dfd109754ab1df27cbe3b2a3140964ff3cb712347c774d7da8bd9de9a7c963c1aae45f6807f0dfd43955b596c182181ae7"], 0x38}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60932b1c00142b00fe80000000000000000000c943c38d1ebe87459ce800000000bbfe8000000000000000000000000000aa0000003a", @ANYRES32=0x41424344, @ANYRES64=r0], 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/204, 0xcc}, {&(0x7f0000000780)=""/251, 0xfb}], 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r2, 0x5414, &(0x7f0000000000)=0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_debug_messages', 0x288401, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0x14e6}}, './file0\x00'}) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f00000000c0)={0x5, 0x9, 0x135, 0xffffffff, 0x0, "1db8a98d1924fa2471f348b7c0214bbaf41102", 0x51, 0x9}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x4) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r6, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}, 0x0, {[0x0, 0x0, 0x0, 0x200000, 0x2]}}, 0x5c) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000000)=0x20, 0x4) r7 = fcntl$dupfd(r6, 0x406, r6) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000080), 0x10) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f0000000280)={&(0x7f0000000000)={0x1d, r10}, 0x10, &(0x7f0000000200)={&(0x7f00000002c0)={0x2, 0x11, 0x0, {0x0, 0x2710}, {}, {}, 0x300, @can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "e428269dbde6b9b1"}}, 0x48}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) setsockopt$MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000040)={0x0, 0x0, 0x7f, r10, 0x1}, 0xc) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x1e8, 0x9403, 0x0, 0x0, 0x2c0, 0x2d8, 0x3d8, 0x3d8, 0x2d8, 0x3d8, 0x3, 0x0, {[{{@ipv6={@remote, @local, [0xffffffff, 0xff, 0xffffff00, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], 'erspan0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x2f, 0x3, 0x1, 0x7f}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@dscp={{0x28}, {0x9, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x8, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x11000, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x88001, 0x0) 02:47:06 executing program 5: sched_setscheduler(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21}}, 0x24) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x62, &(0x7f0000000180)=""/98}, &(0x7f0000000240), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000000)={0x2, 0x0, 0x0, "fd0a"}) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000300)={0x53, 0x0, 0x69, 0x0, @scatter={0x3, 0x0, &(0x7f0000000440)=[{&(0x7f0000000380)=""/169, 0xa9}, {0x0}, {&(0x7f00000002c0)=""/52, 0x34}]}, &(0x7f0000000080)="9f9e6eb304d5f821a9be1f0aa017a2572aefda0b61d98cfcf3d075377bbb83364827d8fdbc1630fd7f79eb88f4589a55e51c3de0a2b0e6c2f73e1c7505da6b1947334be95df2afb0a383dc82e67431dbe93e7a10a10162575c9a711619192d9c149557988b74ff0322", 0x0, 0x4, 0x0, 0x0, 0x0}) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000000)={0x2, 0x0, 0xead, "fd0a"}) syz_mount_image$romfs(0x0, &(0x7f0000002e00)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000005780)={{{@in6=@mcast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@empty}}, &(0x7f0000005880)=0xe8) r2 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)={0x28, r3, 0x2f4b41cae783dc41, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}]}, 0x28}}, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f0000000040)={0x6, 'dvmrp0\x00', {0x5}, 0x5}) 02:47:06 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x38}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60932b1c00142b00fe80000000000000000000c943c38d1ebe87459ce800000000bbfe8000000000000000000000000000aa0000003a", @ANYRES32=0x41424344, @ANYRES64=r0], 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/204, 0xcc}, {&(0x7f0000000780)=""/251, 0xfb}], 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r2, 0x5414, &(0x7f0000000000)=0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_debug_messages', 0x288401, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0x14e6}}, './file0\x00'}) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f00000000c0)={0x5, 0x9, 0x135, 0xffffffff, 0x0, "1db8a98d1924fa2471f348b7c0214bbaf41102", 0x51, 0x9}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x4) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r6, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}, 0x0, {[0x0, 0x0, 0x0, 0x200000, 0x2]}}, 0x5c) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000000)=0x20, 0x4) r7 = fcntl$dupfd(r6, 0x406, r6) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000080), 0x10) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f0000000280)={&(0x7f0000000000)={0x1d, r10}, 0x10, &(0x7f0000000200)={&(0x7f00000002c0)={0x2, 0x11, 0x0, {0x0, 0x2710}, {}, {}, 0x300, @can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "e428269dbde6b9b1"}}, 0x48}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) setsockopt$MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000040)={0x0, 0x0, 0x7f, r10, 0x1}, 0xc) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x1e8, 0x9403, 0x0, 0x0, 0x2c0, 0x2d8, 0x3d8, 0x3d8, 0x2d8, 0x3d8, 0x3, 0x0, {[{{@ipv6={@remote, @local, [0xffffffff, 0xff, 0xffffff00, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], 'erspan0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x2f, 0x3, 0x1, 0x7f}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@dscp={{0x28}, {0x9, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x8, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x11000, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x88001, 0x0) 02:47:06 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x38}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60932b1c00142b00fe80000000000000000000c943c38d1ebe87459ce800000000bbfe8000000000000000000000000000aa0000003a", @ANYRES32=0x41424344, @ANYRES64=r0], 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/204, 0xcc}, {&(0x7f0000000780)=""/251, 0xfb}], 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r2, 0x5414, &(0x7f0000000000)=0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_debug_messages', 0x288401, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0x14e6}}, './file0\x00'}) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f00000000c0)={0x5, 0x9, 0x135, 0xffffffff, 0x0, "1db8a98d1924fa2471f348b7c0214bbaf41102", 0x51, 0x9}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x4) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r6, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}, 0x0, {[0x0, 0x0, 0x0, 0x200000, 0x2]}}, 0x5c) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000000)=0x20, 0x4) r7 = fcntl$dupfd(r6, 0x406, r6) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000080), 0x10) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f0000000280)={&(0x7f0000000000)={0x1d, r10}, 0x10, &(0x7f0000000200)={&(0x7f00000002c0)={0x2, 0x11, 0x0, {0x0, 0x2710}, {}, {}, 0x300, @can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "e428269dbde6b9b1"}}, 0x48}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) setsockopt$MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000040)={0x0, 0x0, 0x7f, r10, 0x1}, 0xc) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x1e8, 0x9403, 0x0, 0x0, 0x2c0, 0x2d8, 0x3d8, 0x3d8, 0x2d8, 0x3d8, 0x3, 0x0, {[{{@ipv6={@remote, @local, [0xffffffff, 0xff, 0xffffff00, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], 'erspan0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x2f, 0x3, 0x1, 0x7f}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@dscp={{0x28}, {0x9, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x8, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x11000, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x88001, 0x0) 02:47:06 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21}}, 0x24) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x62, &(0x7f0000000180)=""/98}, &(0x7f0000000240), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000000)={0x2, 0x0, 0x0, "fd0a"}) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000300)={0x53, 0x0, 0x69, 0x0, @scatter={0x3, 0x0, &(0x7f0000000440)=[{&(0x7f0000000380)=""/169, 0xa9}, {0x0}, {&(0x7f00000002c0)=""/52, 0x34}]}, &(0x7f0000000080)="9f9e6eb304d5f821a9be1f0aa017a2572aefda0b61d98cfcf3d075377bbb83364827d8fdbc1630fd7f79eb88f4589a55e51c3de0a2b0e6c2f73e1c7505da6b1947334be95df2afb0a383dc82e67431dbe93e7a10a10162575c9a711619192d9c149557988b74ff0322", 0x0, 0x4, 0x0, 0x0, 0x0}) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000000)={0x2, 0x0, 0xead, "fd0a"}) syz_mount_image$romfs(0x0, &(0x7f0000002e00)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000005780)={{{@in6=@mcast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@empty}}, &(0x7f0000005880)=0xe8) r2 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)={0x28, r3, 0x2f4b41cae783dc41, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}]}, 0x28}}, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f0000000040)={0x6, 'dvmrp0\x00', {0x5}, 0x5}) 02:47:06 executing program 0: sched_setscheduler(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21}}, 0x24) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x62, &(0x7f0000000180)=""/98}, &(0x7f0000000240), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000000)={0x2, 0x0, 0x0, "fd0a"}) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000300)={0x53, 0x0, 0x69, 0x0, @scatter={0x3, 0x0, &(0x7f0000000440)=[{&(0x7f0000000380)=""/169, 0xa9}, {0x0}, {&(0x7f00000002c0)=""/52, 0x34}]}, &(0x7f0000000080)="9f9e6eb304d5f821a9be1f0aa017a2572aefda0b61d98cfcf3d075377bbb83364827d8fdbc1630fd7f79eb88f4589a55e51c3de0a2b0e6c2f73e1c7505da6b1947334be95df2afb0a383dc82e67431dbe93e7a10a10162575c9a711619192d9c149557988b74ff0322", 0x0, 0x4, 0x0, 0x0, 0x0}) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000000)={0x2, 0x0, 0xead, "fd0a"}) syz_mount_image$romfs(0x0, &(0x7f0000002e00)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000005780)={{{@in6=@mcast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@empty}}, &(0x7f0000005880)=0xe8) r2 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)={0x28, r3, 0x2f4b41cae783dc41, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}]}, 0x28}}, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f0000000040)={0x6, 'dvmrp0\x00', {0x5}, 0x5}) [ 910.839654] sd 0:0:1:0: [sg0] tag#5748 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 910.850683] sd 0:0:1:0: [sg0] tag#5748 CDB: Service action out(16), sa=0x1e [ 910.858721] sd 0:0:1:0: [sg0] tag#5748 CDB[00]: 9f 9e 6e b3 04 d5 f8 21 a9 be 1f 0a a0 17 a2 57 [ 910.868441] sd 0:0:1:0: [sg0] tag#5748 CDB[10]: 2a ef da 0b 61 d9 8c fc f3 d0 75 37 7b bb 83 36 [ 910.930113] sd 0:0:1:0: [sg0] tag#5748 CDB[20]: 48 27 d8 fd bc 16 30 fd 7f 79 eb 88 f4 58 9a 55 [ 910.939761] sd 0:0:1:0: [sg0] tag#5748 CDB[30]: e5 1c 3d e0 a2 b0 e6 c2 f7 3e 1c 75 05 da 6b 19 [ 910.949387] sd 0:0:1:0: [sg0] tag#5748 CDB[40]: 47 33 4b e9 5d f2 af b0 a3 83 dc 82 e6 74 31 db [ 910.959892] sd 0:0:1:0: [sg0] tag#5748 CDB[50]: e9 3e 7a 10 a1 01 62 57 5c 9a 71 16 19 19 2d 9c [ 910.969147] sd 0:0:1:0: [sg0] tag#5748 CDB[60]: 14 95 57 98 8b 74 ff 03 22 02:47:07 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x38}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60932b1c00142b00fe80000000000000000000c943c38d1ebe87459ce800000000bbfe8000000000000000000000000000aa0000003a", @ANYRES32=0x41424344, @ANYRES64=r0], 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/204, 0xcc}, {&(0x7f0000000780)=""/251, 0xfb}], 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r2, 0x5414, &(0x7f0000000000)=0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_debug_messages', 0x288401, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0x14e6}}, './file0\x00'}) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f00000000c0)={0x5, 0x9, 0x135, 0xffffffff, 0x0, "1db8a98d1924fa2471f348b7c0214bbaf41102", 0x51, 0x9}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x4) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r6, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}, 0x0, {[0x0, 0x0, 0x0, 0x200000, 0x2]}}, 0x5c) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000000)=0x20, 0x4) r7 = fcntl$dupfd(r6, 0x406, r6) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000080), 0x10) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f0000000280)={&(0x7f0000000000)={0x1d, r10}, 0x10, &(0x7f0000000200)={&(0x7f00000002c0)={0x2, 0x11, 0x0, {0x0, 0x2710}, {}, {}, 0x300, @can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "e428269dbde6b9b1"}}, 0x48}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) setsockopt$MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000040)={0x0, 0x0, 0x7f, r10, 0x1}, 0xc) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x1e8, 0x9403, 0x0, 0x0, 0x2c0, 0x2d8, 0x3d8, 0x3d8, 0x2d8, 0x3d8, 0x3, 0x0, {[{{@ipv6={@remote, @local, [0xffffffff, 0xff, 0xffffff00, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], 'erspan0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x2f, 0x3, 0x1, 0x7f}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@dscp={{0x28}, {0x9, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x8, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x11000, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x88001, 0x0) 02:47:07 executing program 5: sched_setscheduler(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21}}, 0x24) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x62, &(0x7f0000000180)=""/98}, &(0x7f0000000240), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000000)={0x2, 0x0, 0x0, "fd0a"}) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000300)={0x53, 0x0, 0x69, 0x0, @scatter={0x3, 0x0, &(0x7f0000000440)=[{&(0x7f0000000380)=""/169, 0xa9}, {0x0}, {&(0x7f00000002c0)=""/52, 0x34}]}, &(0x7f0000000080)="9f9e6eb304d5f821a9be1f0aa017a2572aefda0b61d98cfcf3d075377bbb83364827d8fdbc1630fd7f79eb88f4589a55e51c3de0a2b0e6c2f73e1c7505da6b1947334be95df2afb0a383dc82e67431dbe93e7a10a10162575c9a711619192d9c149557988b74ff0322", 0x0, 0x4, 0x0, 0x0, 0x0}) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000000)={0x2, 0x0, 0xead, "fd0a"}) syz_mount_image$romfs(0x0, &(0x7f0000002e00)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000005780)={{{@in6=@mcast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@empty}}, &(0x7f0000005880)=0xe8) r2 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)={0x28, r3, 0x2f4b41cae783dc41, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}]}, 0x28}}, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f0000000040)={0x6, 'dvmrp0\x00', {0x5}, 0x5}) [ 911.139601] sd 0:0:1:0: [sg0] tag#5749 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 911.150648] sd 0:0:1:0: [sg0] tag#5749 CDB: Service action out(16), sa=0x1e [ 911.159611] sd 0:0:1:0: [sg0] tag#5749 CDB[00]: 9f 9e 6e b3 04 d5 f8 21 a9 be 1f 0a a0 17 a2 57 [ 911.169697] sd 0:0:1:0: [sg0] tag#5749 CDB[10]: 2a ef da 0b 61 d9 8c fc f3 d0 75 37 7b bb 83 36 [ 911.179617] sd 0:0:1:0: [sg0] tag#5749 CDB[20]: 48 27 d8 fd bc 16 30 fd 7f 79 eb 88 f4 58 9a 55 02:47:07 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="380000000d0601040000000000000000000000000500010006000000050005000300000012000300686173683a6e65742c706f72740000004f9fd5a2f4179f8da014cb3666c33ef83874469e971a5e4b874cc862604839043936da70eb12e4cec1621ac38abec2e4192e471edb0f6e181e30f12e48f92197521399cda241c8750e229d3655fa022d50b2c9ba03b1792318054d45a5d3fd662a067f89bae78c01b236f38e3ac4cacd6b76e3a78eb8a7a021c4489f285074b458f9ea4a564c453f417696b81ea3b8f1d4d7277dc24ac113c91ea096e05ec5a4996648fb5886dfd109754ab1df27cbe3b2a3140964ff3cb712347c774d7da8bd9de9a7c963c1aae45f6807f0dfd43955b596c182181ae7"], 0x38}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60932b1c00142b00fe80000000000000000000c943c38d1ebe87459ce800000000bbfe8000000000000000000000000000aa0000003a", @ANYRES32=0x41424344, @ANYRES64=r0], 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/204, 0xcc}, {&(0x7f0000000780)=""/251, 0xfb}], 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r2, 0x5414, &(0x7f0000000000)=0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_debug_messages', 0x288401, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0x14e6}}, './file0\x00'}) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f00000000c0)={0x5, 0x9, 0x135, 0xffffffff, 0x0, "1db8a98d1924fa2471f348b7c0214bbaf41102", 0x51, 0x9}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x4) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r6, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}, 0x0, {[0x0, 0x0, 0x0, 0x200000, 0x2]}}, 0x5c) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000000)=0x20, 0x4) r7 = fcntl$dupfd(r6, 0x406, r6) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000080), 0x10) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f0000000280)={&(0x7f0000000000)={0x1d, r10}, 0x10, &(0x7f0000000200)={&(0x7f00000002c0)={0x2, 0x11, 0x0, {0x0, 0x2710}, {}, {}, 0x300, @can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "e428269dbde6b9b1"}}, 0x48}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) setsockopt$MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000040)={0x0, 0x0, 0x7f, r10, 0x1}, 0xc) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x1e8, 0x9403, 0x0, 0x0, 0x2c0, 0x2d8, 0x3d8, 0x3d8, 0x2d8, 0x3d8, 0x3, 0x0, {[{{@ipv6={@remote, @local, [0xffffffff, 0xff, 0xffffff00, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], 'erspan0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x2f, 0x3, 0x1, 0x7f}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@dscp={{0x28}, {0x9, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x8, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x11000, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x88001, 0x0) 02:47:07 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21}}, 0x24) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x62, &(0x7f0000000180)=""/98}, &(0x7f0000000240), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000000)={0x2, 0x0, 0x0, "fd0a"}) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000300)={0x53, 0x0, 0x69, 0x0, @scatter={0x3, 0x0, &(0x7f0000000440)=[{&(0x7f0000000380)=""/169, 0xa9}, {0x0}, {&(0x7f00000002c0)=""/52, 0x34}]}, &(0x7f0000000080)="9f9e6eb304d5f821a9be1f0aa017a2572aefda0b61d98cfcf3d075377bbb83364827d8fdbc1630fd7f79eb88f4589a55e51c3de0a2b0e6c2f73e1c7505da6b1947334be95df2afb0a383dc82e67431dbe93e7a10a10162575c9a711619192d9c149557988b74ff0322", 0x0, 0x4, 0x0, 0x0, 0x0}) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000000)={0x2, 0x0, 0xead, "fd0a"}) syz_mount_image$romfs(0x0, &(0x7f0000002e00)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000005780)={{{@in6=@mcast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@empty}}, &(0x7f0000005880)=0xe8) r2 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)={0x28, r3, 0x2f4b41cae783dc41, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}]}, 0x28}}, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f0000000040)={0x6, 'dvmrp0\x00', {0x5}, 0x5}) [ 911.189596] sd 0:0:1:0: [sg0] tag#5749 CDB[30]: e5 1c 3d e0 a2 b0 e6 c2 f7 3e 1c 75 05 da 6b 19 [ 911.199596] sd 0:0:1:0: [sg0] tag#5749 CDB[40]: 47 33 4b e9 5d f2 af b0 a3 83 dc 82 e6 74 31 db [ 911.209097] sd 0:0:1:0: [sg0] tag#5749 CDB[50]: e9 3e 7a 10 a1 01 62 57 5c 9a 71 16 19 19 2d 9c [ 911.219557] sd 0:0:1:0: [sg0] tag#5749 CDB[60]: 14 95 57 98 8b 74 ff 03 22 02:47:07 executing program 5: sched_setscheduler(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21}}, 0x24) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x62, &(0x7f0000000180)=""/98}, &(0x7f0000000240), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000000)={0x2, 0x0, 0x0, "fd0a"}) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000300)={0x53, 0x0, 0x69, 0x0, @scatter={0x3, 0x0, &(0x7f0000000440)=[{&(0x7f0000000380)=""/169, 0xa9}, {0x0}, {&(0x7f00000002c0)=""/52, 0x34}]}, &(0x7f0000000080)="9f9e6eb304d5f821a9be1f0aa017a2572aefda0b61d98cfcf3d075377bbb83364827d8fdbc1630fd7f79eb88f4589a55e51c3de0a2b0e6c2f73e1c7505da6b1947334be95df2afb0a383dc82e67431dbe93e7a10a10162575c9a711619192d9c149557988b74ff0322", 0x0, 0x4, 0x0, 0x0, 0x0}) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000000)={0x2, 0x0, 0xead, "fd0a"}) syz_mount_image$romfs(0x0, &(0x7f0000002e00)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000005780)={{{@in6=@mcast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@empty}}, &(0x7f0000005880)=0xe8) r2 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)={0x28, r3, 0x2f4b41cae783dc41, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}]}, 0x28}}, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f0000000040)={0x6, 'dvmrp0\x00', {0x5}, 0x5}) [ 911.306476] sd 0:0:1:0: [sg0] tag#5748 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 911.316431] sd 0:0:1:0: [sg0] tag#5748 CDB: Service action out(16), sa=0x1e [ 911.324636] sd 0:0:1:0: [sg0] tag#5748 CDB[00]: 9f 9e 6e b3 04 d5 f8 21 a9 be 1f 0a a0 17 a2 57 [ 911.336207] sd 0:0:1:0: [sg0] tag#5748 CDB[10]: 2a ef da 0b 61 d9 8c fc f3 d0 75 37 7b bb 83 36 [ 911.346373] sd 0:0:1:0: [sg0] tag#5748 CDB[20]: 48 27 d8 fd bc 16 30 fd 7f 79 eb 88 f4 58 9a 55 [ 911.356031] sd 0:0:1:0: [sg0] tag#5748 CDB[30]: e5 1c 3d e0 a2 b0 e6 c2 f7 3e 1c 75 05 da 6b 19 [ 911.366445] sd 0:0:1:0: [sg0] tag#5748 CDB[40]: 47 33 4b e9 5d f2 af b0 a3 83 dc 82 e6 74 31 db [ 911.376332] sd 0:0:1:0: [sg0] tag#5748 CDB[50]: e9 3e 7a 10 a1 01 62 57 5c 9a 71 16 19 19 2d 9c 02:47:07 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x38}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60932b1c00142b00fe80000000000000000000c943c38d1ebe87459ce800000000bbfe8000000000000000000000000000aa0000003a", @ANYRES32=0x41424344, @ANYRES64=r0], 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/204, 0xcc}, {&(0x7f0000000780)=""/251, 0xfb}], 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r2, 0x5414, &(0x7f0000000000)=0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_debug_messages', 0x288401, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0x14e6}}, './file0\x00'}) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f00000000c0)={0x5, 0x9, 0x135, 0xffffffff, 0x0, "1db8a98d1924fa2471f348b7c0214bbaf41102", 0x51, 0x9}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x4) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r6, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}, 0x0, {[0x0, 0x0, 0x0, 0x200000, 0x2]}}, 0x5c) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000000)=0x20, 0x4) r7 = fcntl$dupfd(r6, 0x406, r6) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000080), 0x10) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f0000000280)={&(0x7f0000000000)={0x1d, r10}, 0x10, &(0x7f0000000200)={&(0x7f00000002c0)={0x2, 0x11, 0x0, {0x0, 0x2710}, {}, {}, 0x300, @can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "e428269dbde6b9b1"}}, 0x48}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) setsockopt$MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000040)={0x0, 0x0, 0x7f, r10, 0x1}, 0xc) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x1e8, 0x9403, 0x0, 0x0, 0x2c0, 0x2d8, 0x3d8, 0x3d8, 0x2d8, 0x3d8, 0x3, 0x0, {[{{@ipv6={@remote, @local, [0xffffffff, 0xff, 0xffffff00, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], 'erspan0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x2f, 0x3, 0x1, 0x7f}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@dscp={{0x28}, {0x9, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x8, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x11000, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x88001, 0x0) 02:47:07 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4000, 0xffffffffffffffff}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x1ff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x38}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60932b1c00142b00fe80000000000000000000c943c38d1ebe87459ce800000000bbfe8000000000000000000000000000aa0000003a", @ANYRES32=0x41424344, @ANYRES64=r0], 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) syz_open_dev$ttys(0xc, 0x2, 0x1) readv(r0, &(0x7f0000000100)=[{&(0x7f0000000480)=""/246, 0xf6}, {&(0x7f0000000580)=""/204, 0xcc}, {&(0x7f0000000780)=""/251, 0xfb}], 0x3) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TIOCSPTLCK(r2, 0x5414, &(0x7f0000000000)=0x1) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/pm_debug_messages', 0x288401, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0x14e6}}, './file0\x00'}) ioctl$TCSETS2(r4, 0x402c542b, &(0x7f00000000c0)={0x5, 0x9, 0x135, 0xffffffff, 0x0, "1db8a98d1924fa2471f348b7c0214bbaf41102", 0x51, 0x9}) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[@ANYRESDEC], 0x4) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_ADD_MFC(r6, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x0, @mcast2}, 0x0, {[0x0, 0x0, 0x0, 0x200000, 0x2]}}, 0x5c) setsockopt$inet6_tcp_int(r6, 0x6, 0x10, &(0x7f0000000000)=0x20, 0x4) r7 = fcntl$dupfd(r6, 0x406, r6) r8 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r8, &(0x7f0000000080), 0x10) r9 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r9, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r8, &(0x7f0000000280)={&(0x7f0000000000)={0x1d, r10}, 0x10, &(0x7f0000000200)={&(0x7f00000002c0)={0x2, 0x11, 0x0, {0x0, 0x2710}, {}, {}, 0x300, @can={{0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, "e428269dbde6b9b1"}}, 0x48}, 0x1, 0x0, 0x0, 0x4040800}, 0x0) setsockopt$MRT6_ADD_MIF(r7, 0x29, 0xca, &(0x7f0000000040)={0x0, 0x0, 0x7f, r10, 0x1}, 0xc) setsockopt$IP6T_SO_SET_REPLACE(r5, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x1e8, 0x9403, 0x0, 0x0, 0x2c0, 0x2d8, 0x3d8, 0x3d8, 0x2d8, 0x3d8, 0x3, 0x0, {[{{@ipv6={@remote, @local, [0xffffffff, 0xff, 0xffffff00, 0xffffffff], [0xffffff00, 0xff000000, 0xffffffff, 0xffffffff], 'erspan0\x00', 'veth0_to_hsr\x00', {0xff}, {}, 0x2f, 0x3, 0x1, 0x7f}, 0x0, 0x1c8, 0x1e8, 0x0, {}, [@common=@inet=@dscp={{0x28}, {0x9, 0x1}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x8, 0x1, 0x0, 'syz0\x00'}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0xa8, 0xf0}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x11000, 0x0, 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_debug_messages', 0x88001, 0x0) [ 911.433442] sd 0:0:1:0: [sg0] tag#5748 CDB[60]: 14 95 57 98 8b 74 ff 03 22 02:47:07 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21}}, 0x24) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x62, &(0x7f0000000180)=""/98}, &(0x7f0000000240), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000000)={0x2, 0x0, 0x0, "fd0a"}) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000300)={0x53, 0x0, 0x69, 0x0, @scatter={0x3, 0x0, &(0x7f0000000440)=[{&(0x7f0000000380)=""/169, 0xa9}, {0x0}, {&(0x7f00000002c0)=""/52, 0x34}]}, &(0x7f0000000080)="9f9e6eb304d5f821a9be1f0aa017a2572aefda0b61d98cfcf3d075377bbb83364827d8fdbc1630fd7f79eb88f4589a55e51c3de0a2b0e6c2f73e1c7505da6b1947334be95df2afb0a383dc82e67431dbe93e7a10a10162575c9a711619192d9c149557988b74ff0322", 0x0, 0x4, 0x0, 0x0, 0x0}) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000000)={0x2, 0x0, 0xead, "fd0a"}) syz_mount_image$romfs(0x0, &(0x7f0000002e00)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000005780)={{{@in6=@mcast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@empty}}, &(0x7f0000005880)=0xe8) r2 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)={0x28, r3, 0x2f4b41cae783dc41, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}]}, 0x28}}, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f0000000040)={0x6, 'dvmrp0\x00', {0x5}, 0x5}) 02:47:07 executing program 5: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x2000, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0) sendmsg$inet(r2, &(0x7f0000000680)={&(0x7f0000000480)={0x2, 0x4e20, @loopback}, 0x10, 0x0}, 0xc000) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="0338613e541540a2f4f2a082fe504227d165b3b726547d6333cb1581b224fb9350b8bd81b262cb727143aebd767bc6110f9442e05524d10c8e569039b323a83891665291bad6f1e09410a74aff9824f850ac1f03372687b76a041f19f7bd618863ec5898e455c9dc319ec2d553e23b7030285b39250d3c3b36b29c3c516b773a7084578ba1203ca96b031cf6aaa123ef810026112d4d7bf2651b2c77b2ca02e5e8685f49ad01720637e60f222b5ef1d1c088642b4400069716a1c04a", 0xbc, 0x800, &(0x7f0000000100)={0xa, 0x4e21, 0x6, @private2={0xfc, 0x2, '\x00', 0x1}, 0xfff}, 0x1c) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x1c}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_ext={0x1c, 0x4, &(0x7f0000000880)=ANY=[@ANYBLOB="182b0000", @ANYRES32, @ANYBLOB="00000000030000002434000104000000000a400200000000"], &(0x7f00000008c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000a00)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000a40)={0x5, 0xc, 0x8000, 0x7f}, 0x10, 0xbeaf, r2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x10) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0xfff7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shutdown(r1, 0x2) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, &(0x7f0000000140)) pipe2$watch_queue(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000240)=ANY=[@ANYBLOB="01000000010008747b223f00", @ANYRES32=r0]) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xbaf, 0x88, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3ff, 0x4, @perf_bp={&(0x7f0000000340), 0x6}, 0x48824, 0x3ff, 0x0, 0x8, 0x2, 0x0, 0x0, 0x0, 0x6, 0x0, 0xfffffffffffff800}, 0x0, 0x6, r0, 0x2) open(&(0x7f0000000040)='./bus\x00', 0x1410c2, 0x0) [ 911.653523] sd 0:0:1:0: [sg0] tag#5748 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 911.665715] sd 0:0:1:0: [sg0] tag#5748 CDB: Service action out(16), sa=0x1e [ 911.673260] sd 0:0:1:0: [sg0] tag#5748 CDB[00]: 9f 9e 6e b3 04 d5 f8 21 a9 be 1f 0a a0 17 a2 57 [ 911.683117] sd 0:0:1:0: [sg0] tag#5748 CDB[10]: 2a ef da 0b 61 d9 8c fc f3 d0 75 37 7b bb 83 36 [ 911.747535] sd 0:0:1:0: [sg0] tag#5748 CDB[20]: 48 27 d8 fd bc 16 30 fd 7f 79 eb 88 f4 58 9a 55 [ 911.757008] sd 0:0:1:0: [sg0] tag#5748 CDB[30]: e5 1c 3d e0 a2 b0 e6 c2 f7 3e 1c 75 05 da 6b 19 [ 911.767006] sd 0:0:1:0: [sg0] tag#5748 CDB[40]: 47 33 4b e9 5d f2 af b0 a3 83 dc 82 e6 74 31 db [ 911.776973] sd 0:0:1:0: [sg0] tag#5748 CDB[50]: e9 3e 7a 10 a1 01 62 57 5c 9a 71 16 19 19 2d 9c [ 911.787070] sd 0:0:1:0: [sg0] tag#5748 CDB[60]: 14 95 57 98 8b 74 ff 03 22 02:47:07 executing program 0: sched_setscheduler(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21}}, 0x24) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x62, &(0x7f0000000180)=""/98}, &(0x7f0000000240), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000000)={0x2, 0x0, 0x0, "fd0a"}) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000300)={0x53, 0x0, 0x69, 0x0, @scatter={0x3, 0x0, &(0x7f0000000440)=[{&(0x7f0000000380)=""/169, 0xa9}, {0x0}, {&(0x7f00000002c0)=""/52, 0x34}]}, &(0x7f0000000080)="9f9e6eb304d5f821a9be1f0aa017a2572aefda0b61d98cfcf3d075377bbb83364827d8fdbc1630fd7f79eb88f4589a55e51c3de0a2b0e6c2f73e1c7505da6b1947334be95df2afb0a383dc82e67431dbe93e7a10a10162575c9a711619192d9c149557988b74ff0322", 0x0, 0x4, 0x0, 0x0, 0x0}) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000000)={0x2, 0x0, 0xead, "fd0a"}) syz_mount_image$romfs(0x0, &(0x7f0000002e00)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000005780)={{{@in6=@mcast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@empty}}, &(0x7f0000005880)=0xe8) r2 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)={0x28, r3, 0x2f4b41cae783dc41, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}]}, 0x28}}, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f0000000040)={0x6, 'dvmrp0\x00', {0x5}, 0x5}) 02:47:08 executing program 4: setresuid(0x0, 0xee01, 0xee00) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x8953, 0x0) 02:47:08 executing program 2: sched_setscheduler(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21}}, 0x24) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x62, &(0x7f0000000180)=""/98}, &(0x7f0000000240), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000000)={0x2, 0x0, 0x0, "fd0a"}) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000300)={0x53, 0x0, 0x69, 0x0, @scatter={0x3, 0x0, &(0x7f0000000440)=[{&(0x7f0000000380)=""/169, 0xa9}, {0x0}, {&(0x7f00000002c0)=""/52, 0x34}]}, &(0x7f0000000080)="9f9e6eb304d5f821a9be1f0aa017a2572aefda0b61d98cfcf3d075377bbb83364827d8fdbc1630fd7f79eb88f4589a55e51c3de0a2b0e6c2f73e1c7505da6b1947334be95df2afb0a383dc82e67431dbe93e7a10a10162575c9a711619192d9c149557988b74ff0322", 0x0, 0x4, 0x0, 0x0, 0x0}) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000000)={0x2, 0x0, 0xead, "fd0a"}) syz_mount_image$romfs(0x0, &(0x7f0000002e00)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000005780)={{{@in6=@mcast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@empty}}, &(0x7f0000005880)=0xe8) r2 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)={0x28, r3, 0x2f4b41cae783dc41, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}]}, 0x28}}, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f0000000040)={0x6, 'dvmrp0\x00', {0x5}, 0x5}) 02:47:08 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21}}, 0x24) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x62, &(0x7f0000000180)=""/98}, &(0x7f0000000240), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000000)={0x2, 0x0, 0x0, "fd0a"}) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000300)={0x53, 0x0, 0x69, 0x0, @scatter={0x3, 0x0, &(0x7f0000000440)=[{&(0x7f0000000380)=""/169, 0xa9}, {0x0}, {&(0x7f00000002c0)=""/52, 0x34}]}, &(0x7f0000000080)="9f9e6eb304d5f821a9be1f0aa017a2572aefda0b61d98cfcf3d075377bbb83364827d8fdbc1630fd7f79eb88f4589a55e51c3de0a2b0e6c2f73e1c7505da6b1947334be95df2afb0a383dc82e67431dbe93e7a10a10162575c9a711619192d9c149557988b74ff0322", 0x0, 0x4, 0x0, 0x0, 0x0}) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000000)={0x2, 0x0, 0xead, "fd0a"}) syz_mount_image$romfs(0x0, &(0x7f0000002e00)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000005780)={{{@in6=@mcast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@empty}}, &(0x7f0000005880)=0xe8) r2 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)={0x28, r3, 0x2f4b41cae783dc41, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}]}, 0x28}}, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f0000000040)={0x6, 'dvmrp0\x00', {0x5}, 0x5}) 02:47:08 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r1 = dup(r0) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@ipv4={'\x00', '\xff\xff', @dev}, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@mcast1}}, 0xe8) syz_emit_ethernet(0x3a, &(0x7f0000000380)={@local, @remote, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x18, 0x0, @wg=@data}}}}}, 0x0) [ 911.965094] sd 0:0:1:0: [sg0] tag#5748 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 911.965962] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 911.974532] sd 0:0:1:0: [sg0] tag#5748 CDB: Service action out(16), sa=0x1e [ 912.036193] sd 0:0:1:0: [sg0] tag#5748 CDB[00]: 9f 9e 6e b3 04 d5 f8 21 a9 be 1f 0a a0 17 a2 57 [ 912.045637] sd 0:0:1:0: [sg0] tag#5748 CDB[10]: 2a ef da 0b 61 d9 8c fc f3 d0 75 37 7b bb 83 36 [ 912.054781] sd 0:0:1:0: [sg0] tag#5748 CDB[20]: 48 27 d8 fd bc 16 30 fd 7f 79 eb 88 f4 58 9a 55 [ 912.064254] sd 0:0:1:0: [sg0] tag#5748 CDB[30]: e5 1c 3d e0 a2 b0 e6 c2 f7 3e 1c 75 05 da 6b 19 [ 912.074099] sd 0:0:1:0: [sg0] tag#5748 CDB[40]: 47 33 4b e9 5d f2 af b0 a3 83 dc 82 e6 74 31 db 02:47:08 executing program 4: setresuid(0x0, 0xee01, 0xee00) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x8953, 0x0) [ 912.084056] sd 0:0:1:0: [sg0] tag#5748 CDB[50]: e9 3e 7a 10 a1 01 62 57 5c 9a 71 16 19 19 2d 9c [ 912.094137] sd 0:0:1:0: [sg0] tag#5748 CDB[60]: 14 95 57 98 8b 74 ff 03 22 [ 912.133643] sd 0:0:1:0: [sg0] tag#5749 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 912.134223] sd 0:0:1:0: [sg0] tag#5749 CDB: Service action out(16), sa=0x1e [ 912.134706] sd 0:0:1:0: [sg0] tag#5749 CDB[00]: 9f 9e 6e b3 04 d5 f8 21 a9 be 1f 0a a0 17 a2 57 [ 912.135073] sd 0:0:1:0: [sg0] tag#5749 CDB[10]: 2a ef da 0b 61 d9 8c fc f3 d0 75 37 7b bb 83 36 [ 912.135520] sd 0:0:1:0: [sg0] tag#5749 CDB[20]: 48 27 d8 fd bc 16 30 fd 7f 79 eb 88 f4 58 9a 55 [ 912.135991] sd 0:0:1:0: [sg0] tag#5749 CDB[30]: e5 1c 3d e0 a2 b0 e6 c2 f7 3e 1c 75 05 da 6b 19 [ 912.136737] sd 0:0:1:0: [sg0] tag#5749 CDB[40]: 47 33 4b e9 5d f2 af b0 a3 83 dc 82 e6 74 31 db [ 912.153717] sd 0:0:1:0: [sg0] tag#5748 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK 02:47:08 executing program 0: sched_setscheduler(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21}}, 0x24) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x62, &(0x7f0000000180)=""/98}, &(0x7f0000000240), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000000)={0x2, 0x0, 0x0, "fd0a"}) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000300)={0x53, 0x0, 0x69, 0x0, @scatter={0x3, 0x0, &(0x7f0000000440)=[{&(0x7f0000000380)=""/169, 0xa9}, {0x0}, {&(0x7f00000002c0)=""/52, 0x34}]}, &(0x7f0000000080)="9f9e6eb304d5f821a9be1f0aa017a2572aefda0b61d98cfcf3d075377bbb83364827d8fdbc1630fd7f79eb88f4589a55e51c3de0a2b0e6c2f73e1c7505da6b1947334be95df2afb0a383dc82e67431dbe93e7a10a10162575c9a711619192d9c149557988b74ff0322", 0x0, 0x4, 0x0, 0x0, 0x0}) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000000)={0x2, 0x0, 0xead, "fd0a"}) syz_mount_image$romfs(0x0, &(0x7f0000002e00)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000005780)={{{@in6=@mcast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@empty}}, &(0x7f0000005880)=0xe8) r2 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)={0x28, r3, 0x2f4b41cae783dc41, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}]}, 0x28}}, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f0000000040)={0x6, 'dvmrp0\x00', {0x5}, 0x5}) [ 912.162921] sd 0:0:1:0: [sg0] tag#5749 CDB[50]: e9 3e 7a 10 a1 01 62 57 5c 9a 71 16 19 19 2d 9c [ 912.171965] sd 0:0:1:0: [sg0] tag#5748 CDB: Service action out(16), sa=0x1e [ 912.180999] sd 0:0:1:0: [sg0] tag#5749 CDB[60]: 14 95 57 98 8b 74 ff 03 22 [ 912.189985] sd 0:0:1:0: [sg0] tag#5748 CDB[00]: 9f 9e 6e b3 04 d5 f8 21 a9 be 1f 0a a0 17 a2 57 [ 912.259870] sd 0:0:1:0: [sg0] tag#5748 CDB[10]: 2a ef da 0b 61 d9 8c fc f3 d0 75 37 7b bb 83 36 02:47:08 executing program 4: setresuid(0x0, 0xee01, 0xee00) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x8953, 0x0) [ 912.269525] sd 0:0:1:0: [sg0] tag#5748 CDB[20]: 48 27 d8 fd bc 16 30 fd 7f 79 eb 88 f4 58 9a 55 [ 912.279200] sd 0:0:1:0: [sg0] tag#5748 CDB[30]: e5 1c 3d e0 a2 b0 e6 c2 f7 3e 1c 75 05 da 6b 19 [ 912.290028] sd 0:0:1:0: [sg0] tag#5748 CDB[40]: 47 33 4b e9 5d f2 af b0 a3 83 dc 82 e6 74 31 db [ 912.296131] sd 0:0:1:0: [sg0] tag#5749 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK 02:47:08 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1500000065ffff097b000008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000440)={0xb0, 0x0, 0x0, [{{}, {0x0, 0x0, 0x2, 0x0, '#\xd7'}}]}, 0xb0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000b80), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0\x00', 0x1fed, 0x0) 02:47:08 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x3, 0x4c}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000400)=""/178, 0x28, 0xb2, 0x1}, 0x20) [ 912.300225] sd 0:0:1:0: [sg0] tag#5748 CDB[50]: e9 3e 7a 10 a1 01 62 57 5c 9a 71 16 19 19 2d 9c [ 912.309994] sd 0:0:1:0: [sg0] tag#5749 CDB: Service action out(16), sa=0x1e [ 912.311618] sd 0:0:1:0: [sg0] tag#5749 CDB[00]: 9f 9e 6e b3 04 d5 f8 21 a9 be 1f 0a a0 17 a2 57 [ 912.312837] sd 0:0:1:0: [sg0] tag#5749 CDB[10]: 2a ef da 0b 61 d9 8c fc f3 d0 75 37 7b bb 83 36 [ 912.313991] sd 0:0:1:0: [sg0] tag#5749 CDB[20]: 48 27 d8 fd bc 16 30 fd 7f 79 eb 88 f4 58 9a 55 [ 912.314997] sd 0:0:1:0: [sg0] tag#5749 CDB[30]: e5 1c 3d e0 a2 b0 e6 c2 f7 3e 1c 75 05 da 6b 19 02:47:08 executing program 5: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x2000, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0) sendmsg$inet(r2, &(0x7f0000000680)={&(0x7f0000000480)={0x2, 0x4e20, @loopback}, 0x10, 0x0}, 0xc000) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="0338613e541540a2f4f2a082fe504227d165b3b726547d6333cb1581b224fb9350b8bd81b262cb727143aebd767bc6110f9442e05524d10c8e569039b323a83891665291bad6f1e09410a74aff9824f850ac1f03372687b76a041f19f7bd618863ec5898e455c9dc319ec2d553e23b7030285b39250d3c3b36b29c3c516b773a7084578ba1203ca96b031cf6aaa123ef810026112d4d7bf2651b2c77b2ca02e5e8685f49ad01720637e60f222b5ef1d1c088642b4400069716a1c04a", 0xbc, 0x800, &(0x7f0000000100)={0xa, 0x4e21, 0x6, @private2={0xfc, 0x2, '\x00', 0x1}, 0xfff}, 0x1c) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x1c}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_ext={0x1c, 0x4, &(0x7f0000000880)=ANY=[@ANYBLOB="182b0000", @ANYRES32, @ANYBLOB="00000000030000002434000104000000000a400200000000"], &(0x7f00000008c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000a00)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000a40)={0x5, 0xc, 0x8000, 0x7f}, 0x10, 0xbeaf, r2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x10) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0xfff7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shutdown(r1, 0x2) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, &(0x7f0000000140)) pipe2$watch_queue(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000240)=ANY=[@ANYBLOB="01000000010008747b223f00", @ANYRES32=r0]) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xbaf, 0x88, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3ff, 0x4, @perf_bp={&(0x7f0000000340), 0x6}, 0x48824, 0x3ff, 0x0, 0x8, 0x2, 0x0, 0x0, 0x0, 0x6, 0x0, 0xfffffffffffff800}, 0x0, 0x6, r0, 0x2) open(&(0x7f0000000040)='./bus\x00', 0x1410c2, 0x0) 02:47:08 executing program 4: setresuid(0x0, 0xee01, 0xee00) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x8953, 0x0) [ 912.316984] sd 0:0:1:0: [sg0] tag#5749 CDB[40]: 47 33 4b e9 5d f2 af b0 a3 83 dc 82 e6 74 31 db [ 912.330990] sd 0:0:1:0: [sg0] tag#5749 CDB[50]: e9 3e 7a 10 a1 01 62 57 5c 9a 71 16 19 19 2d 9c [ 912.333076] sd 0:0:1:0: [sg0] tag#5749 CDB[60]: 14 95 57 98 8b 74 ff 03 22 02:47:08 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x3, 0x4c}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000400)=""/178, 0x28, 0xb2, 0x1}, 0x20) [ 912.554044] sd 0:0:1:0: [sg0] tag#5748 CDB[60]: 14 95 57 98 8b 74 ff 03 22 02:47:08 executing program 1: sched_setscheduler(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x4e21}}, 0x24) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f0000000300)={0x53, 0x0, 0x0, 0x0, @buffer={0x0, 0x62, &(0x7f0000000180)=""/98}, &(0x7f0000000240), 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000000)={0x2, 0x0, 0x0, "fd0a"}) r1 = syz_open_dev$sg(&(0x7f0000000200), 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000300)={0x53, 0x0, 0x69, 0x0, @scatter={0x3, 0x0, &(0x7f0000000440)=[{&(0x7f0000000380)=""/169, 0xa9}, {0x0}, {&(0x7f00000002c0)=""/52, 0x34}]}, &(0x7f0000000080)="9f9e6eb304d5f821a9be1f0aa017a2572aefda0b61d98cfcf3d075377bbb83364827d8fdbc1630fd7f79eb88f4589a55e51c3de0a2b0e6c2f73e1c7505da6b1947334be95df2afb0a383dc82e67431dbe93e7a10a10162575c9a711619192d9c149557988b74ff0322", 0x0, 0x4, 0x0, 0x0, 0x0}) ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f0000000000)={0x2, 0x0, 0xead, "fd0a"}) syz_mount_image$romfs(0x0, &(0x7f0000002e00)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000005780)={{{@in6=@mcast1, @in=@local}}, {{@in6=@dev}, 0x0, @in=@empty}}, &(0x7f0000005880)=0xe8) r2 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000280)={0x28, r3, 0x2f4b41cae783dc41, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}]}, 0x28}}, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8982, &(0x7f0000000040)={0x6, 'dvmrp0\x00', {0x5}, 0x5}) 02:47:08 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x3, 0x4c}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000400)=""/178, 0x28, 0xb2, 0x1}, 0x20) 02:47:08 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000540)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000000c0)="e4e32dd2b696733552eca3e954943a18709f72fbd259a936c67ebe806ab21823f4a0c47bff45323c2b30982dfc67b46cc9a5a07c33fc", 0xff6d}, {&(0x7f0000000100)="3a10bd003aba0c7026336b", 0xb}], 0x2, &(0x7f0000000440)=ANY=[@ANYBLOB="300000000000000017e2ffff010000001800000045f43a1e02f4596a8034a9ab3e39597e422ffab456dd963a0000000018000000000000001701000004000000060200000000000018000000000000001701000003000000010000000000000089fd429aef16c6e3ecaa8a7924080d67c0aeac87448793609bd8299d6dfc465829b711ce28eb8f7d62fcca7ebd067fbe96bd1485f6aaa8486ecc079a82e301d8"], 0x60}], 0x1, 0x8001) recvmsg(r1, &(0x7f0000001e80)={0x0, 0x4010, &(0x7f0000001e00)=[{&(0x7f0000001c80)=""/103, 0xf380}], 0x1}, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:47:08 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1500000065ffff097b000008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000440)={0xb0, 0x0, 0x0, [{{}, {0x0, 0x0, 0x2, 0x0, '#\xd7'}}]}, 0xb0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000b80), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0\x00', 0x1fed, 0x0) 02:47:08 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000003980)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82e128249c06ca68b3b9d9aca8062283a5229658f75bc39844b66c66229a8b1d4c958a68278ae73707e0280bf201408a8f2a4f9dde1d097a2bd4eb4d7ea8a058f892cba5b9ac90da340d52625ab7962279dfa3518372815a45707ee74277ec4ccdda94340854dc024a49b72bfac8b193f52bd64adefc48e6690ee2b9880c6d29d166a243f7256edfcf1675d82a2e294939d2b92db11382ec1f35cda801b6617e94e81c2042cb0f7f88c82a7e2411b92adb2afee879a095fbbec5dd95bc07c46b33df15f60fb267a40be2228c2fcc80483c9463852384902d47bd84821277f794834b486fa641bf4c0af8c19648496d682ec9aba3188f90c00b"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000003640)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) statx(r1, &(0x7f0000000ac0)='./file1\x00', 0x800, 0x40, &(0x7f0000003880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x848061, &(0x7f0000000780)=ANY=[@ANYRES8=r2, @ANYRES64=r5, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="10666f776e657235", @ANYRESDEC=r9, @ANYRESHEX=r6]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)={{}, {0x1, 0x2}, [{0x2, 0x5}, {0x2, 0x5}, {0x2, 0x5, 0xee00}, {}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2}, {0x2, 0x8, 0xee00}, {}, {0x2, 0x5}, {0x2, 0x4, r4}], {0x4, 0x2}, [{0x8, 0x4, r7}, {0x8, 0x5, r8}, {0x8, 0x3, r8}, {0x8, 0x1, 0xee01}, {}, {0x8, 0x7, 0xffffffffffffffff}, {0x8, 0x6, r9}, {0x8, 0x2, r10}], {0x10, 0x4}, {0x20, 0x5}}, 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) [ 912.755848] sd 0:0:1:0: [sg0] tag#5749 FAILED Result: hostbyte=DID_ABORT driverbyte=DRIVER_OK [ 912.766803] sd 0:0:1:0: [sg0] tag#5749 CDB: Service action out(16), sa=0x1e [ 912.774258] sd 0:0:1:0: [sg0] tag#5749 CDB[00]: 9f 9e 6e b3 04 d5 f8 21 a9 be 1f 0a a0 17 a2 57 [ 912.783328] sd 0:0:1:0: [sg0] tag#5749 CDB[10]: 2a ef da 0b 61 d9 8c fc f3 d0 75 37 7b bb 83 36 [ 912.793217] sd 0:0:1:0: [sg0] tag#5749 CDB[20]: 48 27 d8 fd bc 16 30 fd 7f 79 eb 88 f4 58 9a 55 02:47:08 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@enum={0x3, 0x4c}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000400)=""/178, 0x28, 0xb2, 0x1}, 0x20) 02:47:09 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000540)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000000c0)="e4e32dd2b696733552eca3e954943a18709f72fbd259a936c67ebe806ab21823f4a0c47bff45323c2b30982dfc67b46cc9a5a07c33fc", 0xff6d}, {&(0x7f0000000100)="3a10bd003aba0c7026336b", 0xb}], 0x2, &(0x7f0000000440)=ANY=[@ANYBLOB="300000000000000017e2ffff010000001800000045f43a1e02f4596a8034a9ab3e39597e422ffab456dd963a0000000018000000000000001701000004000000060200000000000018000000000000001701000003000000010000000000000089fd429aef16c6e3ecaa8a7924080d67c0aeac87448793609bd8299d6dfc465829b711ce28eb8f7d62fcca7ebd067fbe96bd1485f6aaa8486ecc079a82e301d8"], 0x60}], 0x1, 0x8001) recvmsg(r1, &(0x7f0000001e80)={0x0, 0x4010, &(0x7f0000001e00)=[{&(0x7f0000001c80)=""/103, 0xf380}], 0x1}, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 912.803797] sd 0:0:1:0: [sg0] tag#5749 CDB[30]: e5 1c 3d e0 a2 b0 e6 c2 f7 3e 1c 75 05 da 6b 19 [ 912.813151] sd 0:0:1:0: [sg0] tag#5749 CDB[40]: 47 33 4b e9 5d f2 af b0 a3 83 dc 82 e6 74 31 db [ 912.822298] sd 0:0:1:0: [sg0] tag#5749 CDB[50]: e9 3e 7a 10 a1 01 62 57 5c 9a 71 16 19 19 2d 9c [ 912.832060] sd 0:0:1:0: [sg0] tag#5749 CDB[60]: 14 95 57 98 8b 74 ff 03 22 02:47:09 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000003980)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82e128249c06ca68b3b9d9aca8062283a5229658f75bc39844b66c66229a8b1d4c958a68278ae73707e0280bf201408a8f2a4f9dde1d097a2bd4eb4d7ea8a058f892cba5b9ac90da340d52625ab7962279dfa3518372815a45707ee74277ec4ccdda94340854dc024a49b72bfac8b193f52bd64adefc48e6690ee2b9880c6d29d166a243f7256edfcf1675d82a2e294939d2b92db11382ec1f35cda801b6617e94e81c2042cb0f7f88c82a7e2411b92adb2afee879a095fbbec5dd95bc07c46b33df15f60fb267a40be2228c2fcc80483c9463852384902d47bd84821277f794834b486fa641bf4c0af8c19648496d682ec9aba3188f90c00b"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000003640)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) statx(r1, &(0x7f0000000ac0)='./file1\x00', 0x800, 0x40, &(0x7f0000003880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x848061, &(0x7f0000000780)=ANY=[@ANYRES8=r2, @ANYRES64=r5, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="10666f776e657235", @ANYRESDEC=r9, @ANYRESHEX=r6]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)={{}, {0x1, 0x2}, [{0x2, 0x5}, {0x2, 0x5}, {0x2, 0x5, 0xee00}, {}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2}, {0x2, 0x8, 0xee00}, {}, {0x2, 0x5}, {0x2, 0x4, r4}], {0x4, 0x2}, [{0x8, 0x4, r7}, {0x8, 0x5, r8}, {0x8, 0x3, r8}, {0x8, 0x1, 0xee01}, {}, {0x8, 0x7, 0xffffffffffffffff}, {0x8, 0x6, r9}, {0x8, 0x2, r10}], {0x10, 0x4}, {0x20, 0x5}}, 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 02:47:09 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000003980)=ANY=[@ANYBLOB="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"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000003640)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) statx(r1, &(0x7f0000000ac0)='./file1\x00', 0x800, 0x40, &(0x7f0000003880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x848061, &(0x7f0000000780)=ANY=[@ANYRES8=r2, @ANYRES64=r5, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="10666f776e657235", @ANYRESDEC=r9, @ANYRESHEX=r6]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)={{}, {0x1, 0x2}, [{0x2, 0x5}, {0x2, 0x5}, {0x2, 0x5, 0xee00}, {}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2}, {0x2, 0x8, 0xee00}, {}, {0x2, 0x5}, {0x2, 0x4, r4}], {0x4, 0x2}, [{0x8, 0x4, r7}, {0x8, 0x5, r8}, {0x8, 0x3, r8}, {0x8, 0x1, 0xee01}, {}, {0x8, 0x7, 0xffffffffffffffff}, {0x8, 0x6, r9}, {0x8, 0x2, r10}], {0x10, 0x4}, {0x20, 0x5}}, 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 02:47:09 executing program 5: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000000)={0x0, @in={{0x2, 0x0, @empty}}, 0x0, 0x2000, 0x400, 0x0, 0x32}, 0x9c) bind$inet6(r1, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0) sendmsg$inet(r2, &(0x7f0000000680)={&(0x7f0000000480)={0x2, 0x4e20, @loopback}, 0x10, 0x0}, 0xc000) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="0338613e541540a2f4f2a082fe504227d165b3b726547d6333cb1581b224fb9350b8bd81b262cb727143aebd767bc6110f9442e05524d10c8e569039b323a83891665291bad6f1e09410a74aff9824f850ac1f03372687b76a041f19f7bd618863ec5898e455c9dc319ec2d553e23b7030285b39250d3c3b36b29c3c516b773a7084578ba1203ca96b031cf6aaa123ef810026112d4d7bf2651b2c77b2ca02e5e8685f49ad01720637e60f222b5ef1d1c088642b4400069716a1c04a", 0xbc, 0x800, &(0x7f0000000100)={0xa, 0x4e21, 0x6, @private2={0xfc, 0x2, '\x00', 0x1}, 0xfff}, 0x1c) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x1c}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000a80)=@bpf_ext={0x1c, 0x4, &(0x7f0000000880)=ANY=[@ANYBLOB="182b0000", @ANYRES32, @ANYBLOB="00000000030000002434000104000000000a400200000000"], &(0x7f00000008c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000a00)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000a40)={0x5, 0xc, 0x8000, 0x7f}, 0x10, 0xbeaf, r2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x10) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0xfff7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shutdown(r1, 0x2) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, &(0x7f0000000140)) pipe2$watch_queue(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r3, 0xc018937d, &(0x7f0000000240)=ANY=[@ANYBLOB="01000000010008747b223f00", @ANYRES32=r0]) perf_event_open(&(0x7f0000000380)={0x5, 0x80, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xbaf, 0x88, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3ff, 0x4, @perf_bp={&(0x7f0000000340), 0x6}, 0x48824, 0x3ff, 0x0, 0x8, 0x2, 0x0, 0x0, 0x0, 0x6, 0x0, 0xfffffffffffff800}, 0x0, 0x6, r0, 0x2) open(&(0x7f0000000040)='./bus\x00', 0x1410c2, 0x0) 02:47:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000003980)=ANY=[@ANYBLOB="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"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000003640)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) statx(r1, &(0x7f0000000ac0)='./file1\x00', 0x800, 0x40, &(0x7f0000003880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x848061, &(0x7f0000000780)=ANY=[@ANYRES8=r2, @ANYRES64=r5, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="10666f776e657235", @ANYRESDEC=r9, @ANYRESHEX=r6]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)={{}, {0x1, 0x2}, [{0x2, 0x5}, {0x2, 0x5}, {0x2, 0x5, 0xee00}, {}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2}, {0x2, 0x8, 0xee00}, {}, {0x2, 0x5}, {0x2, 0x4, r4}], {0x4, 0x2}, [{0x8, 0x4, r7}, {0x8, 0x5, r8}, {0x8, 0x3, r8}, {0x8, 0x1, 0xee01}, {}, {0x8, 0x7, 0xffffffffffffffff}, {0x8, 0x6, r9}, {0x8, 0x2, r10}], {0x10, 0x4}, {0x20, 0x5}}, 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 02:47:09 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1500000065ffff097b000008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000440)={0xb0, 0x0, 0x0, [{{}, {0x0, 0x0, 0x2, 0x0, '#\xd7'}}]}, 0xb0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000b80), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0\x00', 0x1fed, 0x0) 02:47:09 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000540)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000000c0)="e4e32dd2b696733552eca3e954943a18709f72fbd259a936c67ebe806ab21823f4a0c47bff45323c2b30982dfc67b46cc9a5a07c33fc", 0xff6d}, {&(0x7f0000000100)="3a10bd003aba0c7026336b", 0xb}], 0x2, &(0x7f0000000440)=ANY=[@ANYBLOB="300000000000000017e2ffff010000001800000045f43a1e02f4596a8034a9ab3e39597e422ffab456dd963a0000000018000000000000001701000004000000060200000000000018000000000000001701000003000000010000000000000089fd429aef16c6e3ecaa8a7924080d67c0aeac87448793609bd8299d6dfc465829b711ce28eb8f7d62fcca7ebd067fbe96bd1485f6aaa8486ecc079a82e301d8"], 0x60}], 0x1, 0x8001) recvmsg(r1, &(0x7f0000001e80)={0x0, 0x4010, &(0x7f0000001e00)=[{&(0x7f0000001c80)=""/103, 0xf380}], 0x1}, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:47:09 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000003980)=ANY=[@ANYBLOB="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"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000003640)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) statx(r1, &(0x7f0000000ac0)='./file1\x00', 0x800, 0x40, &(0x7f0000003880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x848061, &(0x7f0000000780)=ANY=[@ANYRES8=r2, @ANYRES64=r5, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="10666f776e657235", @ANYRESDEC=r9, @ANYRESHEX=r6]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)={{}, {0x1, 0x2}, [{0x2, 0x5}, {0x2, 0x5}, {0x2, 0x5, 0xee00}, {}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2}, {0x2, 0x8, 0xee00}, {}, {0x2, 0x5}, {0x2, 0x4, r4}], {0x4, 0x2}, [{0x8, 0x4, r7}, {0x8, 0x5, r8}, {0x8, 0x3, r8}, {0x8, 0x1, 0xee01}, {}, {0x8, 0x7, 0xffffffffffffffff}, {0x8, 0x6, r9}, {0x8, 0x2, r10}], {0x10, 0x4}, {0x20, 0x5}}, 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 02:47:09 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000003980)=ANY=[@ANYBLOB="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"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000003640)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) statx(r1, &(0x7f0000000ac0)='./file1\x00', 0x800, 0x40, &(0x7f0000003880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x848061, &(0x7f0000000780)=ANY=[@ANYRES8=r2, @ANYRES64=r5, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="10666f776e657235", @ANYRESDEC=r9, @ANYRESHEX=r6]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)={{}, {0x1, 0x2}, [{0x2, 0x5}, {0x2, 0x5}, {0x2, 0x5, 0xee00}, {}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2}, {0x2, 0x8, 0xee00}, {}, {0x2, 0x5}, {0x2, 0x4, r4}], {0x4, 0x2}, [{0x8, 0x4, r7}, {0x8, 0x5, r8}, {0x8, 0x3, r8}, {0x8, 0x1, 0xee01}, {}, {0x8, 0x7, 0xffffffffffffffff}, {0x8, 0x6, r9}, {0x8, 0x2, r10}], {0x10, 0x4}, {0x20, 0x5}}, 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 02:47:09 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000003980)=ANY=[@ANYBLOB="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"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000003640)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) statx(r1, &(0x7f0000000ac0)='./file1\x00', 0x800, 0x40, &(0x7f0000003880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x848061, &(0x7f0000000780)=ANY=[@ANYRES8=r2, @ANYRES64=r5, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="10666f776e657235", @ANYRESDEC=r9, @ANYRESHEX=r6]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)={{}, {0x1, 0x2}, [{0x2, 0x5}, {0x2, 0x5}, {0x2, 0x5, 0xee00}, {}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2}, {0x2, 0x8, 0xee00}, {}, {0x2, 0x5}, {0x2, 0x4, r4}], {0x4, 0x2}, [{0x8, 0x4, r7}, {0x8, 0x5, r8}, {0x8, 0x3, r8}, {0x8, 0x1, 0xee01}, {}, {0x8, 0x7, 0xffffffffffffffff}, {0x8, 0x6, r9}, {0x8, 0x2, r10}], {0x10, 0x4}, {0x20, 0x5}}, 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 02:47:09 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1500000065ffff097b000008003950323030302e4c"], 0x15) r2 = dup(r1) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000440)={0xb0, 0x0, 0x0, [{{}, {0x0, 0x0, 0x2, 0x0, '#\xd7'}}]}, 0xb0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x137) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000b80), 0x0, &(0x7f0000000400)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0\x00', 0x1fed, 0x0) 02:47:09 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000003980)=ANY=[@ANYBLOB="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"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000003640)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) statx(r1, &(0x7f0000000ac0)='./file1\x00', 0x800, 0x40, &(0x7f0000003880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x848061, &(0x7f0000000780)=ANY=[@ANYRES8=r2, @ANYRES64=r5, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="10666f776e657235", @ANYRESDEC=r9, @ANYRESHEX=r6]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)={{}, {0x1, 0x2}, [{0x2, 0x5}, {0x2, 0x5}, {0x2, 0x5, 0xee00}, {}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2}, {0x2, 0x8, 0xee00}, {}, {0x2, 0x5}, {0x2, 0x4, r4}], {0x4, 0x2}, [{0x8, 0x4, r7}, {0x8, 0x5, r8}, {0x8, 0x3, r8}, {0x8, 0x1, 0xee01}, {}, {0x8, 0x7, 0xffffffffffffffff}, {0x8, 0x6, r9}, {0x8, 0x2, r10}], {0x10, 0x4}, {0x20, 0x5}}, 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 02:47:09 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000540)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000000c0)="e4e32dd2b696733552eca3e954943a18709f72fbd259a936c67ebe806ab21823f4a0c47bff45323c2b30982dfc67b46cc9a5a07c33fc", 0xff6d}, {&(0x7f0000000100)="3a10bd003aba0c7026336b", 0xb}], 0x2, &(0x7f0000000440)=ANY=[@ANYBLOB="300000000000000017e2ffff010000001800000045f43a1e02f4596a8034a9ab3e39597e422ffab456dd963a0000000018000000000000001701000004000000060200000000000018000000000000001701000003000000010000000000000089fd429aef16c6e3ecaa8a7924080d67c0aeac87448793609bd8299d6dfc465829b711ce28eb8f7d62fcca7ebd067fbe96bd1485f6aaa8486ecc079a82e301d8"], 0x60}], 0x1, 0x8001) recvmsg(r1, &(0x7f0000001e80)={0x0, 0x4010, &(0x7f0000001e00)=[{&(0x7f0000001c80)=""/103, 0xf380}], 0x1}, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:47:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000003980)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82e128249c06ca68b3b9d9aca8062283a5229658f75bc39844b66c66229a8b1d4c958a68278ae73707e0280bf201408a8f2a4f9dde1d097a2bd4eb4d7ea8a058f892cba5b9ac90da340d52625ab7962279dfa3518372815a45707ee74277ec4ccdda94340854dc024a49b72bfac8b193f52bd64adefc48e6690ee2b9880c6d29d166a243f7256edfcf1675d82a2e294939d2b92db11382ec1f35cda801b6617e94e81c2042cb0f7f88c82a7e2411b92adb2afee879a095fbbec5dd95bc07c46b33df15f60fb267a40be2228c2fcc80483c9463852384902d47bd84821277f794834b486fa641bf4c0af8c19648496d682ec9aba3188f90c00b"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000003640)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) statx(r1, &(0x7f0000000ac0)='./file1\x00', 0x800, 0x40, &(0x7f0000003880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x848061, &(0x7f0000000780)=ANY=[@ANYRES8=r2, @ANYRES64=r5, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="10666f776e657235", @ANYRESDEC=r9, @ANYRESHEX=r6]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)={{}, {0x1, 0x2}, [{0x2, 0x5}, {0x2, 0x5}, {0x2, 0x5, 0xee00}, {}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2}, {0x2, 0x8, 0xee00}, {}, {0x2, 0x5}, {0x2, 0x4, r4}], {0x4, 0x2}, [{0x8, 0x4, r7}, {0x8, 0x5, r8}, {0x8, 0x3, r8}, {0x8, 0x1, 0xee01}, {}, {0x8, 0x7, 0xffffffffffffffff}, {0x8, 0x6, r9}, {0x8, 0x2, r10}], {0x10, 0x4}, {0x20, 0x5}}, 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 02:47:09 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000540)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000000c0)="e4e32dd2b696733552eca3e954943a18709f72fbd259a936c67ebe806ab21823f4a0c47bff45323c2b30982dfc67b46cc9a5a07c33fc", 0xff6d}, {&(0x7f0000000100)="3a10bd003aba0c7026336b", 0xb}], 0x2, &(0x7f0000000440)=ANY=[@ANYBLOB="300000000000000017e2ffff010000001800000045f43a1e02f4596a8034a9ab3e39597e422ffab456dd963a0000000018000000000000001701000004000000060200000000000018000000000000001701000003000000010000000000000089fd429aef16c6e3ecaa8a7924080d67c0aeac87448793609bd8299d6dfc465829b711ce28eb8f7d62fcca7ebd067fbe96bd1485f6aaa8486ecc079a82e301d8"], 0x60}], 0x1, 0x8001) recvmsg(r1, &(0x7f0000001e80)={0x0, 0x4010, &(0x7f0000001e00)=[{&(0x7f0000001c80)=""/103, 0xf380}], 0x1}, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:47:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000003980)=ANY=[@ANYBLOB="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"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000003640)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) statx(r1, &(0x7f0000000ac0)='./file1\x00', 0x800, 0x40, &(0x7f0000003880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x848061, &(0x7f0000000780)=ANY=[@ANYRES8=r2, @ANYRES64=r5, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="10666f776e657235", @ANYRESDEC=r9, @ANYRESHEX=r6]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)={{}, {0x1, 0x2}, [{0x2, 0x5}, {0x2, 0x5}, {0x2, 0x5, 0xee00}, {}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2}, {0x2, 0x8, 0xee00}, {}, {0x2, 0x5}, {0x2, 0x4, r4}], {0x4, 0x2}, [{0x8, 0x4, r7}, {0x8, 0x5, r8}, {0x8, 0x3, r8}, {0x8, 0x1, 0xee01}, {}, {0x8, 0x7, 0xffffffffffffffff}, {0x8, 0x6, r9}, {0x8, 0x2, r10}], {0x10, 0x4}, {0x20, 0x5}}, 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 02:47:10 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000540)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000000c0)="e4e32dd2b696733552eca3e954943a18709f72fbd259a936c67ebe806ab21823f4a0c47bff45323c2b30982dfc67b46cc9a5a07c33fc", 0xff6d}, {&(0x7f0000000100)="3a10bd003aba0c7026336b", 0xb}], 0x2, &(0x7f0000000440)=ANY=[@ANYBLOB="300000000000000017e2ffff010000001800000045f43a1e02f4596a8034a9ab3e39597e422ffab456dd963a0000000018000000000000001701000004000000060200000000000018000000000000001701000003000000010000000000000089fd429aef16c6e3ecaa8a7924080d67c0aeac87448793609bd8299d6dfc465829b711ce28eb8f7d62fcca7ebd067fbe96bd1485f6aaa8486ecc079a82e301d8"], 0x60}], 0x1, 0x8001) recvmsg(r1, &(0x7f0000001e80)={0x0, 0x4010, &(0x7f0000001e00)=[{&(0x7f0000001c80)=""/103, 0xf380}], 0x1}, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:47:10 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000540)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000000c0)="e4e32dd2b696733552eca3e954943a18709f72fbd259a936c67ebe806ab21823f4a0c47bff45323c2b30982dfc67b46cc9a5a07c33fc", 0xff6d}, {&(0x7f0000000100)="3a10bd003aba0c7026336b", 0xb}], 0x2, &(0x7f0000000440)=ANY=[@ANYBLOB="300000000000000017e2ffff010000001800000045f43a1e02f4596a8034a9ab3e39597e422ffab456dd963a0000000018000000000000001701000004000000060200000000000018000000000000001701000003000000010000000000000089fd429aef16c6e3ecaa8a7924080d67c0aeac87448793609bd8299d6dfc465829b711ce28eb8f7d62fcca7ebd067fbe96bd1485f6aaa8486ecc079a82e301d8"], 0x60}], 0x1, 0x8001) recvmsg(r1, &(0x7f0000001e80)={0x0, 0x4010, &(0x7f0000001e00)=[{&(0x7f0000001c80)=""/103, 0xf380}], 0x1}, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:47:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000003980)=ANY=[@ANYBLOB="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"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000003640)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) statx(r1, &(0x7f0000000ac0)='./file1\x00', 0x800, 0x40, &(0x7f0000003880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x848061, &(0x7f0000000780)=ANY=[@ANYRES8=r2, @ANYRES64=r5, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="10666f776e657235", @ANYRESDEC=r9, @ANYRESHEX=r6]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)={{}, {0x1, 0x2}, [{0x2, 0x5}, {0x2, 0x5}, {0x2, 0x5, 0xee00}, {}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2}, {0x2, 0x8, 0xee00}, {}, {0x2, 0x5}, {0x2, 0x4, r4}], {0x4, 0x2}, [{0x8, 0x4, r7}, {0x8, 0x5, r8}, {0x8, 0x3, r8}, {0x8, 0x1, 0xee01}, {}, {0x8, 0x7, 0xffffffffffffffff}, {0x8, 0x6, r9}, {0x8, 0x2, r10}], {0x10, 0x4}, {0x20, 0x5}}, 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 02:47:10 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000540)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000000c0)="e4e32dd2b696733552eca3e954943a18709f72fbd259a936c67ebe806ab21823f4a0c47bff45323c2b30982dfc67b46cc9a5a07c33fc", 0xff6d}, {&(0x7f0000000100)="3a10bd003aba0c7026336b", 0xb}], 0x2, &(0x7f0000000440)=ANY=[@ANYBLOB="300000000000000017e2ffff010000001800000045f43a1e02f4596a8034a9ab3e39597e422ffab456dd963a0000000018000000000000001701000004000000060200000000000018000000000000001701000003000000010000000000000089fd429aef16c6e3ecaa8a7924080d67c0aeac87448793609bd8299d6dfc465829b711ce28eb8f7d62fcca7ebd067fbe96bd1485f6aaa8486ecc079a82e301d8"], 0x60}], 0x1, 0x8001) recvmsg(r1, &(0x7f0000001e80)={0x0, 0x4010, &(0x7f0000001e00)=[{&(0x7f0000001c80)=""/103, 0xf380}], 0x1}, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:47:10 executing program 4: r0 = syz_open_dev$vim2m(&(0x7f0000000080), 0x4, 0x2) ioctl$vim2m_VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000000c0)={0x2, @vbi}) 02:47:10 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f00000000c0)="0f01b3000000000f229cb905010040b898380000ba000000000f30b8410000000f23c00f21f835010004000f23f8f30f0093b90000000f00d80fc75ac4c4c27d5aa50a000000c74424009b90a38ac744240282049a00c7442406000000000f011c24660fdd594f0f01bed5000000", 0x6e}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 02:47:10 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000540)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000000c0)="e4e32dd2b696733552eca3e954943a18709f72fbd259a936c67ebe806ab21823f4a0c47bff45323c2b30982dfc67b46cc9a5a07c33fc", 0xff6d}, {&(0x7f0000000100)="3a10bd003aba0c7026336b", 0xb}], 0x2, &(0x7f0000000440)=ANY=[@ANYBLOB="300000000000000017e2ffff010000001800000045f43a1e02f4596a8034a9ab3e39597e422ffab456dd963a0000000018000000000000001701000004000000060200000000000018000000000000001701000003000000010000000000000089fd429aef16c6e3ecaa8a7924080d67c0aeac87448793609bd8299d6dfc465829b711ce28eb8f7d62fcca7ebd067fbe96bd1485f6aaa8486ecc079a82e301d8"], 0x60}], 0x1, 0x8001) recvmsg(r1, &(0x7f0000001e80)={0x0, 0x4010, &(0x7f0000001e00)=[{&(0x7f0000001c80)=""/103, 0xf380}], 0x1}, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:47:10 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="480000001000054700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300fdff00080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=@newtfilter={0x68, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xfff1}}, [@filter_kind_options=@f_basic={{0xa}, {0x38, 0x2, [@TCA_BASIC_EMATCHES={0x34, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x805}}, @TCA_EMATCH_TREE_LIST={0x28, 0x2, 0x0, 0x1, [@TCF_EM_META={0x24, 0x1, 0x0, 0x0, {{0x0, 0x5}, [@TCA_EM_META_LVALUE={0x15, 0x2, [@TCF_META_TYPE_VAR='\x00\x00 \x00\x00', @TCF_META_TYPE_INT, @TCF_META_TYPE_INT, @TCF_META_TYPE_INT]}]}}]}]}]}}]}, 0x68}}, 0x0) 02:47:10 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000540)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000000c0)="e4e32dd2b696733552eca3e954943a18709f72fbd259a936c67ebe806ab21823f4a0c47bff45323c2b30982dfc67b46cc9a5a07c33fc", 0xff6d}, {&(0x7f0000000100)="3a10bd003aba0c7026336b", 0xb}], 0x2, &(0x7f0000000440)=ANY=[@ANYBLOB="300000000000000017e2ffff010000001800000045f43a1e02f4596a8034a9ab3e39597e422ffab456dd963a0000000018000000000000001701000004000000060200000000000018000000000000001701000003000000010000000000000089fd429aef16c6e3ecaa8a7924080d67c0aeac87448793609bd8299d6dfc465829b711ce28eb8f7d62fcca7ebd067fbe96bd1485f6aaa8486ecc079a82e301d8"], 0x60}], 0x1, 0x8001) recvmsg(r1, &(0x7f0000001e80)={0x0, 0x4010, &(0x7f0000001e00)=[{&(0x7f0000001c80)=""/103, 0xf380}], 0x1}, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:47:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000003980)=ANY=[@ANYBLOB="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"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000003640)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) statx(r1, &(0x7f0000000ac0)='./file1\x00', 0x800, 0x40, &(0x7f0000003880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x848061, &(0x7f0000000780)=ANY=[@ANYRES8=r2, @ANYRES64=r5, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="10666f776e657235", @ANYRESDEC=r9, @ANYRESHEX=r6]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)={{}, {0x1, 0x2}, [{0x2, 0x5}, {0x2, 0x5}, {0x2, 0x5, 0xee00}, {}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2}, {0x2, 0x8, 0xee00}, {}, {0x2, 0x5}, {0x2, 0x4, r4}], {0x4, 0x2}, [{0x8, 0x4, r7}, {0x8, 0x5, r8}, {0x8, 0x3, r8}, {0x8, 0x1, 0xee01}, {}, {0x8, 0x7, 0xffffffffffffffff}, {0x8, 0x6, r9}, {0x8, 0x2, r10}], {0x10, 0x4}, {0x20, 0x5}}, 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 02:47:10 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000003980)=ANY=[@ANYBLOB="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"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000003640)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) statx(r1, &(0x7f0000000ac0)='./file1\x00', 0x800, 0x40, &(0x7f0000003880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x848061, &(0x7f0000000780)=ANY=[@ANYRES8=r2, @ANYRES64=r5, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="10666f776e657235", @ANYRESDEC=r9, @ANYRESHEX=r6]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)={{}, {0x1, 0x2}, [{0x2, 0x5}, {0x2, 0x5}, {0x2, 0x5, 0xee00}, {}, {0x2, 0x0, 0xffffffffffffffff}, {0x2, 0x2}, {0x2, 0x8, 0xee00}, {}, {0x2, 0x5}, {0x2, 0x4, r4}], {0x4, 0x2}, [{0x8, 0x4, r7}, {0x8, 0x5, r8}, {0x8, 0x3, r8}, {0x8, 0x1, 0xee01}, {}, {0x8, 0x7, 0xffffffffffffffff}, {0x8, 0x6, r9}, {0x8, 0x2, r10}], {0x10, 0x4}, {0x20, 0x5}}, 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) [ 914.497752] Bluetooth: hci4: command 0x0406 tx timeout 02:47:10 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000540)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000000c0)="e4e32dd2b696733552eca3e954943a18709f72fbd259a936c67ebe806ab21823f4a0c47bff45323c2b30982dfc67b46cc9a5a07c33fc", 0xff6d}, {&(0x7f0000000100)="3a10bd003aba0c7026336b", 0xb}], 0x2, &(0x7f0000000440)=ANY=[@ANYBLOB="300000000000000017e2ffff010000001800000045f43a1e02f4596a8034a9ab3e39597e422ffab456dd963a0000000018000000000000001701000004000000060200000000000018000000000000001701000003000000010000000000000089fd429aef16c6e3ecaa8a7924080d67c0aeac87448793609bd8299d6dfc465829b711ce28eb8f7d62fcca7ebd067fbe96bd1485f6aaa8486ecc079a82e301d8"], 0x60}], 0x1, 0x8001) recvmsg(r1, &(0x7f0000001e80)={0x0, 0x4010, &(0x7f0000001e00)=[{&(0x7f0000001c80)=""/103, 0xf380}], 0x1}, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 914.520623] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 02:47:10 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000540)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000000c0)="e4e32dd2b696733552eca3e954943a18709f72fbd259a936c67ebe806ab21823f4a0c47bff45323c2b30982dfc67b46cc9a5a07c33fc", 0xff6d}, {&(0x7f0000000100)="3a10bd003aba0c7026336b", 0xb}], 0x2, &(0x7f0000000440)=ANY=[@ANYBLOB="300000000000000017e2ffff010000001800000045f43a1e02f4596a8034a9ab3e39597e422ffab456dd963a0000000018000000000000001701000004000000060200000000000018000000000000001701000003000000010000000000000089fd429aef16c6e3ecaa8a7924080d67c0aeac87448793609bd8299d6dfc465829b711ce28eb8f7d62fcca7ebd067fbe96bd1485f6aaa8486ecc079a82e301d8"], 0x60}], 0x1, 0x8001) recvmsg(r1, &(0x7f0000001e80)={0x0, 0x4010, &(0x7f0000001e00)=[{&(0x7f0000001c80)=""/103, 0xf380}], 0x1}, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:47:10 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="480000001000054700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300fdff00080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=@newtfilter={0x68, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xfff1}}, [@filter_kind_options=@f_basic={{0xa}, {0x38, 0x2, [@TCA_BASIC_EMATCHES={0x34, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x805}}, @TCA_EMATCH_TREE_LIST={0x28, 0x2, 0x0, 0x1, [@TCF_EM_META={0x24, 0x1, 0x0, 0x0, {{0x0, 0x5}, [@TCA_EM_META_LVALUE={0x15, 0x2, [@TCF_META_TYPE_VAR='\x00\x00 \x00\x00', @TCF_META_TYPE_INT, @TCF_META_TYPE_INT, @TCF_META_TYPE_INT]}]}}]}]}]}}]}, 0x68}}, 0x0) 02:47:10 executing program 1: symlinkat(0x0, 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.events\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r1, 0x10e, 0x4, 0x0, &(0x7f0000000080)) 02:47:10 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000540)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000000c0)="e4e32dd2b696733552eca3e954943a18709f72fbd259a936c67ebe806ab21823f4a0c47bff45323c2b30982dfc67b46cc9a5a07c33fc", 0xff6d}, {&(0x7f0000000100)="3a10bd003aba0c7026336b", 0xb}], 0x2, &(0x7f0000000440)=ANY=[@ANYBLOB="300000000000000017e2ffff010000001800000045f43a1e02f4596a8034a9ab3e39597e422ffab456dd963a0000000018000000000000001701000004000000060200000000000018000000000000001701000003000000010000000000000089fd429aef16c6e3ecaa8a7924080d67c0aeac87448793609bd8299d6dfc465829b711ce28eb8f7d62fcca7ebd067fbe96bd1485f6aaa8486ecc079a82e301d8"], 0x60}], 0x1, 0x8001) recvmsg(r1, &(0x7f0000001e80)={0x0, 0x4010, &(0x7f0000001e00)=[{&(0x7f0000001c80)=""/103, 0xf380}], 0x1}, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 02:47:10 executing program 5: syz_emit_ethernet(0xce, &(0x7f0000000200)={@local, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "94bf94", 0x98, 0x3a, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "9349c9", 0x0, 0x0, 0x0, @dev, @dev, [@hopopts={0x0, 0xa, '\x00', [@hao={0xc9, 0x10, @remote}, @generic={0x0, 0x29, "abfb6dfb038aa58c728fd54a4ed52b748c06dab762615843c1f261dd977acedd4318b4ecb25f735802"}, @hao={0xc9, 0x10, @ipv4}, @ra={0x5, 0x2c}]}], "42504681b83fbcc1"}}}}}}}, 0x0) [ 914.724821] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 02:47:10 executing program 1: symlinkat(0x0, 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.events\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r1, 0x10e, 0x4, 0x0, &(0x7f0000000080)) 02:47:11 executing program 5: mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x1000006, 0x400002172, 0xffffffffffffffff, 0x0) mbind(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x2, &(0x7f0000000180)=0x7, 0x2, 0x2) 02:47:11 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="480000001000054700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300fdff00080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=@newtfilter={0x68, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xfff1}}, [@filter_kind_options=@f_basic={{0xa}, {0x38, 0x2, [@TCA_BASIC_EMATCHES={0x34, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x805}}, @TCA_EMATCH_TREE_LIST={0x28, 0x2, 0x0, 0x1, [@TCF_EM_META={0x24, 0x1, 0x0, 0x0, {{0x0, 0x5}, [@TCA_EM_META_LVALUE={0x15, 0x2, [@TCF_META_TYPE_VAR='\x00\x00 \x00\x00', @TCF_META_TYPE_INT, @TCF_META_TYPE_INT, @TCF_META_TYPE_INT]}]}}]}]}]}}]}, 0x68}}, 0x0) 02:47:11 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[], 0xef) splice(r1, 0x0, r0, &(0x7f0000000080), 0x7ffffffb, 0x0) 02:47:11 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) ioctl$IOCTL_VMCI_QUEUEPAIR_ALLOC(r0, 0x7a8, 0x0) 02:47:11 executing program 2: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f0000000000)=0xfbfffff8) mmap$dsp(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x2000007, 0x12, r0, 0x0) ioctl$SNDCTL_DSP_SETFRAGMENT(r0, 0xc004500a, &(0x7f0000000080)) mmap$dsp(&(0x7f0000002000/0x1000)=nil, 0x1002, 0x3, 0x12, r0, 0x0) 02:47:11 executing program 1: symlinkat(0x0, 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.events\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r1, 0x10e, 0x4, 0x0, &(0x7f0000000080)) 02:47:11 executing program 5: mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x1000006, 0x400002172, 0xffffffffffffffff, 0x0) mbind(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x2, &(0x7f0000000180)=0x7, 0x2, 0x2) 02:47:11 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[], 0xef) splice(r1, 0x0, r0, &(0x7f0000000080), 0x7ffffffb, 0x0) [ 915.048825] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 02:47:11 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x80}, 0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000180)=[@in={0x2, 0x4e23, @empty}], 0x10) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000001c0)={0x0, 0x0, 0x4}, 0x8) 02:47:11 executing program 5: mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x1000006, 0x400002172, 0xffffffffffffffff, 0x0) mbind(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x2, &(0x7f0000000180)=0x7, 0x2, 0x2) 02:47:11 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) chdir(&(0x7f0000000200)='./bus\x00') creat(&(0x7f0000000040)='./bus\x00', 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x2, 0x0) r1 = open(&(0x7f00000002c0)='./bus\x00', 0x42202, 0x0) splice(r0, 0x0, r1, 0x0, 0xfdef, 0x0) r2 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r3 = dup2(r2, r1) write$FUSE_IOCTL(r3, &(0x7f0000000000)={0xfffffffffffffef0}, 0x20) 02:47:11 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[], 0xef) splice(r1, 0x0, r0, &(0x7f0000000080), 0x7ffffffb, 0x0) 02:47:11 executing program 5: mmap(&(0x7f0000008000/0x4000)=nil, 0x4000, 0x1000006, 0x400002172, 0xffffffffffffffff, 0x0) mbind(&(0x7f000000a000/0x3000)=nil, 0x3000, 0x2, &(0x7f0000000180)=0x7, 0x2, 0x2) 02:47:11 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="480000001000054700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000090001006866736300fdff00080002"], 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=@newtfilter={0x68, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xfff1}}, [@filter_kind_options=@f_basic={{0xa}, {0x38, 0x2, [@TCA_BASIC_EMATCHES={0x34, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x805}}, @TCA_EMATCH_TREE_LIST={0x28, 0x2, 0x0, 0x1, [@TCF_EM_META={0x24, 0x1, 0x0, 0x0, {{0x0, 0x5}, [@TCA_EM_META_LVALUE={0x15, 0x2, [@TCF_META_TYPE_VAR='\x00\x00 \x00\x00', @TCF_META_TYPE_INT, @TCF_META_TYPE_INT, @TCF_META_TYPE_INT]}]}}]}]}]}}]}, 0x68}}, 0x0) 02:47:11 executing program 1: symlinkat(0x0, 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cgroup.events\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0xfea7) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r1, 0x10e, 0x4, 0x0, &(0x7f0000000080)) 02:47:11 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$binfmt_script(r2, &(0x7f00000000c0)=ANY=[], 0xef) splice(r1, 0x0, r0, &(0x7f0000000080), 0x7ffffffb, 0x0) [ 915.273093] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 02:47:11 executing program 5: r0 = socket$caif_stream(0x25, 0x1, 0x0) setsockopt$CAIFSO_LINK_SELECT(r0, 0x114, 0x7f, 0x0, 0x63) 02:47:11 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80, 0x8}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f00000e4000/0x800000)=nil, 0x800000) mremap(&(0x7f00006bc000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f000091a000/0x4000)=nil) madvise(&(0x7f00008c7000/0xa000)=nil, 0xa000, 0x0) r0 = shmget$private(0x0, 0x2000, 0x10, &(0x7f0000ffb000/0x2000)=nil) shmat(r0, &(0x7f0000765000/0x1000)=nil, 0x0) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x3) shmat(0x0, &(0x7f000021d000/0x3000)=nil, 0x6000) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB='P'], 0x50}, 0x1, 0x0, 0x0, 0x4004805}, 0x0) preadv(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x401, 0x8000) sendmsg$IPSET_CMD_LIST(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="2321202e2f66696c6530202b2a205e252f2928143a205e282065727370616e0020692b86a8f9edaf6d20626174616476300020205b272d2a2b5d1e2065727370616e002062617461647630570afd7e2c308dbfbd63225318abd8c26c63fe4419fc58d310da57e1231c0bac7b4e351bffa00d293881579d6ea693092d0e4060c40be65f24215c8adb4ddb1a8bf3c0d5079b70cee2bb30ee531e6ca630354a60b881277005000000cec85607000000000000003240"], 0xd6) shmget$private(0x0, 0x4000, 0x400, &(0x7f000085a000/0x4000)=nil) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newlink={0x64, 0x10, 0x401, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x44708}, [@IFLA_LINKINFO={0x3c, 0x12, 0x0, 0x1, @erspan={{0xb}, {0x2c, 0x2, 0x0, 0x1, [@IFLA_GRE_ENCAP_SPORT={0x6}, @IFLA_GRE_TOS={0x5, 0x9, 0x20}, @IFLA_GRE_ERSPAN_HWID={0x6, 0x18, 0x30}, @IFLA_GRE_REMOTE={0x8, 0x7, @private=0xa010102}, @IFLA_GRE_LINK={0x8}]}}}, @IFLA_MASTER={0x8}]}, 0x64}}, 0x0) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f000056a000/0x4000)=nil) 02:47:11 executing program 4: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) fstat(r3, &(0x7f0000000240)) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) accept4(r5, 0x0, 0x0, 0x80800) sendto$unix(r0, &(0x7f0000000380)="fc0938f4095aea8323e9f1e8cdb6c2759241680cc01283ee6a15723c830c29c922", 0x21, 0x0, 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) unshare(0x6c060000) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x2200c001, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x6, @mcast2, 0xfff}, 0x1c) socket(0x5353db051f2bb248, 0x80000, 0x3) [ 915.401052] [ 915.402700] ====================================================== [ 915.409024] WARNING: possible circular locking dependency detected [ 915.415363] 4.19.211-syzkaller #0 Not tainted [ 915.419843] ------------------------------------------------------ [ 915.426154] syz-executor.0/31198 is trying to acquire lock: [ 915.431861] 00000000b3aefac4 (&ovl_i_mutex_key[depth]#2){+.+.}, at: ovl_write_iter+0x148/0xb40 [ 915.440637] [ 915.440637] but task is already holding lock: [ 915.446607] 000000006c470966 (&pipe->mutex/1){+.+.}, at: pipe_wait+0x1bd/0x1e0 [ 915.453979] [ 915.453979] which lock already depends on the new lock. [ 915.453979] [ 915.462298] [ 915.462298] the existing dependency chain (in reverse order) is: [ 915.469909] [ 915.469909] -> #2 (&pipe->mutex/1){+.+.}: [ 915.475555] pipe_lock+0x63/0x80 [ 915.479439] iter_file_splice_write+0x183/0xbb0 [ 915.484625] __se_sys_splice+0xfe7/0x16d0 [ 915.489297] do_syscall_64+0xf9/0x620 [ 915.493622] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 915.499325] [ 915.499325] -> #1 (sb_writers#3){.+.+}: [ 915.504914] mnt_want_write+0x3a/0xb0 [ 915.509239] ovl_setattr+0xdd/0x920 [ 915.513384] notify_change+0x70b/0xfc0 [ 915.517792] do_truncate+0x134/0x1f0 [ 915.522026] path_openat+0x2308/0x2df0 [ 915.526432] do_filp_open+0x18c/0x3f0 [ 915.530762] do_sys_open+0x3b3/0x520 [ 915.534996] do_syscall_64+0xf9/0x620 [ 915.539319] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 915.545019] [ 915.545019] -> #0 (&ovl_i_mutex_key[depth]#2){+.+.}: [ 915.551614] down_write+0x34/0x90 [ 915.555678] ovl_write_iter+0x148/0xb40 [ 915.560172] __vfs_write+0x51b/0x770 [ 915.564403] __kernel_write+0x109/0x370 [ 915.568977] write_pipe_buf+0x153/0x1f0 [ 915.573466] __splice_from_pipe+0x389/0x800 [ 915.578300] default_file_splice_write+0xd8/0x180 [ 915.583657] __se_sys_splice+0xfe7/0x16d0 [ 915.588333] do_syscall_64+0xf9/0x620 [ 915.592655] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 915.598351] [ 915.598351] other info that might help us debug this: [ 915.598351] [ 915.606486] Chain exists of: [ 915.606486] &ovl_i_mutex_key[depth]#2 --> sb_writers#3 --> &pipe->mutex/1 [ 915.606486] [ 915.617953] Possible unsafe locking scenario: [ 915.617953] [ 915.624006] CPU0 CPU1 [ 915.628659] ---- ---- [ 915.633311] lock(&pipe->mutex/1); [ 915.636929] lock(sb_writers#3); [ 915.642894] lock(&pipe->mutex/1); [ 915.649030] lock(&ovl_i_mutex_key[depth]#2); [ 915.653691] [ 915.653691] *** DEADLOCK *** [ 915.653691] [ 915.659743] 2 locks held by syz-executor.0/31198: [ 915.664569] #0: 0000000091b9e2b3 (sb_writers#18){.+.+}, at: __se_sys_splice+0x11de/0x16d0 [ 915.672978] #1: 000000006c470966 (&pipe->mutex/1){+.+.}, at: pipe_wait+0x1bd/0x1e0 [ 915.680829] [ 915.680829] stack backtrace: [ 915.685328] CPU: 1 PID: 31198 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 915.693200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/12/2023 [ 915.702554] Call Trace: [ 915.705155] dump_stack+0x1fc/0x2ef [ 915.706599] IPVS: ftp: loaded support on port[0] = 21 [ 915.708794] print_circular_bug.constprop.0.cold+0x2d7/0x41e [ 915.708810] __lock_acquire+0x30c9/0x3ff0 [ 915.708827] ? mark_held_locks+0xf0/0xf0 [ 915.727990] ? mark_held_locks+0xf0/0xf0 [ 915.732056] ? mark_held_locks+0xf0/0xf0 [ 915.736117] lock_acquire+0x170/0x3c0 [ 915.740041] ? ovl_write_iter+0x148/0xb40 [ 915.744189] down_write+0x34/0x90 [ 915.747640] ? ovl_write_iter+0x148/0xb40 02:47:11 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80, 0x8}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f00000e4000/0x800000)=nil, 0x800000) mremap(&(0x7f00006bc000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f000091a000/0x4000)=nil) madvise(&(0x7f00008c7000/0xa000)=nil, 0xa000, 0x0) r0 = shmget$private(0x0, 0x2000, 0x10, &(0x7f0000ffb000/0x2000)=nil) shmat(r0, &(0x7f0000765000/0x1000)=nil, 0x0) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x3) shmat(0x0, &(0x7f000021d000/0x3000)=nil, 0x6000) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB='P'], 0x50}, 0x1, 0x0, 0x0, 0x4004805}, 0x0) preadv(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x401, 0x8000) sendmsg$IPSET_CMD_LIST(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="2321202e2f66696c6530202b2a205e252f2928143a205e282065727370616e0020692b86a8f9edaf6d20626174616476300020205b272d2a2b5d1e2065727370616e002062617461647630570afd7e2c308dbfbd63225318abd8c26c63fe4419fc58d310da57e1231c0bac7b4e351bffa00d293881579d6ea693092d0e4060c40be65f24215c8adb4ddb1a8bf3c0d5079b70cee2bb30ee531e6ca630354a60b881277005000000cec85607000000000000003240"], 0xd6) shmget$private(0x0, 0x4000, 0x400, &(0x7f000085a000/0x4000)=nil) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newlink={0x64, 0x10, 0x401, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x44708}, [@IFLA_LINKINFO={0x3c, 0x12, 0x0, 0x1, @erspan={{0xb}, {0x2c, 0x2, 0x0, 0x1, [@IFLA_GRE_ENCAP_SPORT={0x6}, @IFLA_GRE_TOS={0x5, 0x9, 0x20}, @IFLA_GRE_ERSPAN_HWID={0x6, 0x18, 0x30}, @IFLA_GRE_REMOTE={0x8, 0x7, @private=0xa010102}, @IFLA_GRE_LINK={0x8}]}}}, @IFLA_MASTER={0x8}]}, 0x64}}, 0x0) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f000056a000/0x4000)=nil) [ 915.751787] ovl_write_iter+0x148/0xb40 [ 915.755771] ? lock_acquire+0x170/0x3c0 [ 915.759751] ? pipe_wait+0x1bd/0x1e0 [ 915.763462] ? ovl_file_accessed.part.0+0x3d0/0x3d0 [ 915.768504] ? __mutex_lock+0x368/0x1190 [ 915.772564] ? finish_task_switch+0x146/0x760 [ 915.777057] ? finish_task_switch+0x118/0x760 [ 915.781559] __vfs_write+0x51b/0x770 [ 915.785273] ? kernel_read+0x110/0x110 [ 915.789251] ? __wake_up_locked_key_bookmark+0x20/0x20 [ 915.794594] ? pipe_wait+0x15a/0x1e0 [ 915.798308] __kernel_write+0x109/0x370 [ 915.802283] write_pipe_buf+0x153/0x1f0 [ 915.806259] ? default_file_splice_read+0xa00/0xa00 [ 915.811277] ? splice_from_pipe_next.part.0+0x2ad/0x360 [ 915.816642] __splice_from_pipe+0x389/0x800 [ 915.820967] ? default_file_splice_read+0xa00/0xa00 [ 915.825985] default_file_splice_write+0xd8/0x180 [ 915.830827] ? generic_splice_sendpage+0x140/0x140 [ 915.835761] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 915.840768] ? generic_splice_sendpage+0x140/0x140 [ 915.845693] __se_sys_splice+0xfe7/0x16d0 [ 915.849837] ? do_futex+0x1880/0x1880 [ 915.853630] ? __se_sys_tee+0xb90/0xb90 [ 915.857604] ? trace_hardirqs_off_caller+0x6e/0x210 [ 915.862614] ? do_syscall_64+0x21/0x620 [ 915.866581] do_syscall_64+0xf9/0x620 [ 915.870376] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 915.875585] RIP: 0033:0x7fd6919440c9 [ 915.879290] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 f1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 915.898182] RSP: 002b:00007fd68feb6168 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 915.905881] RAX: ffffffffffffffda RBX: 00007fd691a63f80 RCX: 00007fd6919440c9 [ 915.913137] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000004 [ 915.920393] RBP: 00007fd69199fae9 R08: 000000000000fdef R09: 0000000000000000 [ 915.927655] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 915.934908] R13: 00007ffe0ae8ef5f R14: 00007fd68feb6300 R15: 0000000000022000 [ 915.960405] caif:caif_disconnect_client(): nothing to disconnect 02:47:12 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x80}, 0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000180)=[@in={0x2, 0x4e23, @empty}], 0x10) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000001c0)={0x0, 0x0, 0x4}, 0x8) 02:47:12 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80, 0x8}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f00000e4000/0x800000)=nil, 0x800000) mremap(&(0x7f00006bc000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f000091a000/0x4000)=nil) madvise(&(0x7f00008c7000/0xa000)=nil, 0xa000, 0x0) r0 = shmget$private(0x0, 0x2000, 0x10, &(0x7f0000ffb000/0x2000)=nil) shmat(r0, &(0x7f0000765000/0x1000)=nil, 0x0) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x3) shmat(0x0, &(0x7f000021d000/0x3000)=nil, 0x6000) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB='P'], 0x50}, 0x1, 0x0, 0x0, 0x4004805}, 0x0) preadv(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x401, 0x8000) sendmsg$IPSET_CMD_LIST(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="2321202e2f66696c6530202b2a205e252f2928143a205e282065727370616e0020692b86a8f9edaf6d20626174616476300020205b272d2a2b5d1e2065727370616e002062617461647630570afd7e2c308dbfbd63225318abd8c26c63fe4419fc58d310da57e1231c0bac7b4e351bffa00d293881579d6ea693092d0e4060c40be65f24215c8adb4ddb1a8bf3c0d5079b70cee2bb30ee531e6ca630354a60b881277005000000cec85607000000000000003240"], 0xd6) shmget$private(0x0, 0x4000, 0x400, &(0x7f000085a000/0x4000)=nil) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newlink={0x64, 0x10, 0x401, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x44708}, [@IFLA_LINKINFO={0x3c, 0x12, 0x0, 0x1, @erspan={{0xb}, {0x2c, 0x2, 0x0, 0x1, [@IFLA_GRE_ENCAP_SPORT={0x6}, @IFLA_GRE_TOS={0x5, 0x9, 0x20}, @IFLA_GRE_ERSPAN_HWID={0x6, 0x18, 0x30}, @IFLA_GRE_REMOTE={0x8, 0x7, @private=0xa010102}, @IFLA_GRE_LINK={0x8}]}}}, @IFLA_MASTER={0x8}]}, 0x64}}, 0x0) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f000056a000/0x4000)=nil) 02:47:12 executing program 5: r0 = socket$caif_stream(0x25, 0x1, 0x0) setsockopt$CAIFSO_LINK_SELECT(r0, 0x114, 0x7f, 0x0, 0x63) 02:47:12 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) chdir(&(0x7f0000000200)='./bus\x00') creat(&(0x7f0000000040)='./bus\x00', 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x2, 0x0) r1 = open(&(0x7f00000002c0)='./bus\x00', 0x42202, 0x0) splice(r0, 0x0, r1, 0x0, 0xfdef, 0x0) r2 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r3 = dup2(r2, r1) write$FUSE_IOCTL(r3, &(0x7f0000000000)={0xfffffffffffffef0}, 0x20) 02:47:12 executing program 5: r0 = socket$caif_stream(0x25, 0x1, 0x0) setsockopt$CAIFSO_LINK_SELECT(r0, 0x114, 0x7f, 0x0, 0x63) [ 916.067975] caif:caif_disconnect_client(): nothing to disconnect 02:47:12 executing program 5: r0 = socket$caif_stream(0x25, 0x1, 0x0) setsockopt$CAIFSO_LINK_SELECT(r0, 0x114, 0x7f, 0x0, 0x63) [ 916.146361] caif:caif_disconnect_client(): nothing to disconnect 02:47:12 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) chdir(&(0x7f0000000200)='./bus\x00') creat(&(0x7f0000000040)='./bus\x00', 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x2, 0x0) r1 = open(&(0x7f00000002c0)='./bus\x00', 0x42202, 0x0) splice(r0, 0x0, r1, 0x0, 0xfdef, 0x0) r2 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r3 = dup2(r2, r1) write$FUSE_IOCTL(r3, &(0x7f0000000000)={0xfffffffffffffef0}, 0x20) 02:47:12 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80, 0x8}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f00000e4000/0x800000)=nil, 0x800000) mremap(&(0x7f00006bc000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f000091a000/0x4000)=nil) madvise(&(0x7f00008c7000/0xa000)=nil, 0xa000, 0x0) r0 = shmget$private(0x0, 0x2000, 0x10, &(0x7f0000ffb000/0x2000)=nil) shmat(r0, &(0x7f0000765000/0x1000)=nil, 0x0) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x3) shmat(0x0, &(0x7f000021d000/0x3000)=nil, 0x6000) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB='P'], 0x50}, 0x1, 0x0, 0x0, 0x4004805}, 0x0) preadv(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x401, 0x8000) sendmsg$IPSET_CMD_LIST(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="2321202e2f66696c6530202b2a205e252f2928143a205e282065727370616e0020692b86a8f9edaf6d20626174616476300020205b272d2a2b5d1e2065727370616e002062617461647630570afd7e2c308dbfbd63225318abd8c26c63fe4419fc58d310da57e1231c0bac7b4e351bffa00d293881579d6ea693092d0e4060c40be65f24215c8adb4ddb1a8bf3c0d5079b70cee2bb30ee531e6ca630354a60b881277005000000cec85607000000000000003240"], 0xd6) shmget$private(0x0, 0x4000, 0x400, &(0x7f000085a000/0x4000)=nil) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newlink={0x64, 0x10, 0x401, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x44708}, [@IFLA_LINKINFO={0x3c, 0x12, 0x0, 0x1, @erspan={{0xb}, {0x2c, 0x2, 0x0, 0x1, [@IFLA_GRE_ENCAP_SPORT={0x6}, @IFLA_GRE_TOS={0x5, 0x9, 0x20}, @IFLA_GRE_ERSPAN_HWID={0x6, 0x18, 0x30}, @IFLA_GRE_REMOTE={0x8, 0x7, @private=0xa010102}, @IFLA_GRE_LINK={0x8}]}}}, @IFLA_MASTER={0x8}]}, 0x64}}, 0x0) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f000056a000/0x4000)=nil) 02:47:12 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) chdir(&(0x7f0000000200)='./bus\x00') creat(&(0x7f0000000040)='./bus\x00', 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x2, 0x0) r1 = open(&(0x7f00000002c0)='./bus\x00', 0x42202, 0x0) splice(r0, 0x0, r1, 0x0, 0xfdef, 0x0) r2 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r3 = dup2(r2, r1) write$FUSE_IOCTL(r3, &(0x7f0000000000)={0xfffffffffffffef0}, 0x20) 02:47:12 executing program 4: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) fstat(r3, &(0x7f0000000240)) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) accept4(r5, 0x0, 0x0, 0x80800) sendto$unix(r0, &(0x7f0000000380)="fc0938f4095aea8323e9f1e8cdb6c2759241680cc01283ee6a15723c830c29c922", 0x21, 0x0, 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) unshare(0x6c060000) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x2200c001, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x6, @mcast2, 0xfff}, 0x1c) socket(0x5353db051f2bb248, 0x80000, 0x3) [ 916.230879] caif:caif_disconnect_client(): nothing to disconnect 02:47:12 executing program 0: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) chdir(&(0x7f0000000200)='./bus\x00') creat(&(0x7f0000000040)='./bus\x00', 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x2, 0x0) r1 = open(&(0x7f00000002c0)='./bus\x00', 0x42202, 0x0) splice(r0, 0x0, r1, 0x0, 0xfdef, 0x0) r2 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r3 = dup2(r2, r1) write$FUSE_IOCTL(r3, &(0x7f0000000000)={0xfffffffffffffef0}, 0x20) 02:47:12 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80, 0x8}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f00000e4000/0x800000)=nil, 0x800000) mremap(&(0x7f00006bc000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f000091a000/0x4000)=nil) madvise(&(0x7f00008c7000/0xa000)=nil, 0xa000, 0x0) r0 = shmget$private(0x0, 0x2000, 0x10, &(0x7f0000ffb000/0x2000)=nil) shmat(r0, &(0x7f0000765000/0x1000)=nil, 0x0) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x3) shmat(0x0, &(0x7f000021d000/0x3000)=nil, 0x6000) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB='P'], 0x50}, 0x1, 0x0, 0x0, 0x4004805}, 0x0) preadv(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x401, 0x8000) sendmsg$IPSET_CMD_LIST(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="2321202e2f66696c6530202b2a205e252f2928143a205e282065727370616e0020692b86a8f9edaf6d20626174616476300020205b272d2a2b5d1e2065727370616e002062617461647630570afd7e2c308dbfbd63225318abd8c26c63fe4419fc58d310da57e1231c0bac7b4e351bffa00d293881579d6ea693092d0e4060c40be65f24215c8adb4ddb1a8bf3c0d5079b70cee2bb30ee531e6ca630354a60b881277005000000cec85607000000000000003240"], 0xd6) shmget$private(0x0, 0x4000, 0x400, &(0x7f000085a000/0x4000)=nil) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newlink={0x64, 0x10, 0x401, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x44708}, [@IFLA_LINKINFO={0x3c, 0x12, 0x0, 0x1, @erspan={{0xb}, {0x2c, 0x2, 0x0, 0x1, [@IFLA_GRE_ENCAP_SPORT={0x6}, @IFLA_GRE_TOS={0x5, 0x9, 0x20}, @IFLA_GRE_ERSPAN_HWID={0x6, 0x18, 0x30}, @IFLA_GRE_REMOTE={0x8, 0x7, @private=0xa010102}, @IFLA_GRE_LINK={0x8}]}}}, @IFLA_MASTER={0x8}]}, 0x64}}, 0x0) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f000056a000/0x4000)=nil) [ 916.517763] IPVS: ftp: loaded support on port[0] = 21 02:47:13 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x80}, 0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000180)=[@in={0x2, 0x4e23, @empty}], 0x10) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000001c0)={0x0, 0x0, 0x4}, 0x8) 02:47:13 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) chdir(&(0x7f0000000200)='./bus\x00') creat(&(0x7f0000000040)='./bus\x00', 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x2, 0x0) r1 = open(&(0x7f00000002c0)='./bus\x00', 0x42202, 0x0) splice(r0, 0x0, r1, 0x0, 0xfdef, 0x0) r2 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r3 = dup2(r2, r1) write$FUSE_IOCTL(r3, &(0x7f0000000000)={0xfffffffffffffef0}, 0x20) 02:47:13 executing program 0: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) fstat(r3, &(0x7f0000000240)) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) accept4(r5, 0x0, 0x0, 0x80800) sendto$unix(r0, &(0x7f0000000380)="fc0938f4095aea8323e9f1e8cdb6c2759241680cc01283ee6a15723c830c29c922", 0x21, 0x0, 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) unshare(0x6c060000) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x2200c001, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x6, @mcast2, 0xfff}, 0x1c) socket(0x5353db051f2bb248, 0x80000, 0x3) 02:47:13 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80, 0x8}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f00000e4000/0x800000)=nil, 0x800000) mremap(&(0x7f00006bc000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f000091a000/0x4000)=nil) madvise(&(0x7f00008c7000/0xa000)=nil, 0xa000, 0x0) r0 = shmget$private(0x0, 0x2000, 0x10, &(0x7f0000ffb000/0x2000)=nil) shmat(r0, &(0x7f0000765000/0x1000)=nil, 0x0) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x3) shmat(0x0, &(0x7f000021d000/0x3000)=nil, 0x6000) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB='P'], 0x50}, 0x1, 0x0, 0x0, 0x4004805}, 0x0) preadv(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x401, 0x8000) sendmsg$IPSET_CMD_LIST(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="2321202e2f66696c6530202b2a205e252f2928143a205e282065727370616e0020692b86a8f9edaf6d20626174616476300020205b272d2a2b5d1e2065727370616e002062617461647630570afd7e2c308dbfbd63225318abd8c26c63fe4419fc58d310da57e1231c0bac7b4e351bffa00d293881579d6ea693092d0e4060c40be65f24215c8adb4ddb1a8bf3c0d5079b70cee2bb30ee531e6ca630354a60b881277005000000cec85607000000000000003240"], 0xd6) shmget$private(0x0, 0x4000, 0x400, &(0x7f000085a000/0x4000)=nil) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newlink={0x64, 0x10, 0x401, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x44708}, [@IFLA_LINKINFO={0x3c, 0x12, 0x0, 0x1, @erspan={{0xb}, {0x2c, 0x2, 0x0, 0x1, [@IFLA_GRE_ENCAP_SPORT={0x6}, @IFLA_GRE_TOS={0x5, 0x9, 0x20}, @IFLA_GRE_ERSPAN_HWID={0x6, 0x18, 0x30}, @IFLA_GRE_REMOTE={0x8, 0x7, @private=0xa010102}, @IFLA_GRE_LINK={0x8}]}}}, @IFLA_MASTER={0x8}]}, 0x64}}, 0x0) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f000056a000/0x4000)=nil) 02:47:13 executing program 3: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80, 0x8}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f00000e4000/0x800000)=nil, 0x800000) mremap(&(0x7f00006bc000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f000091a000/0x4000)=nil) madvise(&(0x7f00008c7000/0xa000)=nil, 0xa000, 0x0) r0 = shmget$private(0x0, 0x2000, 0x10, &(0x7f0000ffb000/0x2000)=nil) shmat(r0, &(0x7f0000765000/0x1000)=nil, 0x0) perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x3) shmat(0x0, &(0x7f000021d000/0x3000)=nil, 0x6000) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000200)=ANY=[@ANYBLOB='P'], 0x50}, 0x1, 0x0, 0x0, 0x4004805}, 0x0) preadv(0xffffffffffffffff, &(0x7f00000000c0), 0x0, 0x401, 0x8000) sendmsg$IPSET_CMD_LIST(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, 0x7, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x1c}}, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="2321202e2f66696c6530202b2a205e252f2928143a205e282065727370616e0020692b86a8f9edaf6d20626174616476300020205b272d2a2b5d1e2065727370616e002062617461647630570afd7e2c308dbfbd63225318abd8c26c63fe4419fc58d310da57e1231c0bac7b4e351bffa00d293881579d6ea693092d0e4060c40be65f24215c8adb4ddb1a8bf3c0d5079b70cee2bb30ee531e6ca630354a60b881277005000000cec85607000000000000003240"], 0xd6) shmget$private(0x0, 0x4000, 0x400, &(0x7f000085a000/0x4000)=nil) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newlink={0x64, 0x10, 0x401, 0x0, 0x3, {0x0, 0x0, 0x0, 0x0, 0x44708}, [@IFLA_LINKINFO={0x3c, 0x12, 0x0, 0x1, @erspan={{0xb}, {0x2c, 0x2, 0x0, 0x1, [@IFLA_GRE_ENCAP_SPORT={0x6}, @IFLA_GRE_TOS={0x5, 0x9, 0x20}, @IFLA_GRE_ERSPAN_HWID={0x6, 0x18, 0x30}, @IFLA_GRE_REMOTE={0x8, 0x7, @private=0xa010102}, @IFLA_GRE_LINK={0x8}]}}}, @IFLA_MASTER={0x8}]}, 0x64}}, 0x0) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f000056a000/0x4000)=nil) [ 917.082981] IPVS: ftp: loaded support on port[0] = 21 02:47:13 executing program 4: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) fstat(r3, &(0x7f0000000240)) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) accept4(r5, 0x0, 0x0, 0x80800) sendto$unix(r0, &(0x7f0000000380)="fc0938f4095aea8323e9f1e8cdb6c2759241680cc01283ee6a15723c830c29c922", 0x21, 0x0, 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) unshare(0x6c060000) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x2200c001, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x6, @mcast2, 0xfff}, 0x1c) socket(0x5353db051f2bb248, 0x80000, 0x3) [ 917.542878] IPVS: ftp: loaded support on port[0] = 21 02:47:13 executing program 5: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) chdir(&(0x7f0000000200)='./bus\x00') creat(&(0x7f0000000040)='./bus\x00', 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x8001420, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x2, 0x0) r1 = open(&(0x7f00000002c0)='./bus\x00', 0x42202, 0x0) splice(r0, 0x0, r1, 0x0, 0xfdef, 0x0) r2 = open$dir(&(0x7f0000000180)='./file0\x00', 0x7e, 0x0) r3 = dup2(r2, r1) write$FUSE_IOCTL(r3, &(0x7f0000000000)={0xfffffffffffffef0}, 0x20) 02:47:14 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x80}, 0x8) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000180)=[@in={0x2, 0x4e23, @empty}], 0x10) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000001c0)={0x0, 0x0, 0x4}, 0x8) 02:47:14 executing program 0: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) fstat(r3, &(0x7f0000000240)) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) accept4(r5, 0x0, 0x0, 0x80800) sendto$unix(r0, &(0x7f0000000380)="fc0938f4095aea8323e9f1e8cdb6c2759241680cc01283ee6a15723c830c29c922", 0x21, 0x0, 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) unshare(0x6c060000) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x2200c001, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x6, @mcast2, 0xfff}, 0x1c) socket(0x5353db051f2bb248, 0x80000, 0x3) 02:47:14 executing program 1: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) fstat(r3, &(0x7f0000000240)) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) accept4(r5, 0x0, 0x0, 0x80800) sendto$unix(r0, &(0x7f0000000380)="fc0938f4095aea8323e9f1e8cdb6c2759241680cc01283ee6a15723c830c29c922", 0x21, 0x0, 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) unshare(0x6c060000) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x2200c001, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x6, @mcast2, 0xfff}, 0x1c) socket(0x5353db051f2bb248, 0x80000, 0x3) 02:47:14 executing program 3: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) fstat(r3, &(0x7f0000000240)) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) accept4(r5, 0x0, 0x0, 0x80800) sendto$unix(r0, &(0x7f0000000380)="fc0938f4095aea8323e9f1e8cdb6c2759241680cc01283ee6a15723c830c29c922", 0x21, 0x0, 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) unshare(0x6c060000) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x2200c001, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x6, @mcast2, 0xfff}, 0x1c) socket(0x5353db051f2bb248, 0x80000, 0x3) [ 918.471383] IPVS: ftp: loaded support on port[0] = 21 [ 918.660724] IPVS: ftp: loaded support on port[0] = 21 02:47:15 executing program 4: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) fstat(r3, &(0x7f0000000240)) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) accept4(r5, 0x0, 0x0, 0x80800) sendto$unix(r0, &(0x7f0000000380)="fc0938f4095aea8323e9f1e8cdb6c2759241680cc01283ee6a15723c830c29c922", 0x21, 0x0, 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) unshare(0x6c060000) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x2200c001, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x6, @mcast2, 0xfff}, 0x1c) socket(0x5353db051f2bb248, 0x80000, 0x3) 02:47:15 executing program 1: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) fstat(r3, &(0x7f0000000240)) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) accept4(r5, 0x0, 0x0, 0x80800) sendto$unix(r0, &(0x7f0000000380)="fc0938f4095aea8323e9f1e8cdb6c2759241680cc01283ee6a15723c830c29c922", 0x21, 0x0, 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) unshare(0x6c060000) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x2200c001, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x6, @mcast2, 0xfff}, 0x1c) socket(0x5353db051f2bb248, 0x80000, 0x3) 02:47:15 executing program 0: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) fstat(r3, &(0x7f0000000240)) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) accept4(r5, 0x0, 0x0, 0x80800) sendto$unix(r0, &(0x7f0000000380)="fc0938f4095aea8323e9f1e8cdb6c2759241680cc01283ee6a15723c830c29c922", 0x21, 0x0, 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) unshare(0x6c060000) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x2200c001, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x6, @mcast2, 0xfff}, 0x1c) socket(0x5353db051f2bb248, 0x80000, 0x3) 02:47:15 executing program 2: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) fstat(r3, &(0x7f0000000240)) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) accept4(r5, 0x0, 0x0, 0x80800) sendto$unix(r0, &(0x7f0000000380)="fc0938f4095aea8323e9f1e8cdb6c2759241680cc01283ee6a15723c830c29c922", 0x21, 0x0, 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) unshare(0x6c060000) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x2200c001, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x6, @mcast2, 0xfff}, 0x1c) socket(0x5353db051f2bb248, 0x80000, 0x3) 02:47:15 executing program 5: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) fstat(r3, &(0x7f0000000240)) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) accept4(r5, 0x0, 0x0, 0x80800) sendto$unix(r0, &(0x7f0000000380)="fc0938f4095aea8323e9f1e8cdb6c2759241680cc01283ee6a15723c830c29c922", 0x21, 0x0, 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) unshare(0x6c060000) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x2200c001, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x6, @mcast2, 0xfff}, 0x1c) socket(0x5353db051f2bb248, 0x80000, 0x3) [ 920.910216] IPVS: ftp: loaded support on port[0] = 21 [ 920.998148] IPVS: ftp: loaded support on port[0] = 21 [ 921.008217] IPVS: ftp: loaded support on port[0] = 21 [ 921.777388] IPVS: ftp: loaded support on port[0] = 21 [ 921.843598] IPVS: ftp: loaded support on port[0] = 21 02:47:18 executing program 3: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) fstat(r3, &(0x7f0000000240)) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) accept4(r5, 0x0, 0x0, 0x80800) sendto$unix(r0, &(0x7f0000000380)="fc0938f4095aea8323e9f1e8cdb6c2759241680cc01283ee6a15723c830c29c922", 0x21, 0x0, 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) unshare(0x6c060000) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x2200c001, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x6, @mcast2, 0xfff}, 0x1c) socket(0x5353db051f2bb248, 0x80000, 0x3) 02:47:18 executing program 2: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) fstat(r3, &(0x7f0000000240)) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) accept4(r5, 0x0, 0x0, 0x80800) sendto$unix(r0, &(0x7f0000000380)="fc0938f4095aea8323e9f1e8cdb6c2759241680cc01283ee6a15723c830c29c922", 0x21, 0x0, 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) unshare(0x6c060000) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x2200c001, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x6, @mcast2, 0xfff}, 0x1c) socket(0x5353db051f2bb248, 0x80000, 0x3) 02:47:18 executing program 1: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) fstat(r3, &(0x7f0000000240)) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) accept4(r5, 0x0, 0x0, 0x80800) sendto$unix(r0, &(0x7f0000000380)="fc0938f4095aea8323e9f1e8cdb6c2759241680cc01283ee6a15723c830c29c922", 0x21, 0x0, 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) unshare(0x6c060000) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x2200c001, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x6, @mcast2, 0xfff}, 0x1c) socket(0x5353db051f2bb248, 0x80000, 0x3) 02:47:18 executing program 4: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) fstat(r3, &(0x7f0000000240)) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) accept4(r5, 0x0, 0x0, 0x80800) sendto$unix(r0, &(0x7f0000000380)="fc0938f4095aea8323e9f1e8cdb6c2759241680cc01283ee6a15723c830c29c922", 0x21, 0x0, 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) unshare(0x6c060000) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x2200c001, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x6, @mcast2, 0xfff}, 0x1c) socket(0x5353db051f2bb248, 0x80000, 0x3) 02:47:18 executing program 0: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) fstat(r3, &(0x7f0000000240)) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) accept4(r5, 0x0, 0x0, 0x80800) sendto$unix(r0, &(0x7f0000000380)="fc0938f4095aea8323e9f1e8cdb6c2759241680cc01283ee6a15723c830c29c922", 0x21, 0x0, 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) unshare(0x6c060000) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x2200c001, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x6, @mcast2, 0xfff}, 0x1c) socket(0x5353db051f2bb248, 0x80000, 0x3) [ 923.501484] IPVS: ftp: loaded support on port[0] = 21 [ 923.577630] IPVS: ftp: loaded support on port[0] = 21 [ 924.264061] IPVS: ftp: loaded support on port[0] = 21 [ 924.383227] IPVS: ftp: loaded support on port[0] = 21 02:47:20 executing program 2: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) fstat(r3, &(0x7f0000000240)) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) accept4(r5, 0x0, 0x0, 0x80800) sendto$unix(r0, &(0x7f0000000380)="fc0938f4095aea8323e9f1e8cdb6c2759241680cc01283ee6a15723c830c29c922", 0x21, 0x0, 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) unshare(0x6c060000) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x2200c001, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x6, @mcast2, 0xfff}, 0x1c) socket(0x5353db051f2bb248, 0x80000, 0x3) 02:47:20 executing program 3: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) fstat(r3, &(0x7f0000000240)) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) accept4(r5, 0x0, 0x0, 0x80800) sendto$unix(r0, &(0x7f0000000380)="fc0938f4095aea8323e9f1e8cdb6c2759241680cc01283ee6a15723c830c29c922", 0x21, 0x0, 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) unshare(0x6c060000) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x2200c001, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x6, @mcast2, 0xfff}, 0x1c) socket(0x5353db051f2bb248, 0x80000, 0x3) 02:47:20 executing program 5: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) fstat(r3, &(0x7f0000000240)) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) accept4(r5, 0x0, 0x0, 0x80800) sendto$unix(r0, &(0x7f0000000380)="fc0938f4095aea8323e9f1e8cdb6c2759241680cc01283ee6a15723c830c29c922", 0x21, 0x0, 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) unshare(0x6c060000) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x2200c001, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x6, @mcast2, 0xfff}, 0x1c) socket(0x5353db051f2bb248, 0x80000, 0x3) 02:47:20 executing program 1: mkdir(&(0x7f0000000580)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000000)='cgroup.procs\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000180)='0', 0x1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0xae) fstat(r3, &(0x7f0000000240)) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(arc4)-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) accept4(r5, 0x0, 0x0, 0x80800) sendto$unix(r0, &(0x7f0000000380)="fc0938f4095aea8323e9f1e8cdb6c2759241680cc01283ee6a15723c830c29c922", 0x21, 0x0, 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) unshare(0x6c060000) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x2200c001, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e21, 0x6, @mcast2, 0xfff}, 0x1c) socket(0x5353db051f2bb248, 0x80000, 0x3)