0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d307830303030303030303030303034bd32312c667363616368652c63616368653d667363616368652c63d8406779f442529ae0616368657461673d736d6170735f726f6c6c7570002c70726976706f72742c76657273696f6e3d3970323030302c7665a8ccc56d909bcad5323030302c667363616368652c706f73215fc2fcb9697861636c2c6673757569643d64373338646238642d633835752d343730352d9a3635352d33000034346366302c726f6f74636f6e746578743d756e636f6e66696e65645f752c726f6f74636f6e746578743d726f6f742c6f626a5f726f6c653d2f70726f632f6d656d696e666f002c636f6e7465fb0978743d73797374656d5f752c726f6f74636f6e746578743d73797361646d5f752c6673757569643d62663431383438382d653639392d613332322d343566392d6530320f633430612c6673757569643d65313461646630622d396528392d666363002d376661312d6131335738306566def6c0eb6d553caf084ea76dcaae4391297b0b2bd83d5bcd62598ed46baee3ee58ef68c2687e5bc132274a178f051ad5f76fe8e52ec44951754b3f6525b15b02bdf665c998bdf0d6082aa724551e6add0b70b12b43495e14c4269c7eb05487f50167da4d13b59da0c2de11fafffffff9c439503fbdce4f07185f8eee37"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="0200", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, 0x0, 0x0) getsockopt$SO_TIMESTAMP(r2, 0x1, 0x0, 0x0, 0x0) (async) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x0, 0xb642}) r3 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000100)={'ip_vti0\x00', 0x0}) (async) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000080), &(0x7f0000000180)=0x4) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) (async) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) [ 447.314529] audit: type=1800 audit(1670637203.754:334): pid=1028 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.1" name="bus" dev="sda1" ino=14833 res=0 01:53:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = socket$nl_route(0x10, 0x3, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) r1 = socket$netlink(0x10, 0x3, 0x0) (async) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e, 0xb642}) (async) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) (async) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000040)={'wlan0\x00'}) (async) sendmsg$NL80211_CMD_PROBE_CLIENT(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x5c, 0x0, 0x100, 0x70bd29, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x0, 0x1f}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa}]}, 0x5c}, 0x1, 0x0, 0x0, 0x200000c0}, 0x0) (async) sendmsg$nl_route(r0, 0x0, 0x0) 01:53:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, 0x0, 0x0) getsockopt$SO_TIMESTAMP(r2, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x0, 0xb642}) r3 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000100)={'ip_vti0\x00', 0x0}) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000080), &(0x7f0000000180)=0x4) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) socket$netlink(0x10, 0x3, 0x0) (async) sendmsg$NFT_BATCH(r2, 0x0, 0x0) (async) getsockopt$SO_TIMESTAMP(r2, 0x1, 0x0, 0x0, 0x0) (async) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x0, 0xb642}) (async) socket(0x10, 0x2, 0x0) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000100)={'ip_vti0\x00', 0x0}) (async) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000080), &(0x7f0000000180)=0x4) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) (async) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) (async) 01:53:23 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="0200", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e, 0xb642}) r1 = socket(0x10, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r2, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x48, 0x0, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x7}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xd1}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x5}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x81}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @remote}]}, 0x58}}, 0x20000014) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) sendmsg$nl_route(r0, 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) 01:53:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r1 = socket(0x10, 0x2, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000200), r2) sendmsg$NLBL_CIPSOV4_C_ADD(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000003880)=ANY=[@ANYBLOB="1c000000e42b16ff5b97a56e63eb5e698baf41d88a4b0b703a1c261016c1abd004653c5ced35de2fedda7c19750e8e14a3f405dda4f60200519d2cfb935a51b74039470c8c05cc", @ANYRES16=r3, @ANYBLOB="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"], 0x1c}}, 0x0) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f00000006c0)={0x4d8, r3, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x7}]}, @NLBL_CIPSOV4_A_MLSCATLST={0xf0, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4eca}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd207}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1e9befe1}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3620}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x703811ae}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa911}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x16c63660}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6c8b}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xeb75}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe9e1}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x12ddb304}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x57ae23c9}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xacba}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x594ff1c}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x199f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x184c2a1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8cbc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7de1263e}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7eda173f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5fbb2cbf}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3740c7db}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2df404ac}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8765}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdf8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3b59}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2dbd30a7}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0xbc, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xddb0}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x79c8bc01}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6a7b3b1c}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xcb8c519}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x18aa}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x614ca6db}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x425f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7e5fc4ba}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xad1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x12fa}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3f6c4f08}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x28bb}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x640f0ce7}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9b3b}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd357}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x44e8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xaa17}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2156343c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7e1491c2}]}, {0x4}]}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x7}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x5}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x2}, {0x5}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_MLSCATLST={0xa0, 0xc, 0x0, 0x1, [{0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x65b14ea6}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x75b7}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7ea3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2a99}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2feb38d3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xa873b49}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1b1ea367}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7fa0}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3daec04a}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfa00}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x81a4}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1971ba53}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1212}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x246fc44d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4da011e3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe044}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x59ed}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa787}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x10c, 0xc, 0x0, 0x1, [{0x4c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xab93}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x740f7e24}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xcb67}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26006f57}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x79e299cd}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe3a}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4828}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x67796a35}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc95e}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x53f49087}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xeb35}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x77a311d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xad28}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x677562f0}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2b19}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x8717743}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5a361d4d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4c7c5da3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1c89579a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7ea1c10a}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7d751425}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2847}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x79ec4409}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5f9ac5f0}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x434c}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xed4f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbfaa}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5e3d82c9}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9fbd}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x61ea15ee}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x6}, {0x5, 0x3, 0x6}, {0x5, 0x3, 0x5}]}, @NLBL_CIPSOV4_A_MLSCATLST={0xac, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3f56012}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x77e3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6a9c}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x39cd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2bf4fa84}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x373768b2}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x982c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3a4af3d4}]}, {0x4c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xafe5da5}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xc8d0d1f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xff88}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x644ae83b}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8eba}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x163370aa}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x571ee2cb}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x669be753}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x135c0ef4}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4bc247de}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x51bc}]}]}]}, 0x4d8}, 0x1, 0x0, 0x0, 0x8804}, 0x40051) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x64080) 01:53:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, 0x0, 0x0) getsockopt$SO_TIMESTAMP(r2, 0x1, 0x0, 0x0, 0x0) ioctl$SIOCGETSGCNT(r1, 0x89e1, &(0x7f0000000080)={@private=0xa010102, @multicast2}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0x8) write$binfmt_script(r3, &(0x7f00000002c0)={'#! ', './file0', [], 0xa, "badd4e06ed314c8d450044733b0618f9fa06133155de6f8a75b66f2db1b24e9e31675cd304a3fd1050908a945e147d11e74841dcafc60270f97d2fc96049a0d645c71349e1bebd67a25d205b907b9c260cb4a35d1a815e990396d258a3a49710c4778eaacdf3b4497c806dff3b2cab8edf80855b80505119f4c9e381b4e34c50762ba60d88911b4f7f491665dc0ea6614e202eecd05ad8ca58ca5b874614fc1d65465426c49f5685f41fa2a928e0efb27c0ced48ffd50f95"}, 0xc3) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x0, 0xb642}) r4 = socket(0x10, 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x5, 0x4010, r5, 0x28426000) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 01:53:24 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="020008", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:24 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r1 = socket$nl_route(0x10, 0x3, 0x0) (async) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0x8) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x1f, 0x0, 0x5, 0x9, 0x0, 0x8, 0x20200, 0x4, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x80, 0x4, @perf_bp={&(0x7f0000000180), 0xc}, 0x10000, 0xffff, 0x4413, 0x4, 0x80000001, 0x6c4, 0x20, 0x0, 0x1, 0x0, 0x3}, 0x0, 0xc, r0, 0x8) ioctl$FICLONE(r2, 0x40049409, 0xffffffffffffffff) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) r3 = socket$netlink(0x10, 0x3, 0x0) (async) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) (async) r4 = getpid() sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x4) (async) sched_setscheduler(r4, 0x2, &(0x7f0000000380)=0x80) (async) r5 = open(&(0x7f00000000c0)='./bus\x00', 0x14da42, 0x0) (async) r6 = openat(0xffffffffffffffff, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x80001d00c0d0) (async) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x3b, 0x1f, 0x20, 0x2, 0x0, 0x200, 0x8048, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1ff, 0x2, @perf_config_ext={0x0, 0xfffffffffffffff9}, 0x9c04d, 0x6, 0x4, 0x0, 0x6, 0x200, 0x7, 0x0, 0x10001, 0x0, 0x1000}, r4, 0xe, r5, 0x0) sendmsg$NFT_BATCH(r3, 0x0, 0x0) (async) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e, 0xb642}) (async) r7 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r7, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r7, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) (async) sendmsg$NFT_BATCH(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000100001000000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) (async) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 01:53:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, 0x0, 0x0) getsockopt$SO_TIMESTAMP(r2, 0x1, 0x0, 0x0, 0x0) ioctl$SIOCGETSGCNT(r1, 0x89e1, &(0x7f0000000080)={@private=0xa010102, @multicast2}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0x8) write$binfmt_script(r3, &(0x7f00000002c0)={'#! ', './file0', [], 0xa, "badd4e06ed314c8d450044733b0618f9fa06133155de6f8a75b66f2db1b24e9e31675cd304a3fd1050908a945e147d11e74841dcafc60270f97d2fc96049a0d645c71349e1bebd67a25d205b907b9c260cb4a35d1a815e990396d258a3a49710c4778eaacdf3b4497c806dff3b2cab8edf80855b80505119f4c9e381b4e34c50762ba60d88911b4f7f491665dc0ea6614e202eecd05ad8ca58ca5b874614fc1d65465426c49f5685f41fa2a928e0efb27c0ced48ffd50f95"}, 0xc3) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x0, 0xb642}) r4 = socket(0x10, 0x2, 0x0) r5 = socket$can_raw(0x1d, 0x3, 0x1) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x5, 0x4010, r5, 0x28426000) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) socket$netlink(0x10, 0x3, 0x0) (async) sendmsg$NFT_BATCH(r2, 0x0, 0x0) (async) getsockopt$SO_TIMESTAMP(r2, 0x1, 0x0, 0x0, 0x0) (async) ioctl$SIOCGETSGCNT(r1, 0x89e1, &(0x7f0000000080)={@private=0xa010102, @multicast2}) (async) socket$inet6_sctp(0xa, 0x5, 0x84) (async) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0x8) (async) write$binfmt_script(r3, &(0x7f00000002c0)={'#! ', './file0', [], 0xa, "badd4e06ed314c8d450044733b0618f9fa06133155de6f8a75b66f2db1b24e9e31675cd304a3fd1050908a945e147d11e74841dcafc60270f97d2fc96049a0d645c71349e1bebd67a25d205b907b9c260cb4a35d1a815e990396d258a3a49710c4778eaacdf3b4497c806dff3b2cab8edf80855b80505119f4c9e381b4e34c50762ba60d88911b4f7f491665dc0ea6614e202eecd05ad8ca58ca5b874614fc1d65465426c49f5685f41fa2a928e0efb27c0ced48ffd50f95"}, 0xc3) (async) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x0, 0xb642}) (async) socket(0x10, 0x2, 0x0) (async) socket$can_raw(0x1d, 0x3, 0x1) (async) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x5, 0x4010, r5, 0x28426000) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) (async) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) (async) 01:53:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) (async) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) (async) r1 = socket(0x10, 0x2, 0x0) socket$packet(0x11, 0x3, 0x300) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) (async) sendmsg$NFT_BATCH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) (async) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000200), r2) sendmsg$NLBL_CIPSOV4_C_ADD(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000003880)=ANY=[@ANYBLOB="1c000000e42b16ff5b97a56e63eb5e698baf41d88a4b0b703a1c261016c1abd004653c5ced35de2fedda7c19750e8e14a3f405dda4f60200519d2cfb935a51b74039470c8c05cc", @ANYRES16=r3, @ANYBLOB="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"], 0x1c}}, 0x0) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f00000006c0)={0x4d8, r3, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x7}]}, @NLBL_CIPSOV4_A_MLSCATLST={0xf0, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4eca}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd207}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1e9befe1}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3620}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x703811ae}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa911}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x16c63660}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6c8b}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xeb75}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe9e1}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x12ddb304}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x57ae23c9}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xacba}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x594ff1c}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x199f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x184c2a1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8cbc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7de1263e}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7eda173f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5fbb2cbf}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3740c7db}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2df404ac}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8765}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdf8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3b59}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2dbd30a7}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0xbc, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xddb0}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x79c8bc01}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6a7b3b1c}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xcb8c519}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x18aa}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x614ca6db}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x425f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7e5fc4ba}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xad1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x12fa}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3f6c4f08}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x28bb}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x640f0ce7}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9b3b}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd357}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x44e8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xaa17}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2156343c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7e1491c2}]}, {0x4}]}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x7}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x5}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x2}, {0x5}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_MLSCATLST={0xa0, 0xc, 0x0, 0x1, [{0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x65b14ea6}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x75b7}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7ea3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2a99}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2feb38d3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xa873b49}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1b1ea367}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7fa0}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3daec04a}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfa00}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x81a4}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1971ba53}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1212}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x246fc44d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4da011e3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe044}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x59ed}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa787}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x10c, 0xc, 0x0, 0x1, [{0x4c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xab93}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x740f7e24}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xcb67}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26006f57}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x79e299cd}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe3a}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4828}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x67796a35}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc95e}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x53f49087}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xeb35}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x77a311d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xad28}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x677562f0}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2b19}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x8717743}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5a361d4d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4c7c5da3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1c89579a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7ea1c10a}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7d751425}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2847}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x79ec4409}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5f9ac5f0}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x434c}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xed4f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbfaa}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5e3d82c9}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9fbd}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x61ea15ee}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x6}, {0x5, 0x3, 0x6}, {0x5, 0x3, 0x5}]}, @NLBL_CIPSOV4_A_MLSCATLST={0xac, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3f56012}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x77e3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6a9c}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x39cd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2bf4fa84}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x373768b2}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x982c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3a4af3d4}]}, {0x4c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xafe5da5}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xc8d0d1f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xff88}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x644ae83b}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8eba}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x163370aa}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x571ee2cb}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x669be753}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x135c0ef4}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4bc247de}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x51bc}]}]}]}, 0x4d8}, 0x1, 0x0, 0x0, 0x8804}, 0x40051) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x64080) 01:53:24 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="020008", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = socket$nl_route(0x10, 0x3, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) (async) socket$netlink(0x10, 0x3, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e, 0xb642}) (async) r1 = socket(0x10, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r2, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) (async) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x48, 0x0, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x7}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xd1}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x5}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x81}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @remote}]}, 0x58}}, 0x20000014) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) (async) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) sendmsg$nl_route(r0, 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) 01:53:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = socket$nl_route(0x10, 0x3, 0x0) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) (async) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r2, 0x0, 0x0) (async) getsockopt$SO_TIMESTAMP(r2, 0x1, 0x0, 0x0, 0x0) ioctl$SIOCGETSGCNT(r1, 0x89e1, &(0x7f0000000080)={@private=0xa010102, @multicast2}) (async) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0x8) (async) write$binfmt_script(r3, &(0x7f00000002c0)={'#! ', './file0', [], 0xa, "badd4e06ed314c8d450044733b0618f9fa06133155de6f8a75b66f2db1b24e9e31675cd304a3fd1050908a945e147d11e74841dcafc60270f97d2fc96049a0d645c71349e1bebd67a25d205b907b9c260cb4a35d1a815e990396d258a3a49710c4778eaacdf3b4497c806dff3b2cab8edf80855b80505119f4c9e381b4e34c50762ba60d88911b4f7f491665dc0ea6614e202eecd05ad8ca58ca5b874614fc1d65465426c49f5685f41fa2a928e0efb27c0ced48ffd50f95"}, 0xc3) (async) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x0, 0xb642}) (async) r4 = socket(0x10, 0x2, 0x0) (async) r5 = socket$can_raw(0x1d, 0x3, 0x1) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x5, 0x4010, r5, 0x28426000) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) (async) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 01:53:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x800, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(r1, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e, 0xb642}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r1, 0x8983, &(0x7f0000000180)={0x7, 'veth0_virt_wifi\x00', {0x10000}, 0x101}) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000100001000000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 01:53:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e, 0xb642}) r1 = socket(0x10, 0x2, 0x0) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r2, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x48, 0x0, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x7}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xd1}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x5}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x81}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @remote}]}, 0x58}}, 0x20000014) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) sendmsg$nl_route(r0, 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) socket$netlink(0x10, 0x3, 0x0) (async) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e, 0xb642}) (async) socket(0x10, 0x2, 0x0) (async) socket(0x10, 0x2, 0x0) (async) ioctl$sock_inet_SIOCSIFNETMASK(r2, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) (async) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x48, 0x0, 0x4, 0x70bd25, 0x25dfdbfe, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x7}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xd1}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x5}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x81}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e22}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @remote}]}, 0x58}}, 0x20000014) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) (async) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) (async) sendmsg$nl_route(r0, 0x0, 0x0) (async) socket$can_bcm(0x1d, 0x2, 0x2) (async) 01:53:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f0000000580)={&(0x7f0000000300)=[0x6dc, 0x200, 0x7], 0x3, 0x800, 0x0, 0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000440)={'gretap0\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB='tunl0\x00'/16, @ANYRES32=0x0, @ANYBLOB="8000070000000000000000eb4e4a0038003104000129907864010102ac1414bb9404010000070f05ffffffffe0000002e0000002890f10ac1414aae0000001e0000002000776c23bb402835b46134876f19df051239301658df1d92cc4846212a6312f2a8c545e84baf19dbb74a75fac97b4c3ba2eee5717b3ae89688dd699b15ec2c40198d54812317f2ebc"]}) sendmsg$nl_route_sched(r3, &(0x7f0000000540)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@getchain={0x64, 0x66, 0x200, 0x70bd2d, 0x25dfdbfb, {0x0, 0x0, 0x0, r4, {0xc, 0xc}, {0xfff3, 0x4}, {0xffff, 0x9}}, [{0x8, 0xb, 0x1}, {0x8, 0xb, 0x8}, {0x8, 0xb, 0x7}, {0x8, 0xb, 0xbb6}, {0x8, 0xb, 0x2}, {0x8, 0xb, 0x4}, {0x8, 0xb, 0x10000}, {0x8, 0xb, 0x800}]}, 0x64}, 0x1, 0x0, 0x0, 0x1}, 0x4084800) sendmsg$NFT_BATCH(r2, 0x0, 0x0) getsockopt$SO_TIMESTAMP(r2, 0x1, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1, {0x401}}, './file0\x00'}) setxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'os2.', '\x00'}, &(0x7f00000002c0)='syztnl1\x00', 0x8, 0x1) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r5, 0x8983, &(0x7f0000000180)) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x0, 0xb642}) r6 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r6, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000340)={0x0, @initdev, @multicast2}, &(0x7f00000005c0)=0xc) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'ip6tnl0\x00', r7, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 01:53:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) (async) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) (async) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) (async) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r1 = socket(0x10, 0x2, 0x0) socket$packet(0x11, 0x3, 0x300) (async, rerun: 64) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) (async, rerun: 64) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) (async) sendmsg$NFT_BATCH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) (async) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000200), r2) sendmsg$NLBL_CIPSOV4_C_ADD(r2, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000003880)=ANY=[@ANYBLOB="1c000000e42b16ff5b97a56e63eb5e698baf41d88a4b0b703a1c261016c1abd004653c5ced35de2fedda7c19750e8e14a3f405dda4f60200519d2cfb935a51b74039470c8c05cc", @ANYRES16=r3, @ANYBLOB="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"], 0x1c}}, 0x0) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000180)={&(0x7f00000006c0)={0x4d8, r3, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [@NLBL_CIPSOV4_A_TAGLST={0x1c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x7}]}, @NLBL_CIPSOV4_A_MLSCATLST={0xf0, 0xc, 0x0, 0x1, [{0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4eca}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd207}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1e9befe1}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3620}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x703811ae}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa911}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x16c63660}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6c8b}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xeb75}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe9e1}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x12ddb304}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x57ae23c9}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xacba}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x594ff1c}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x199f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x184c2a1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8cbc}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7de1263e}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7eda173f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5fbb2cbf}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3740c7db}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2df404ac}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8765}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xdf8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x3b59}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2dbd30a7}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0xbc, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xddb0}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x79c8bc01}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x6a7b3b1c}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xcb8c519}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x18aa}]}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x614ca6db}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x425f}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7e5fc4ba}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xad1}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x12fa}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3f6c4f08}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x28bb}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x640f0ce7}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9b3b}]}, {0x34, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xd357}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x44e8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xaa17}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2156343c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7e1491c2}]}, {0x4}]}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x7}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x5}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x2}, {0x5}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x1}, @NLBL_CIPSOV4_A_MLSCATLST={0xa0, 0xc, 0x0, 0x1, [{0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x65b14ea6}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x75b7}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7ea3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2a99}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2feb38d3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xa873b49}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1b1ea367}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x7fa0}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3daec04a}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xfa00}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x81a4}]}, {0x3c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1971ba53}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x1212}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x246fc44d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4da011e3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe044}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x59ed}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xa787}]}]}, @NLBL_CIPSOV4_A_MLSCATLST={0x10c, 0xc, 0x0, 0x1, [{0x4c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xab93}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x740f7e24}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xcb67}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x26006f57}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x79e299cd}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xe3a}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x4828}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x67796a35}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xc95e}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x53f49087}]}, {0x54, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xeb35}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x77a311d}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xad28}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x677562f0}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2b19}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x8717743}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5a361d4d}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4c7c5da3}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x1c89579a}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7ea1c10a}]}, {0x24, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x7d751425}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x2847}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x79ec4409}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5f9ac5f0}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x434c}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xed4f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xbfaa}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x5e3d82c9}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x9fbd}]}, {0xc, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x61ea15ee}]}]}, @NLBL_CIPSOV4_A_TAGLST={0x3c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5, 0x3, 0x5}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x6}, {0x5, 0x3, 0x6}, {0x5, 0x3, 0x5}]}, @NLBL_CIPSOV4_A_MLSCATLST={0xac, 0xc, 0x0, 0x1, [{0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3f56012}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x77e3}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x6a9c}]}, {0x2c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x39cd}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x2bf4fa84}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x373768b2}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x982c}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x3a4af3d4}]}, {0x4c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xafe5da5}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0xc8d0d1f}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0xff88}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x644ae83b}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x8eba}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x163370aa}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x571ee2cb}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x669be753}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x135c0ef4}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATLOC={0x8, 0x9, 0x4bc247de}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x51bc}]}]}]}, 0x4d8}, 0x1, 0x0, 0x0, 0x8804}, 0x40051) (async, rerun: 32) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x64080) (rerun: 32) 01:53:24 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="020008", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x800, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = socket$nl_route(0x10, 0x3, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) (async, rerun: 32) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) (rerun: 32) sendmsg$NFT_BATCH(r1, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e, 0xb642}) (async) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) (async, rerun: 32) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r1, 0x8983, &(0x7f0000000180)={0x7, 'veth0_virt_wifi\x00', {0x10000}, 0x101}) (async, rerun: 32) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000100001000000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) (async) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 01:53:25 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="02000200", @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/module/tpm_tis', 0x0, 0x4) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e, 0xb642}) r2 = socket(0x10, 0x2, 0x0) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000180), r1) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r1, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x3c, r3, 0x4, 0x70bd26, 0x25dfdbff, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x24000410) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) sendmsg$nl_route(r0, 0x0, 0x0) 01:53:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = socket$nl_route(0x10, 0x3, 0x0) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f0000000580)={&(0x7f0000000300)=[0x6dc, 0x200, 0x7], 0x3, 0x800, 0x0, 0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000440)={'gretap0\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB='tunl0\x00'/16, @ANYRES32=0x0, @ANYBLOB="8000070000000000000000eb4e4a0038003104000129907864010102ac1414bb9404010000070f05ffffffffe0000002e0000002890f10ac1414aae0000001e0000002000776c23bb402835b46134876f19df051239301658df1d92cc4846212a6312f2a8c545e84baf19dbb74a75fac97b4c3ba2eee5717b3ae89688dd699b15ec2c40198d54812317f2ebc"]}) (async) sendmsg$nl_route_sched(r3, &(0x7f0000000540)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@getchain={0x64, 0x66, 0x200, 0x70bd2d, 0x25dfdbfb, {0x0, 0x0, 0x0, r4, {0xc, 0xc}, {0xfff3, 0x4}, {0xffff, 0x9}}, [{0x8, 0xb, 0x1}, {0x8, 0xb, 0x8}, {0x8, 0xb, 0x7}, {0x8, 0xb, 0xbb6}, {0x8, 0xb, 0x2}, {0x8, 0xb, 0x4}, {0x8, 0xb, 0x10000}, {0x8, 0xb, 0x800}]}, 0x64}, 0x1, 0x0, 0x0, 0x1}, 0x4084800) (async, rerun: 32) sendmsg$NFT_BATCH(r2, 0x0, 0x0) (async, rerun: 32) getsockopt$SO_TIMESTAMP(r2, 0x1, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1, {0x401}}, './file0\x00'}) setxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'os2.', '\x00'}, &(0x7f00000002c0)='syztnl1\x00', 0x8, 0x1) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r5, 0x8983, &(0x7f0000000180)) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x0, 0xb642}) (async, rerun: 32) r6 = socket(0x10, 0x2, 0x0) (rerun: 32) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r6, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000340)={0x0, @initdev, @multicast2}, &(0x7f00000005c0)=0xc) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'ip6tnl0\x00', r7, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) (async) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 01:53:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:25 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="02000200", @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/module/tpm_tis', 0x0, 0x4) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e, 0xb642}) r2 = socket(0x10, 0x2, 0x0) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000180), r1) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r1, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x3c, r3, 0x4, 0x70bd26, 0x25dfdbff, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x24000410) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) sendmsg$nl_route(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/module/tpm_tis', 0x0, 0x4) (async) socket$nl_route(0x10, 0x3, 0x0) (async) socket$netlink(0x10, 0x3, 0x0) (async) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e, 0xb642}) (async) socket(0x10, 0x2, 0x0) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000180), r1) (async) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r1, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x3c, r3, 0x4, 0x70bd26, 0x25dfdbff, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x24000410) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) (async) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) (async) sendmsg$nl_route(r0, 0x0, 0x0) (async) 01:53:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f0000000580)={&(0x7f0000000300)=[0x6dc, 0x200, 0x7], 0x3, 0x800, 0x0, 0xffffffffffffffff}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000440)={'gretap0\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB='tunl0\x00'/16, @ANYRES32=0x0, @ANYBLOB="8000070000000000000000eb4e4a0038003104000129907864010102ac1414bb9404010000070f05ffffffffe0000002e0000002890f10ac1414aae0000001e0000002000776c23bb402835b46134876f19df051239301658df1d92cc4846212a6312f2a8c545e84baf19dbb74a75fac97b4c3ba2eee5717b3ae89688dd699b15ec2c40198d54812317f2ebc"]}) sendmsg$nl_route_sched(r3, &(0x7f0000000540)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@getchain={0x64, 0x66, 0x200, 0x70bd2d, 0x25dfdbfb, {0x0, 0x0, 0x0, r4, {0xc, 0xc}, {0xfff3, 0x4}, {0xffff, 0x9}}, [{0x8, 0xb, 0x1}, {0x8, 0xb, 0x8}, {0x8, 0xb, 0x7}, {0x8, 0xb, 0xbb6}, {0x8, 0xb, 0x2}, {0x8, 0xb, 0x4}, {0x8, 0xb, 0x10000}, {0x8, 0xb, 0x800}]}, 0x64}, 0x1, 0x0, 0x0, 0x1}, 0x4084800) sendmsg$NFT_BATCH(r2, 0x0, 0x0) getsockopt$SO_TIMESTAMP(r2, 0x1, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1, {0x401}}, './file0\x00'}) setxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'os2.', '\x00'}, &(0x7f00000002c0)='syztnl1\x00', 0x8, 0x1) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r5, 0x8983, &(0x7f0000000180)) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x0, 0xb642}) r6 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r6, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000340)={0x0, @initdev, @multicast2}, &(0x7f00000005c0)=0xc) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'ip6tnl0\x00', r7, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) socket$netlink(0x10, 0x3, 0x0) (async) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r1, 0xc01864c6, &(0x7f0000000580)={&(0x7f0000000300)=[0x6dc, 0x200, 0x7], 0x3, 0x800}) (async) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000440)={'gretap0\x00', &(0x7f00000006c0)=ANY=[@ANYBLOB='tunl0\x00'/16, @ANYRES32=0x0, @ANYBLOB="8000070000000000000000eb4e4a0038003104000129907864010102ac1414bb9404010000070f05ffffffffe0000002e0000002890f10ac1414aae0000001e0000002000776c23bb402835b46134876f19df051239301658df1d92cc4846212a6312f2a8c545e84baf19dbb74a75fac97b4c3ba2eee5717b3ae89688dd699b15ec2c40198d54812317f2ebc"]}) (async) sendmsg$nl_route_sched(r3, &(0x7f0000000540)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000500)={&(0x7f0000000480)=@getchain={0x64, 0x66, 0x200, 0x70bd2d, 0x25dfdbfb, {0x0, 0x0, 0x0, r4, {0xc, 0xc}, {0xfff3, 0x4}, {0xffff, 0x9}}, [{0x8, 0xb, 0x1}, {0x8, 0xb, 0x8}, {0x8, 0xb, 0x7}, {0x8, 0xb, 0xbb6}, {0x8, 0xb, 0x2}, {0x8, 0xb, 0x4}, {0x8, 0xb, 0x10000}, {0x8, 0xb, 0x800}]}, 0x64}, 0x1, 0x0, 0x0, 0x1}, 0x4084800) (async) sendmsg$NFT_BATCH(r2, 0x0, 0x0) (async) getsockopt$SO_TIMESTAMP(r2, 0x1, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1, {0x401}}, './file0\x00'}) (async) setxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)=@random={'os2.', '\x00'}, &(0x7f00000002c0)='syztnl1\x00', 0x8, 0x1) (async) ioctl$sock_SIOCSIFVLAN_GET_VLAN_VID_CMD(r5, 0x8983, &(0x7f0000000180)) (async) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x0, 0xb642}) (async) socket(0x10, 0x2, 0x0) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r6, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) (async) getsockopt$inet_pktinfo(r5, 0x0, 0x8, &(0x7f0000000340)={0x0, @initdev, @multicast2}, &(0x7f00000005c0)=0xc) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'ip6tnl0\x00', r7, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) (async) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) (async) 01:53:25 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="02000200", @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0xff, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, 0x0, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x0, 0xb642}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 01:53:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/module/tpm_tis', 0x0, 0x4) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e, 0xb642}) r2 = socket(0x10, 0x2, 0x0) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000180), r1) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r1, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x3c, r3, 0x4, 0x70bd26, 0x25dfdbff, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x24000410) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) sendmsg$nl_route(r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/module/tpm_tis', 0x0, 0x4) (async) socket$nl_route(0x10, 0x3, 0x0) (async) socket$netlink(0x10, 0x3, 0x0) (async) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e, 0xb642}) (async) socket(0x10, 0x2, 0x0) (async) syz_genetlink_get_family_id$devlink(&(0x7f0000000180), r1) (async) sendmsg$DEVLINK_CMD_PORT_UNSPLIT(r1, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x3c, r3, 0x4, 0x70bd26, 0x25dfdbff, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x24000410) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) (async) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) (async) sendmsg$nl_route(r0, 0x0, 0x0) (async) 01:53:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x800, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = socket$nl_route(0x10, 0x3, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) (async) sendmsg$NFT_BATCH(r1, 0x0, 0x0) (async) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e, 0xb642}) (async) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) (async) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r1, 0x8983, &(0x7f0000000180)={0x7, 'veth0_virt_wifi\x00', {0x10000}, 0x101}) (async) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000100001000000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) (async) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 01:53:25 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000004c0)=0x0) perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x4, 0x3c, 0x5, 0x2, 0x0, 0x2, 0x4, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0xfffffffffffffffc, 0x101}, 0x20, 0x6, 0xfffffff8, 0x8, 0x80000001, 0x6, 0x3, 0x0, 0x442, 0x0, 0x8}, r3, 0x2, r0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r5 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r5, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r5, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r5, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)={0x170, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_FEATURES_WANTED={0x15c, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0xfb, 0x5, "a87e088b9e308ca7a67ec9422f8f7a7f816fbd18991d29487d7d1e42307b7b188773e0c22709a7fdf19a1e24fdb59a4bd25507dea21e9538088fad927aace910d92d028f5d4cdc127193dd82d6b25653a7dd02ce26bc903769a1ced573121ecd811f317b68b5a397228951d096cc573b8df79c5369894364b805e8480a5c41f9697735eb54c07a5b14c2a85683412fe9c294e2396654fc0c91a05a386d493a622b37d16ee546f7d104db1f6ec6ffd9826d5ef308ae40ff5706b835c4c7db328597f61662180e07f94aad9d3ba954273302a43bab855e101d6004743d0281f53a12076fa63b708fbe77eeed9d2e8285f3826175f96ac12d"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x3f}, @ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "ba5ae23b3f15c8713196ddc7d04f1964838ca52805e702cc90b9f245bf1b3a23de3d09a7d94d466a7f0f"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x1f, 0x5, "a116b0e393e12a4b1495fe18594079f3ffb49123686d3797f8354b"}]}]}, 0x170}, 0x1, 0x0, 0x0, 0x20040895}, 0x4c040) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(r4, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) r6 = socket$unix(0x1, 0x2, 0x0) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(r7, 0x84, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0x8) fchdir(r7) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r9 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r9, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r9, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r8, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r6, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000580)={&(0x7f00000006c0)=@delchain={0x1494, 0x65, 0xdb79b1471357368, 0x70bd28, 0x25dfdbfb, {0x0, 0x0, 0x0, r8, {0xb, 0x10}, {0xb, 0xfff2}, {0xffff, 0xb}}, [@filter_kind_options=@f_fw={{0x7}, {0x1458, 0x2, [@TCA_FW_ACT={0x1454, 0x4, [@m_sample={0xf0, 0xc, 0x0, 0x0, {{0xb}, {0x2c, 0x2, 0x0, 0x1, [@TCA_SAMPLE_TRUNC_SIZE={0x8, 0x4, 0xffffffff}, @TCA_SAMPLE_PARMS={0x18, 0x2, {0x1, 0x583f, 0x6, 0x3, 0x8}}, @TCA_SAMPLE_TRUNC_SIZE={0x8, 0x4, 0x2}]}, {0x9a, 0x6, "52fffdac5d6bfff86ee5a319210a2c1fb280e5f6929a316f5a16d327777865f4219fcbe61476438b1af069801b5eb8d8bf1053573a44020e50903d89c38e3e4ef24506bd1e27ec42c7d787b1bcf86c03eca8c29973327f125d8c826c0e601bc2da4d103519be9f5d4466e1b562a849eb7de0974736a1b393eac0492ae404541bf61f572111b921a43f1adcbd51d7cb44657706fa486c"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x2}}}}, @m_ife={0x1048, 0x7, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0xbba, 0x9, 0x6, 0x8, 0x1000}}}]}, {0x1004, 0x6, "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"}, {0xc}, {0xc, 0x8, {0x2, 0x1}}}}, @m_skbedit={0x6c, 0xe, 0x0, 0x0, {{0xc}, {0x3c, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x7}, @TCA_SKBEDIT_QUEUE_MAPPING={0x6, 0x4, 0x6}, @TCA_SKBEDIT_QUEUE_MAPPING={0x6, 0x4, 0x80}, @TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x4}, @TCA_SKBEDIT_PARMS={0x18, 0x2, {0x80000001, 0x7, 0x3, 0x1, 0x3ff}}]}, {0x5, 0x6, "f6"}, {0xc}, {0xc, 0x8, {0x0, 0x2}}}}, @m_skbmod={0xcc, 0x11, 0x0, 0x0, {{0xb}, {0x18, 0x2, 0x0, 0x1, [@TCA_SKBMOD_ETYPE={0x6, 0x5, 0x4}, @TCA_SKBMOD_SMAC={0xa, 0x4, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2e}}]}, {0x8a, 0x6, "f1263753f2f823301a8b6ae9d44a84dcd104329b91d1c9f9f11b45c181691c6b24bf64f690f345ff8f68ecbcbc6c606d6ee98273f74462ffc155074a8037d706d7be25955dd996f3544f6805358c51119eeedb2d422975c7b8947030110a4b50359a6ac0528c036037cb8ca5d7f685fa3c036dbd04f03a9db4315f63e0d4f766ab328608ebbe"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x1}}}}, @m_xt={0x1e0, 0xd, 0x0, 0x0, {{0x7}, {0x14c, 0x2, 0x0, 0x1, [@TCA_IPT_TARG={0x2a, 0x6, {0x800, 'security\x00', 0x2, 0x6}}, @TCA_IPT_HOOK={0x8, 0x2, 0x1}, @TCA_IPT_TABLE={0x24, 0x1, 'raw\x00'}, @TCA_IPT_TABLE={0x24, 0x1, 'security\x00'}, @TCA_IPT_TARG={0xa0, 0x6, {0x81, 'security\x00', 0xd5, 0x4e, "8d610f560a167679e936036ce0b9d2300391f4a0f197c2814df82ff4c9c67834b8e2b7b0a7c471c51142dbee93dec6b10719f1fdcc42d4ade022ae5998cfcfefe7f340a761055aee6152137cfbc169ead9685ddc44e1c8a066cdf0699e2f2a882810ffaf3f871631a6686e63971a649a4fee8f7fd305"}}, @TCA_IPT_TABLE={0x24, 0x1, 'filter\x00'}, @TCA_IPT_INDEX={0x8, 0x3, 0x8}]}, {0x6f, 0x6, "bb8d5aaa22c77727f9fa7495c8af2e54298724b21d8e0b953183a8954965b010e4d3e4bbaa884834a33524a86c82a40ecf3205eae189289712b2543d272a66669db12237ffcc9c12a9bd491a98a9910e50c56f177ec16bf2357dcff5aca8fdc84e1b3b6b417447ce48996f"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}]}]}}, @TCA_CHAIN={0x8, 0xb, 0x5}, @TCA_RATE={0x6, 0x5, {0x81, 0x4}}]}, 0x1494}}, 0x4048090) ioctl$NS_GET_PARENT(r1, 0xb702, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:25 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0xff, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) (async) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, 0x0, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x0, 0x0, 0x0) (async) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x0, 0xb642}) (async) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 01:53:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e, 0xb642}) r1 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="d68a3c633ce853c8b4c762a22ddeaa066ce5d2a9bf033c229deb934421325344b59dcbe5baf2284e5c141345e01c8aef30ab5c6bf5500e2a53af1e840da47f3f80a5e22b1bbe78d36a682b47d9dd5ea6667c39fe6a5ca3c454460e65"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) sendmsg$nl_route(r0, 0x0, 0x0) 01:53:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(r2, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e, 0xb642}) r3 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) r4 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r6 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r6, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r6, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r5, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r4, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x4, 0x0, 0x9, 0x1f, 0x400, r1, 0x6, '\x00', r5, r1, 0x0, 0x2, 0x2}, 0x48) 01:53:26 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0xff, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x3, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = socket$nl_route(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, 0x0, 0x0) (async, rerun: 32) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x0, 0x0, 0x0) (async, rerun: 32) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x0, 0xb642}) (async) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 01:53:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) r0 = socket$nl_route(0x10, 0x3, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) (async) socket$netlink(0x10, 0x3, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e, 0xb642}) (async) r1 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) (async) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="d68a3c633ce853c8b4c762a22ddeaa066ce5d2a9bf033c229deb934421325344b59dcbe5baf2284e5c141345e01c8aef30ab5c6bf5500e2a53af1e840da47f3f80a5e22b1bbe78d36a682b47d9dd5ea6667c39fe6a5ca3c454460e65"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) sendmsg$nl_route(r0, 0x0, 0x0) 01:53:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) (async) sendmsg$NFT_BATCH(r2, 0x0, 0x0) (async) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e, 0xb642}) r3 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) (async) sendmsg$NFT_BATCH(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="ec9a1fd53980ab82c7614b58ce23c4f0857dfdb9f50cae1e1c7f7a79f424e166eab869d35dcb3d9e239c9ec4c05cfa7d3cc40b4aa6ac6dac6c0b1f7d9d717533b56df88ddaa0cc08aac3fdd0beb63db6e53eb3ce09140896922b62e19efe0bc7a0840d45ed9792996cf40f0831406f6dfb8207a613dec79a3b83d45342cc37ec26a61b0fe4ad8c94f443c8b302564878000000000073bd41414e710f88f975f77873a22932ae776f5ff81f2d6e64f673f0de365690f80bbb3899c37a684cd98d443818b14cc0403bdc1232980de2b9352c8dc7d1b1c670470000000000044404b6d0d98abde80fce790f699bf4a1740a123d25d58fe8ae7a5e75db90aba66fe79e8891b52d9abfd251f46b9b62a87591248bb7f7d3b95099a475a4325a27e5b5ab97647b6302d8648d4e2d6ab1b9e626376538dbe7b8743fe33f9f27aec78b5ad555e8fcbd96eac0130f1794d4eb628e56f7c3fb85581bc47dd9e19a3c594ded26794fbb9eacd96db466cde09571eeac5a02b933efcf13f0942e51163f46d53f1ef738996afce385d37c22af2be4ace0"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) (async) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) (async) r4 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) (async) r6 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r6, &(0x7f0000000000), 0x10) (async) sendmsg$can_bcm(r6, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r5, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r4, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x4, 0x0, 0x9, 0x1f, 0x400, r1, 0x6, '\x00', r5, r1, 0x0, 0x2, 0x2}, 0x48) 01:53:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:28 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) (async) r2 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) (async) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) (async) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000004c0)=0x0) perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x4, 0x3c, 0x5, 0x2, 0x0, 0x2, 0x4, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0xfffffffffffffffc, 0x101}, 0x20, 0x6, 0xfffffff8, 0x8, 0x80000001, 0x6, 0x3, 0x0, 0x442, 0x0, 0x8}, r3, 0x2, r0, 0x0) (async) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) (async) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) (async, rerun: 64) r5 = socket(0x10, 0x2, 0x0) (rerun: 64) ioctl$sock_inet_SIOCSIFNETMASK(r5, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r5, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r5, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)={0x170, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_FEATURES_WANTED={0x15c, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0xfb, 0x5, "a87e088b9e308ca7a67ec9422f8f7a7f816fbd18991d29487d7d1e42307b7b188773e0c22709a7fdf19a1e24fdb59a4bd25507dea21e9538088fad927aace910d92d028f5d4cdc127193dd82d6b25653a7dd02ce26bc903769a1ced573121ecd811f317b68b5a397228951d096cc573b8df79c5369894364b805e8480a5c41f9697735eb54c07a5b14c2a85683412fe9c294e2396654fc0c91a05a386d493a622b37d16ee546f7d104db1f6ec6ffd9826d5ef308ae40ff5706b835c4c7db328597f61662180e07f94aad9d3ba954273302a43bab855e101d6004743d0281f53a12076fa63b708fbe77eeed9d2e8285f3826175f96ac12d"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x3f}, @ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "ba5ae23b3f15c8713196ddc7d04f1964838ca52805e702cc90b9f245bf1b3a23de3d09a7d94d466a7f0f"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x1f, 0x5, "a116b0e393e12a4b1495fe18594079f3ffb49123686d3797f8354b"}]}]}, 0x170}, 0x1, 0x0, 0x0, 0x20040895}, 0x4c040) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(r4, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) (async) r6 = socket$unix(0x1, 0x2, 0x0) (async) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(r7, 0x84, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0x8) (async) fchdir(r7) (async, rerun: 64) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) (rerun: 64) r9 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r9, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r9, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r8, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r6, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) (async) sendmsg$nl_route_sched(r2, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000580)={&(0x7f00000006c0)=@delchain={0x1494, 0x65, 0xdb79b1471357368, 0x70bd28, 0x25dfdbfb, {0x0, 0x0, 0x0, r8, {0xb, 0x10}, {0xb, 0xfff2}, {0xffff, 0xb}}, [@filter_kind_options=@f_fw={{0x7}, {0x1458, 0x2, [@TCA_FW_ACT={0x1454, 0x4, [@m_sample={0xf0, 0xc, 0x0, 0x0, {{0xb}, {0x2c, 0x2, 0x0, 0x1, [@TCA_SAMPLE_TRUNC_SIZE={0x8, 0x4, 0xffffffff}, @TCA_SAMPLE_PARMS={0x18, 0x2, {0x1, 0x583f, 0x6, 0x3, 0x8}}, @TCA_SAMPLE_TRUNC_SIZE={0x8, 0x4, 0x2}]}, {0x9a, 0x6, "52fffdac5d6bfff86ee5a319210a2c1fb280e5f6929a316f5a16d327777865f4219fcbe61476438b1af069801b5eb8d8bf1053573a44020e50903d89c38e3e4ef24506bd1e27ec42c7d787b1bcf86c03eca8c29973327f125d8c826c0e601bc2da4d103519be9f5d4466e1b562a849eb7de0974736a1b393eac0492ae404541bf61f572111b921a43f1adcbd51d7cb44657706fa486c"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x2}}}}, @m_ife={0x1048, 0x7, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0xbba, 0x9, 0x6, 0x8, 0x1000}}}]}, {0x1004, 0x6, "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"}, {0xc}, {0xc, 0x8, {0x2, 0x1}}}}, @m_skbedit={0x6c, 0xe, 0x0, 0x0, {{0xc}, {0x3c, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x7}, @TCA_SKBEDIT_QUEUE_MAPPING={0x6, 0x4, 0x6}, @TCA_SKBEDIT_QUEUE_MAPPING={0x6, 0x4, 0x80}, @TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x4}, @TCA_SKBEDIT_PARMS={0x18, 0x2, {0x80000001, 0x7, 0x3, 0x1, 0x3ff}}]}, {0x5, 0x6, "f6"}, {0xc}, {0xc, 0x8, {0x0, 0x2}}}}, @m_skbmod={0xcc, 0x11, 0x0, 0x0, {{0xb}, {0x18, 0x2, 0x0, 0x1, [@TCA_SKBMOD_ETYPE={0x6, 0x5, 0x4}, @TCA_SKBMOD_SMAC={0xa, 0x4, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2e}}]}, {0x8a, 0x6, "f1263753f2f823301a8b6ae9d44a84dcd104329b91d1c9f9f11b45c181691c6b24bf64f690f345ff8f68ecbcbc6c606d6ee98273f74462ffc155074a8037d706d7be25955dd996f3544f6805358c51119eeedb2d422975c7b8947030110a4b50359a6ac0528c036037cb8ca5d7f685fa3c036dbd04f03a9db4315f63e0d4f766ab328608ebbe"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x1}}}}, @m_xt={0x1e0, 0xd, 0x0, 0x0, {{0x7}, {0x14c, 0x2, 0x0, 0x1, [@TCA_IPT_TARG={0x2a, 0x6, {0x800, 'security\x00', 0x2, 0x6}}, @TCA_IPT_HOOK={0x8, 0x2, 0x1}, @TCA_IPT_TABLE={0x24, 0x1, 'raw\x00'}, @TCA_IPT_TABLE={0x24, 0x1, 'security\x00'}, @TCA_IPT_TARG={0xa0, 0x6, {0x81, 'security\x00', 0xd5, 0x4e, "8d610f560a167679e936036ce0b9d2300391f4a0f197c2814df82ff4c9c67834b8e2b7b0a7c471c51142dbee93dec6b10719f1fdcc42d4ade022ae5998cfcfefe7f340a761055aee6152137cfbc169ead9685ddc44e1c8a066cdf0699e2f2a882810ffaf3f871631a6686e63971a649a4fee8f7fd305"}}, @TCA_IPT_TABLE={0x24, 0x1, 'filter\x00'}, @TCA_IPT_INDEX={0x8, 0x3, 0x8}]}, {0x6f, 0x6, "bb8d5aaa22c77727f9fa7495c8af2e54298724b21d8e0b953183a8954965b010e4d3e4bbaa884834a33524a86c82a40ecf3205eae189289712b2543d272a66669db12237ffcc9c12a9bd491a98a9910e50c56f177ec16bf2357dcff5aca8fdc84e1b3b6b417447ce48996f"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}]}]}}, @TCA_CHAIN={0x8, 0xb, 0x5}, @TCA_RATE={0x6, 0x5, {0x81, 0x4}}]}, 0x1494}}, 0x4048090) (async) ioctl$NS_GET_PARENT(r1, 0xb702, 0x0) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:28 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 64) r0 = socket$nl_route(0x10, 0x3, 0x0) (async, rerun: 64) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) (async, rerun: 64) socket$nl_route(0x10, 0x3, 0x0) (async, rerun: 64) socket$netlink(0x10, 0x3, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e, 0xb642}) (async) r1 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) (async) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="d68a3c633ce853c8b4c762a22ddeaa066ce5d2a9bf033c229deb934421325344b59dcbe5baf2284e5c141345e01c8aef30ab5c6bf5500e2a53af1e840da47f3f80a5e22b1bbe78d36a682b47d9dd5ea6667c39fe6a5ca3c454460e65"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) (async) sendmsg$nl_route(r0, 0x0, 0x0) 01:53:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(r2, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e, 0xb642}) r3 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) r4 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r6 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r6, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r6, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r5, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r4, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x4, 0x0, 0x9, 0x1f, 0x400, r1, 0x6, '\x00', r5, r1, 0x0, 0x2, 0x2}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) socket$netlink(0x10, 0x3, 0x0) (async) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) (async) sendmsg$NFT_BATCH(r2, 0x0, 0x0) (async) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e, 0xb642}) (async) socket(0x10, 0x2, 0x0) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) (async) sendmsg$NFT_BATCH(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) (async) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) (async) socket$unix(0x1, 0x2, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000100)={'vcan0\x00'}) (async) socket$can_bcm(0x1d, 0x2, 0x2) (async) connect$can_bcm(r6, &(0x7f0000000000), 0x10) (async) sendmsg$can_bcm(r6, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r5, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r4, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x4, 0x0, 0x9, 0x1f, 0x400, r1, 0x6, '\x00', r5, r1, 0x0, 0x2, 0x2}, 0x48) (async) 01:53:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:28 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) (async) r2 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) (async) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) (async) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) (async) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000004c0)=0x0) perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x4, 0x3c, 0x5, 0x2, 0x0, 0x2, 0x4, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0xfffffffffffffffc, 0x101}, 0x20, 0x6, 0xfffffff8, 0x8, 0x80000001, 0x6, 0x3, 0x0, 0x442, 0x0, 0x8}, r3, 0x2, r0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) (async) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r5 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r5, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r5, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r5, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)={0x170, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_FEATURES_WANTED={0x15c, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0xfb, 0x5, "a87e088b9e308ca7a67ec9422f8f7a7f816fbd18991d29487d7d1e42307b7b188773e0c22709a7fdf19a1e24fdb59a4bd25507dea21e9538088fad927aace910d92d028f5d4cdc127193dd82d6b25653a7dd02ce26bc903769a1ced573121ecd811f317b68b5a397228951d096cc573b8df79c5369894364b805e8480a5c41f9697735eb54c07a5b14c2a85683412fe9c294e2396654fc0c91a05a386d493a622b37d16ee546f7d104db1f6ec6ffd9826d5ef308ae40ff5706b835c4c7db328597f61662180e07f94aad9d3ba954273302a43bab855e101d6004743d0281f53a12076fa63b708fbe77eeed9d2e8285f3826175f96ac12d"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x3f}, @ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "ba5ae23b3f15c8713196ddc7d04f1964838ca52805e702cc90b9f245bf1b3a23de3d09a7d94d466a7f0f"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x1f, 0x5, "a116b0e393e12a4b1495fe18594079f3ffb49123686d3797f8354b"}]}]}, 0x170}, 0x1, 0x0, 0x0, 0x20040895}, 0x4c040) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) (async) sendmsg$NFT_BATCH(r4, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) r6 = socket$unix(0x1, 0x2, 0x0) (async) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(r7, 0x84, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0x8) (async) fchdir(r7) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) (async) r9 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r9, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r9, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r8, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r6, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000580)={&(0x7f00000006c0)=@delchain={0x1494, 0x65, 0xdb79b1471357368, 0x70bd28, 0x25dfdbfb, {0x0, 0x0, 0x0, r8, {0xb, 0x10}, {0xb, 0xfff2}, {0xffff, 0xb}}, [@filter_kind_options=@f_fw={{0x7}, {0x1458, 0x2, [@TCA_FW_ACT={0x1454, 0x4, [@m_sample={0xf0, 0xc, 0x0, 0x0, {{0xb}, {0x2c, 0x2, 0x0, 0x1, [@TCA_SAMPLE_TRUNC_SIZE={0x8, 0x4, 0xffffffff}, @TCA_SAMPLE_PARMS={0x18, 0x2, {0x1, 0x583f, 0x6, 0x3, 0x8}}, @TCA_SAMPLE_TRUNC_SIZE={0x8, 0x4, 0x2}]}, {0x9a, 0x6, "52fffdac5d6bfff86ee5a319210a2c1fb280e5f6929a316f5a16d327777865f4219fcbe61476438b1af069801b5eb8d8bf1053573a44020e50903d89c38e3e4ef24506bd1e27ec42c7d787b1bcf86c03eca8c29973327f125d8c826c0e601bc2da4d103519be9f5d4466e1b562a849eb7de0974736a1b393eac0492ae404541bf61f572111b921a43f1adcbd51d7cb44657706fa486c"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x2}}}}, @m_ife={0x1048, 0x7, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0xbba, 0x9, 0x6, 0x8, 0x1000}}}]}, {0x1004, 0x6, "1518fc5978e1e63b44152f9e51a22858c77e56ce5ece1e7c4f98a0667375257a8bcdfc31ab29c9e793ea470f45130517bd0206e0861ee1a1f4c9fb055a8865b08f97fea44943974ed9bf2aad10ae87b5c202f29ee042cdaa7cb28aa0335133d4c56f24e5b3397edb5719debb10fd4290cae004663f0c4a29a97b46ca06ff78852f59a45750d2040cf3368d494036e4823e799fad7bef9098aef5d2914246a28c69a0c69214251898e51595edea4e43eae38400939ed78d7515787077d04fc6b9a78af59d1df605ca25386d5447fddf39e941cdbc70bc7f66eb66e7298b6b4b2b0d9b20df8581e406a684b1d4331468081c71203a3ce3c1ff454c163b50428dc091e6f6a8b9ffd626db81eee784215edf403f86db3482fee115794c2abfc8eb04011d0d06b3a4d016020b4fab6b8f48d65a982db3856d144c5a6032369b41f14acdbba9b503bf477455d9661dff6a8af1376f71a7d7194ed296af6e7e29bf252315fc70124c19fa9d40131cf45a960a2377977dc345498c7ed903774abb086c2734e4010f935fbfcb0e9f0ee1fc755a8f5857d11cbd45f3a3d8d94b048ccc50d5ecbf94fd6653afa0eb062f1694519633c9f36354d162175d9fa334bdd92c151b729540f800a1c43537aeeca3f6e3ad523b139855b9e0d153db5b512cf4a542451a9fa475065b3a60fe329c89dd1e550b7537802533a177045dc7956bf5d75483e4d9c3f705814839053f948365ede4ce5f311ab0a75d79381b96f1ecdb40cbaa70d8c0489134e08f26123cdedaec5478ea62d3c4bb8f4eb5eaeb5b5e824404b1eb9402a6a30ff3296406ed3875df6b71eb4a25dc6355ef647898678bd853029f0934c8ea89be5592e7c64ec0215217eda16bcacfe16a964935e1798f6a7f1096f174c828ed0e301f682112bc5dc020292a3ac4872e7400b4940aa4696a6126e92657fc1a5f5493cc6203875bb2148113d8de5e754033fe2b5276a76368c8265ca2eed9178e503e6f777e5f44ba1bbde0fb77fc7f054aca6db17e79f2a26f68dcacdf6be927bdedc48a68a49162d92780beba4c1f6597f4e955d1c4dfcf7faabfac3bca954a4c3a5d19f2b480b938c23807e46d61cf93f65eb175b765d22ca68b5954ce38a6ad279f7089eb38e9bb7ab4ec3d953005119bcbf60e3bc74a251861140a415846a095f5399bbf8e72ea4c20220ccf3e89650e39757a413e7b03a0fc57e1f2dedc397ccae5677febac373243de900ffd6c889f6a0c33f00d880c56190aaf727e73b1819855858de41fb2566a2e1e274d96025a8b809b57aefd4f0bede5d3efc84675e9568dfa28a4d3f4525d5898ffd433ad262a7cd181b11ad837960f48f1aa8f3ad13e3e6f6b01fa73eb9df320b21e601ace1772eec81a4d2643f1c5fd868fdec415d90dbf607668fcfec0347dfc282f1a61c59ed56c305db3af143f53b7b2721437e0ef85e7593065b374b310909cf762aad9004db08dadcf5434cd48dd6d0294c82d0c9d18ae48807ee29ff2aa8818780002fac2b5dfde2b00955490b39b8c407199fe929719e6a0318d99942f75f9bda5f2bccf06b566c76d31fae503d4bfd29e14780afda62b60d2ff2d72919a3c56729761d7535b2c78e1a31b9ed8a0314c17c57c4912cbf9dc84417cdd742e0dc2666b84b0e30f29246342ff31c4ca5d8a2bbe926ed4cd8d69c0f7370bb0531e36d962eef48500f7d6935c912182889288400ef1ca91a20332c5d902da18d21525840620b8ffd5810b09dc12bc499f2c913a373885ab25db6d506d2c8985b403df79a9e3b128cad78ee5241830975b7dc2e7c4c926301f45dfc787f39dc9f8e670408a5696e9502157c255628c271eec35d1215860926aa96bb04fabcac7e2b8cd0279ac8690bb1db05c2bc20adbd245053d8b6b9e5418b906acbf4fa0af18338029c76ac3716698915fdec863297ac1331abee57050c0ee28ff75166746d368b5304f8a3070d0d2d2eb2b53fcab384763f5e2204c103d16a62dcde1b0cfdeb1cd180dd4b8115cf1113e994cbe36bacea2b7a007443e56f97645864ece704e2f6cc3a139d3ac4fd12e6518d92ae98c8d9a00bfc96ddf32372a1972eca11eef1031f34c41e1d71aaf5a4bd08874598b8496bed98cad9c1f88d77638fa390adfa2861dbbd29034a975e75b36401c51cc29ed3506a40b55fcbe2aec3ebd1704cb09a4ed64954bd74bf77c75d7cfe4485833b8af7ffac197e3c30cf5b67614aa8839bb4d4310207ae091ec5d754d3159a6a7cda70f390cfcf9b71c7191a9be330aeda7cbdc60d8cfb2cc681aec120753222d6b60184c521ca2cc4c0512ee58ff21dc6b0d1b0c95fefe8f425dcdbdf3d5496730e33deda3deb85051b48b1dfe84c3b14866f0a4d62bee68173b815e954c5b1e236616a06bd1f7fc239ed72d7c333077739573700df9a51d67a73f6c52a33020ce803cac377ad8afa32d938a6bc425e2ff3161961dc90caa19ce3511c541503b28f76f9654add1f6349bc8adfda2664deb0242896fbdc643eb197569bf046769cd45af29a65dc21236de9341f0707002034f24fa2a0c4dd352867e5f3fa0965449b2de2e27eeda7dbd5678b1e7b75d7eb7becf37f99619eecde90772bfb4d61973f285c9bb46564ee25a89ffd2e55d8620778ac062d7d4879c418ac1411ab1cdd46b950291f8149193ef0d89dcff3a926df5b7ae35a33df98fa1689e1577ec57ad8d657b9f00a8693f92089785d68d1769aa8fc47e5efc69ad7d7795f9d0cac9eed3d28ff8eee5f515d68b210dae7fdc48ead1d912d26a885c01673b57f6f56492327ae4c0cde7cd1cdcbda7b3250be5511d0a6c1c084caa9bcf819035a40c89d8e252ada75adfb2d8e7afe5e0a4f31d5436cb27a7b09ee335cde786e4b77109058b0986c8c5b73c89726744da0d34d32d6f7f82d5f62ef0784eb7bd2a7dfd0a02c31992da5d4377ecc4731f7d2eb0c84796f4c006419d34c98ddfec0a733bf33c914b7dd4181ef06505e4407c9f565d372fc515fe64bb3daa189aa6519e0f4abb261c96165e95fe74dbfea1c60d2355bb3800e0dadcf091076abff2d13432f241edf0784619674aee45187c499db0a7a4f19d86f6809195c6b5df3af12b7d5bbe78e49cc0771518db3e2635c904bd7195cb34ab5eaabb4d0f01e9927530dbea3d603724f5b49fb68e6fefc03a79d26072ad3f10e3be5d2a2aea9ab17cfc8d3cc98f0bad4bd4589e5e26ed7f15f95554f0c88628d995c3f6ee594544313cc316846ad637f89eadc1820cfb63b9142fe59e78fb16806de31fe4c9debae80a2e0254691bb6fdada6d21d0bd922825060fd3b645a365be6085d4622d63861ce6ad9bfb72c486dd738d1d0923adc8f71c127f57f1bbb3b9a5c0a0ada6fa345e40924a3e6586b73c077f11c3d598b16c1a0139ae02146a26331e884f23a3e415c616d089a6728ceb55aade77f1ca7a92eb2eab11124e90f60083433f6b7d73120b7249a29bb58cc4cce73ef50b4b1204eb19ed34939467394feb2596500674f7ad292dd2acdc5a3733c4f3c1d8bc592b0c249e0f40f6dc733ae2e58f60e043827d080eed729de108b289dbc33811f870a14f7e75953890b473e061bd5bce64fdfc34428c3577f17be8ad8cd797b53f3b1180b005544e909632709c2e947525aaf78c117195dbce4673bfffba17091dff3ef80205ed637bf495842a19e9c0fc68eda38df8e1201903a99e044f507b6dc54ebbe0f8adfd4f90cba6d9fb7181e93017bc6b3fe05e380f2d6e57c721f49b179b8369322692e62a2b1ef40d3fb840814cba3d6b372fca3e6db1eacf712b86df225a903fd5a6d696ce9243ac66c271ae522ee7bfd8ef8022e516d3917373476887dee535f3fb9bd8789798c8af605502f996dc5efdf4fa40992738d5706c77472d08ecbde0aa8a2930443bafc105cfac4a30436d06d56862e7d9d73707357a2e8ce74718b5e1f5fa221ee529b6d734a0565d270cbf61300215f1945410b86eb0d51580f5c6fb629d30c9ad9b70cf083ce9b556b387a3a9ea819b578b1aa82cb2d10ea6f5629407b429265e99553ed8e6d30b90f2b0c210c17e8b7698e1eb1091ce3cb0166b6ec9753318739893a39f39f6b6f29e6c2d773a6cd3d7a9a1bd233c2e61a3fae1586516311baaf5b2c0753e07c0ca0aed966dc0974cffb19f67dd56811070830e9cde2ab43214082307486d7cbe4613046c844a23dbab674a3fc98db0c186e97b8c9935e395b48a9bb7c1980ad21d5accbb27a3479a5b6e5150cc6f042334de73582b3d6f11766c8954823d6e0d9283206d95dfd41ecc3d6a3b98bacaf55155aba7cb68f63b1932b47a4775a0d689e2de42a6b2e15103f064d8dc2fca4381ba91169a8ffd3b87f46a95a01bea02f82dd221329652249b8657d9ea146187b4a7aa5416d4cd671ac87b6e2aa9cadfec2983539cca3df4e996bb4dbf7a264171363b517684a1e038d25756e91cc600c8f59e5ceab212cff01b4dd2dea0baa6cc56dd0cb3a9aaf9027c2ed7581ab84fe339d6bfaee8c630d5c1fec0cfb43619c6b76e698b0344b166d9729bd0cb0a1f1951a3279087b8b881748390dc97296db6f40053fd5ff10dd71cf9336fd14a2bf17737b39bc6944b6ce67f26cf6d1b640433fdb2d542b24b979b2691d20919419e6c0e3d9688ff49e0f7981033a4880e4d683a0704546227bb32ffdbe9fae9b2b52a453bcab07fc9dc8ca5fbe2df54960c8dde6a2b2f5a7a19a350b9dbd5b696928fbf9b5723a736110860d1dcdd14c6b0d8d85c5a72ea9dc45c8c17763444a4e4cb7d12c70ebea4ae11fde59cb79101f8920b895dbed9231ea06deffe15d75d4e20977b638c864634598ab617be3247069fe0f0fa1b7bc06b60da560fc856116a43fa86e7454502842d145b9a39196f4545ddee63c80f24da3b00d7a792bfc70c87798f2b098ecb4a58c4932d9f07ba3574c06c9cd3a03c51152812cac34e1c0c2311878e5a23c8a778da1c7f9e42ee16e2cfacc9cce24f311fa6f464d72de57ef1da5b736c8fa1fd370303e8632989c49d08dc685acb0352040ed07db062de1151d4be5128300d9f0562b969aabc609c20a6ee61be56344468347793fda161e0d938f60d62c9b5e87af42d18e008fb7515e7dac8c6352d929a6ce31f4aeab749e1466e2c2e81a6cb3e8814d23139960a9063487bbd39c7e7529c456b3d8e1ae4c6e4b23c3f1fed1383894a0fb8596917ef4721fb50c80e3a9eff3ac1f1b12a64e8b113975c400746b33ac46a61401ab914a8116bb4bc5fcaff9b4ef55518f598d8a96aa891cce8bb8588b051ddd4310d47d8e013cce9c79da1afadafe3afc0bfc3d1ab1ebf9390579ee7f6b3857a0a72e92fd52139533634d640323727ee2617fd927e85900db8113fe066a89ae0e49ced5b656ec82df68b7fc2e3cee28232db77b4996421134c87d5a4db67a71e29c211a5c20e4226072a8838c29aa3c6bdd7d3d432b505f9b31ac39f03d4af61b5a5de8c0e48cfbe51510f0cd6263231976773437e63b81026252aaa9097a749281f73e84ab29e563ce9bb1a721fbbf3eeb05fdc2df8fb7706549d5e8f14bfd39a98b3310fd186a93980643d551fc65efbe8c77aae55a286e9169b60dc17e6b872033d351b9671ea0453d2daa108af1634d626276f101a595a71c8e527f6865701979451f72981c4db99297576c6292b226194b33c7c9a132e211867b75be22ab65090b4cbc69a7fff0131e4f7cf1996d45e6d60071a763bd7535921ea6b4097237be5dc063684b4d7f322078"}, {0xc}, {0xc, 0x8, {0x2, 0x1}}}}, @m_skbedit={0x6c, 0xe, 0x0, 0x0, {{0xc}, {0x3c, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x7}, @TCA_SKBEDIT_QUEUE_MAPPING={0x6, 0x4, 0x6}, @TCA_SKBEDIT_QUEUE_MAPPING={0x6, 0x4, 0x80}, @TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x4}, @TCA_SKBEDIT_PARMS={0x18, 0x2, {0x80000001, 0x7, 0x3, 0x1, 0x3ff}}]}, {0x5, 0x6, "f6"}, {0xc}, {0xc, 0x8, {0x0, 0x2}}}}, @m_skbmod={0xcc, 0x11, 0x0, 0x0, {{0xb}, {0x18, 0x2, 0x0, 0x1, [@TCA_SKBMOD_ETYPE={0x6, 0x5, 0x4}, @TCA_SKBMOD_SMAC={0xa, 0x4, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2e}}]}, {0x8a, 0x6, "f1263753f2f823301a8b6ae9d44a84dcd104329b91d1c9f9f11b45c181691c6b24bf64f690f345ff8f68ecbcbc6c606d6ee98273f74462ffc155074a8037d706d7be25955dd996f3544f6805358c51119eeedb2d422975c7b8947030110a4b50359a6ac0528c036037cb8ca5d7f685fa3c036dbd04f03a9db4315f63e0d4f766ab328608ebbe"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x1}}}}, @m_xt={0x1e0, 0xd, 0x0, 0x0, {{0x7}, {0x14c, 0x2, 0x0, 0x1, [@TCA_IPT_TARG={0x2a, 0x6, {0x800, 'security\x00', 0x2, 0x6}}, @TCA_IPT_HOOK={0x8, 0x2, 0x1}, @TCA_IPT_TABLE={0x24, 0x1, 'raw\x00'}, @TCA_IPT_TABLE={0x24, 0x1, 'security\x00'}, @TCA_IPT_TARG={0xa0, 0x6, {0x81, 'security\x00', 0xd5, 0x4e, "8d610f560a167679e936036ce0b9d2300391f4a0f197c2814df82ff4c9c67834b8e2b7b0a7c471c51142dbee93dec6b10719f1fdcc42d4ade022ae5998cfcfefe7f340a761055aee6152137cfbc169ead9685ddc44e1c8a066cdf0699e2f2a882810ffaf3f871631a6686e63971a649a4fee8f7fd305"}}, @TCA_IPT_TABLE={0x24, 0x1, 'filter\x00'}, @TCA_IPT_INDEX={0x8, 0x3, 0x8}]}, {0x6f, 0x6, "bb8d5aaa22c77727f9fa7495c8af2e54298724b21d8e0b953183a8954965b010e4d3e4bbaa884834a33524a86c82a40ecf3205eae189289712b2543d272a66669db12237ffcc9c12a9bd491a98a9910e50c56f177ec16bf2357dcff5aca8fdc84e1b3b6b417447ce48996f"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}]}]}}, @TCA_CHAIN={0x8, 0xb, 0x5}, @TCA_RATE={0x6, 0x5, {0x81, 0x4}}]}, 0x1494}}, 0x4048090) (async, rerun: 32) ioctl$NS_GET_PARENT(r1, 0xb702, 0x0) (rerun: 32) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:28 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000004c0)=0x0) perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x4, 0x3c, 0x5, 0x2, 0x0, 0x2, 0x4, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0xfffffffffffffffc, 0x101}, 0x20, 0x6, 0xfffffff8, 0x8, 0x80000001, 0x6, 0x3, 0x0, 0x442, 0x0, 0x8}, r3, 0x2, r0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r5 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r5, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r5, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r5, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)={0x170, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_FEATURES_WANTED={0x15c, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0xfb, 0x5, "a87e088b9e308ca7a67ec9422f8f7a7f816fbd18991d29487d7d1e42307b7b188773e0c22709a7fdf19a1e24fdb59a4bd25507dea21e9538088fad927aace910d92d028f5d4cdc127193dd82d6b25653a7dd02ce26bc903769a1ced573121ecd811f317b68b5a397228951d096cc573b8df79c5369894364b805e8480a5c41f9697735eb54c07a5b14c2a85683412fe9c294e2396654fc0c91a05a386d493a622b37d16ee546f7d104db1f6ec6ffd9826d5ef308ae40ff5706b835c4c7db328597f61662180e07f94aad9d3ba954273302a43bab855e101d6004743d0281f53a12076fa63b708fbe77eeed9d2e8285f3826175f96ac12d"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x3f}, @ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "ba5ae23b3f15c8713196ddc7d04f1964838ca52805e702cc90b9f245bf1b3a23de3d09a7d94d466a7f0f"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x1f, 0x5, "a116b0e393e12a4b1495fe18594079f3ffb49123686d3797f8354b"}]}]}, 0x170}, 0x1, 0x0, 0x0, 0x20040895}, 0x4c040) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(r4, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) r6 = socket$unix(0x1, 0x2, 0x0) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(r7, 0x84, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0x8) fchdir(r7) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r9 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r9, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r9, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r8, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r6, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000580)={&(0x7f00000006c0)=@delchain={0x1494, 0x65, 0xdb79b1471357368, 0x70bd28, 0x25dfdbfb, {0x0, 0x0, 0x0, r8, {0xb, 0x10}, {0xb, 0xfff2}, {0xffff, 0xb}}, [@filter_kind_options=@f_fw={{0x7}, {0x1458, 0x2, [@TCA_FW_ACT={0x1454, 0x4, [@m_sample={0xf0, 0xc, 0x0, 0x0, {{0xb}, {0x2c, 0x2, 0x0, 0x1, [@TCA_SAMPLE_TRUNC_SIZE={0x8, 0x4, 0xffffffff}, @TCA_SAMPLE_PARMS={0x18, 0x2, {0x1, 0x583f, 0x6, 0x3, 0x8}}, @TCA_SAMPLE_TRUNC_SIZE={0x8, 0x4, 0x2}]}, {0x9a, 0x6, "52fffdac5d6bfff86ee5a319210a2c1fb280e5f6929a316f5a16d327777865f4219fcbe61476438b1af069801b5eb8d8bf1053573a44020e50903d89c38e3e4ef24506bd1e27ec42c7d787b1bcf86c03eca8c29973327f125d8c826c0e601bc2da4d103519be9f5d4466e1b562a849eb7de0974736a1b393eac0492ae404541bf61f572111b921a43f1adcbd51d7cb44657706fa486c"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x2}}}}, @m_ife={0x1048, 0x7, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0xbba, 0x9, 0x6, 0x8, 0x1000}}}]}, {0x1004, 0x6, "1518fc5978e1e63b44152f9e51a22858c77e56ce5ece1e7c4f98a0667375257a8bcdfc31ab29c9e793ea470f45130517bd0206e0861ee1a1f4c9fb055a8865b08f97fea44943974ed9bf2aad10ae87b5c202f29ee042cdaa7cb28aa0335133d4c56f24e5b3397edb5719debb10fd4290cae004663f0c4a29a97b46ca06ff78852f59a45750d2040cf3368d494036e4823e799fad7bef9098aef5d2914246a28c69a0c69214251898e51595edea4e43eae38400939ed78d7515787077d04fc6b9a78af59d1df605ca25386d5447fddf39e941cdbc70bc7f66eb66e7298b6b4b2b0d9b20df8581e406a684b1d4331468081c71203a3ce3c1ff454c163b50428dc091e6f6a8b9ffd626db81eee784215edf403f86db3482fee115794c2abfc8eb04011d0d06b3a4d016020b4fab6b8f48d65a982db3856d144c5a6032369b41f14acdbba9b503bf477455d9661dff6a8af1376f71a7d7194ed296af6e7e29bf252315fc70124c19fa9d40131cf45a960a2377977dc345498c7ed903774abb086c2734e4010f935fbfcb0e9f0ee1fc755a8f5857d11cbd45f3a3d8d94b048ccc50d5ecbf94fd6653afa0eb062f1694519633c9f36354d162175d9fa334bdd92c151b729540f800a1c43537aeeca3f6e3ad523b139855b9e0d153db5b512cf4a542451a9fa475065b3a60fe329c89dd1e550b7537802533a177045dc7956bf5d75483e4d9c3f705814839053f948365ede4ce5f311ab0a75d79381b96f1ecdb40cbaa70d8c0489134e08f26123cdedaec5478ea62d3c4bb8f4eb5eaeb5b5e824404b1eb9402a6a30ff3296406ed3875df6b71eb4a25dc6355ef647898678bd853029f0934c8ea89be5592e7c64ec0215217eda16bcacfe16a964935e1798f6a7f1096f174c828ed0e301f682112bc5dc020292a3ac4872e7400b4940aa4696a6126e92657fc1a5f5493cc6203875bb2148113d8de5e754033fe2b5276a76368c8265ca2eed9178e503e6f777e5f44ba1bbde0fb77fc7f054aca6db17e79f2a26f68dcacdf6be927bdedc48a68a49162d92780beba4c1f6597f4e955d1c4dfcf7faabfac3bca954a4c3a5d19f2b480b938c23807e46d61cf93f65eb175b765d22ca68b5954ce38a6ad279f7089eb38e9bb7ab4ec3d953005119bcbf60e3bc74a251861140a415846a095f5399bbf8e72ea4c20220ccf3e89650e39757a413e7b03a0fc57e1f2dedc397ccae5677febac373243de900ffd6c889f6a0c33f00d880c56190aaf727e73b1819855858de41fb2566a2e1e274d96025a8b809b57aefd4f0bede5d3efc84675e9568dfa28a4d3f4525d5898ffd433ad262a7cd181b11ad837960f48f1aa8f3ad13e3e6f6b01fa73eb9df320b21e601ace1772eec81a4d2643f1c5fd868fdec415d90dbf607668fcfec0347dfc282f1a61c59ed56c305db3af143f53b7b2721437e0ef85e7593065b374b310909cf762aad9004db08dadcf5434cd48dd6d0294c82d0c9d18ae48807ee29ff2aa8818780002fac2b5dfde2b00955490b39b8c407199fe929719e6a0318d99942f75f9bda5f2bccf06b566c76d31fae503d4bfd29e14780afda62b60d2ff2d72919a3c56729761d7535b2c78e1a31b9ed8a0314c17c57c4912cbf9dc84417cdd742e0dc2666b84b0e30f29246342ff31c4ca5d8a2bbe926ed4cd8d69c0f7370bb0531e36d962eef48500f7d6935c912182889288400ef1ca91a20332c5d902da18d21525840620b8ffd5810b09dc12bc499f2c913a373885ab25db6d506d2c8985b403df79a9e3b128cad78ee5241830975b7dc2e7c4c926301f45dfc787f39dc9f8e670408a5696e9502157c255628c271eec35d1215860926aa96bb04fabcac7e2b8cd0279ac8690bb1db05c2bc20adbd245053d8b6b9e5418b906acbf4fa0af18338029c76ac3716698915fdec863297ac1331abee57050c0ee28ff75166746d368b5304f8a3070d0d2d2eb2b53fcab384763f5e2204c103d16a62dcde1b0cfdeb1cd180dd4b8115cf1113e994cbe36bacea2b7a007443e56f97645864ece704e2f6cc3a139d3ac4fd12e6518d92ae98c8d9a00bfc96ddf32372a1972eca11eef1031f34c41e1d71aaf5a4bd08874598b8496bed98cad9c1f88d77638fa390adfa2861dbbd29034a975e75b36401c51cc29ed3506a40b55fcbe2aec3ebd1704cb09a4ed64954bd74bf77c75d7cfe4485833b8af7ffac197e3c30cf5b67614aa8839bb4d4310207ae091ec5d754d3159a6a7cda70f390cfcf9b71c7191a9be330aeda7cbdc60d8cfb2cc681aec120753222d6b60184c521ca2cc4c0512ee58ff21dc6b0d1b0c95fefe8f425dcdbdf3d5496730e33deda3deb85051b48b1dfe84c3b14866f0a4d62bee68173b815e954c5b1e236616a06bd1f7fc239ed72d7c333077739573700df9a51d67a73f6c52a33020ce803cac377ad8afa32d938a6bc425e2ff3161961dc90caa19ce3511c541503b28f76f9654add1f6349bc8adfda2664deb0242896fbdc643eb197569bf046769cd45af29a65dc21236de9341f0707002034f24fa2a0c4dd352867e5f3fa0965449b2de2e27eeda7dbd5678b1e7b75d7eb7becf37f99619eecde90772bfb4d61973f285c9bb46564ee25a89ffd2e55d8620778ac062d7d4879c418ac1411ab1cdd46b950291f8149193ef0d89dcff3a926df5b7ae35a33df98fa1689e1577ec57ad8d657b9f00a8693f92089785d68d1769aa8fc47e5efc69ad7d7795f9d0cac9eed3d28ff8eee5f515d68b210dae7fdc48ead1d912d26a885c01673b57f6f56492327ae4c0cde7cd1cdcbda7b3250be5511d0a6c1c084caa9bcf819035a40c89d8e252ada75adfb2d8e7afe5e0a4f31d5436cb27a7b09ee335cde786e4b77109058b0986c8c5b73c89726744da0d34d32d6f7f82d5f62ef0784eb7bd2a7dfd0a02c31992da5d4377ecc4731f7d2eb0c84796f4c006419d34c98ddfec0a733bf33c914b7dd4181ef06505e4407c9f565d372fc515fe64bb3daa189aa6519e0f4abb261c96165e95fe74dbfea1c60d2355bb3800e0dadcf091076abff2d13432f241edf0784619674aee45187c499db0a7a4f19d86f6809195c6b5df3af12b7d5bbe78e49cc0771518db3e2635c904bd7195cb34ab5eaabb4d0f01e9927530dbea3d603724f5b49fb68e6fefc03a79d26072ad3f10e3be5d2a2aea9ab17cfc8d3cc98f0bad4bd4589e5e26ed7f15f95554f0c88628d995c3f6ee594544313cc316846ad637f89eadc1820cfb63b9142fe59e78fb16806de31fe4c9debae80a2e0254691bb6fdada6d21d0bd922825060fd3b645a365be6085d4622d63861ce6ad9bfb72c486dd738d1d0923adc8f71c127f57f1bbb3b9a5c0a0ada6fa345e40924a3e6586b73c077f11c3d598b16c1a0139ae02146a26331e884f23a3e415c616d089a6728ceb55aade77f1ca7a92eb2eab11124e90f60083433f6b7d73120b7249a29bb58cc4cce73ef50b4b1204eb19ed34939467394feb2596500674f7ad292dd2acdc5a3733c4f3c1d8bc592b0c249e0f40f6dc733ae2e58f60e043827d080eed729de108b289dbc33811f870a14f7e75953890b473e061bd5bce64fdfc34428c3577f17be8ad8cd797b53f3b1180b005544e909632709c2e947525aaf78c117195dbce4673bfffba17091dff3ef80205ed637bf495842a19e9c0fc68eda38df8e1201903a99e044f507b6dc54ebbe0f8adfd4f90cba6d9fb7181e93017bc6b3fe05e380f2d6e57c721f49b179b8369322692e62a2b1ef40d3fb840814cba3d6b372fca3e6db1eacf712b86df225a903fd5a6d696ce9243ac66c271ae522ee7bfd8ef8022e516d3917373476887dee535f3fb9bd8789798c8af605502f996dc5efdf4fa40992738d5706c77472d08ecbde0aa8a2930443bafc105cfac4a30436d06d56862e7d9d73707357a2e8ce74718b5e1f5fa221ee529b6d734a0565d270cbf61300215f1945410b86eb0d51580f5c6fb629d30c9ad9b70cf083ce9b556b387a3a9ea819b578b1aa82cb2d10ea6f5629407b429265e99553ed8e6d30b90f2b0c210c17e8b7698e1eb1091ce3cb0166b6ec9753318739893a39f39f6b6f29e6c2d773a6cd3d7a9a1bd233c2e61a3fae1586516311baaf5b2c0753e07c0ca0aed966dc0974cffb19f67dd56811070830e9cde2ab43214082307486d7cbe4613046c844a23dbab674a3fc98db0c186e97b8c9935e395b48a9bb7c1980ad21d5accbb27a3479a5b6e5150cc6f042334de73582b3d6f11766c8954823d6e0d9283206d95dfd41ecc3d6a3b98bacaf55155aba7cb68f63b1932b47a4775a0d689e2de42a6b2e15103f064d8dc2fca4381ba91169a8ffd3b87f46a95a01bea02f82dd221329652249b8657d9ea146187b4a7aa5416d4cd671ac87b6e2aa9cadfec2983539cca3df4e996bb4dbf7a264171363b517684a1e038d25756e91cc600c8f59e5ceab212cff01b4dd2dea0baa6cc56dd0cb3a9aaf9027c2ed7581ab84fe339d6bfaee8c630d5c1fec0cfb43619c6b76e698b0344b166d9729bd0cb0a1f1951a3279087b8b881748390dc97296db6f40053fd5ff10dd71cf9336fd14a2bf17737b39bc6944b6ce67f26cf6d1b640433fdb2d542b24b979b2691d20919419e6c0e3d9688ff49e0f7981033a4880e4d683a0704546227bb32ffdbe9fae9b2b52a453bcab07fc9dc8ca5fbe2df54960c8dde6a2b2f5a7a19a350b9dbd5b696928fbf9b5723a736110860d1dcdd14c6b0d8d85c5a72ea9dc45c8c17763444a4e4cb7d12c70ebea4ae11fde59cb79101f8920b895dbed9231ea06deffe15d75d4e20977b638c864634598ab617be3247069fe0f0fa1b7bc06b60da560fc856116a43fa86e7454502842d145b9a39196f4545ddee63c80f24da3b00d7a792bfc70c87798f2b098ecb4a58c4932d9f07ba3574c06c9cd3a03c51152812cac34e1c0c2311878e5a23c8a778da1c7f9e42ee16e2cfacc9cce24f311fa6f464d72de57ef1da5b736c8fa1fd370303e8632989c49d08dc685acb0352040ed07db062de1151d4be5128300d9f0562b969aabc609c20a6ee61be56344468347793fda161e0d938f60d62c9b5e87af42d18e008fb7515e7dac8c6352d929a6ce31f4aeab749e1466e2c2e81a6cb3e8814d23139960a9063487bbd39c7e7529c456b3d8e1ae4c6e4b23c3f1fed1383894a0fb8596917ef4721fb50c80e3a9eff3ac1f1b12a64e8b113975c400746b33ac46a61401ab914a8116bb4bc5fcaff9b4ef55518f598d8a96aa891cce8bb8588b051ddd4310d47d8e013cce9c79da1afadafe3afc0bfc3d1ab1ebf9390579ee7f6b3857a0a72e92fd52139533634d640323727ee2617fd927e85900db8113fe066a89ae0e49ced5b656ec82df68b7fc2e3cee28232db77b4996421134c87d5a4db67a71e29c211a5c20e4226072a8838c29aa3c6bdd7d3d432b505f9b31ac39f03d4af61b5a5de8c0e48cfbe51510f0cd6263231976773437e63b81026252aaa9097a749281f73e84ab29e563ce9bb1a721fbbf3eeb05fdc2df8fb7706549d5e8f14bfd39a98b3310fd186a93980643d551fc65efbe8c77aae55a286e9169b60dc17e6b872033d351b9671ea0453d2daa108af1634d626276f101a595a71c8e527f6865701979451f72981c4db99297576c6292b226194b33c7c9a132e211867b75be22ab65090b4cbc69a7fff0131e4f7cf1996d45e6d60071a763bd7535921ea6b4097237be5dc063684b4d7f322078"}, {0xc}, {0xc, 0x8, {0x2, 0x1}}}}, @m_skbedit={0x6c, 0xe, 0x0, 0x0, {{0xc}, {0x3c, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x7}, @TCA_SKBEDIT_QUEUE_MAPPING={0x6, 0x4, 0x6}, @TCA_SKBEDIT_QUEUE_MAPPING={0x6, 0x4, 0x80}, @TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x4}, @TCA_SKBEDIT_PARMS={0x18, 0x2, {0x80000001, 0x7, 0x3, 0x1, 0x3ff}}]}, {0x5, 0x6, "f6"}, {0xc}, {0xc, 0x8, {0x0, 0x2}}}}, @m_skbmod={0xcc, 0x11, 0x0, 0x0, {{0xb}, {0x18, 0x2, 0x0, 0x1, [@TCA_SKBMOD_ETYPE={0x6, 0x5, 0x4}, @TCA_SKBMOD_SMAC={0xa, 0x4, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2e}}]}, {0x8a, 0x6, "f1263753f2f823301a8b6ae9d44a84dcd104329b91d1c9f9f11b45c181691c6b24bf64f690f345ff8f68ecbcbc6c606d6ee98273f74462ffc155074a8037d706d7be25955dd996f3544f6805358c51119eeedb2d422975c7b8947030110a4b50359a6ac0528c036037cb8ca5d7f685fa3c036dbd04f03a9db4315f63e0d4f766ab328608ebbe"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x1}}}}, @m_xt={0x1e0, 0xd, 0x0, 0x0, {{0x7}, {0x14c, 0x2, 0x0, 0x1, [@TCA_IPT_TARG={0x2a, 0x6, {0x800, 'security\x00', 0x2, 0x6}}, @TCA_IPT_HOOK={0x8, 0x2, 0x1}, @TCA_IPT_TABLE={0x24, 0x1, 'raw\x00'}, @TCA_IPT_TABLE={0x24, 0x1, 'security\x00'}, @TCA_IPT_TARG={0xa0, 0x6, {0x81, 'security\x00', 0xd5, 0x4e, "8d610f560a167679e936036ce0b9d2300391f4a0f197c2814df82ff4c9c67834b8e2b7b0a7c471c51142dbee93dec6b10719f1fdcc42d4ade022ae5998cfcfefe7f340a761055aee6152137cfbc169ead9685ddc44e1c8a066cdf0699e2f2a882810ffaf3f871631a6686e63971a649a4fee8f7fd305"}}, @TCA_IPT_TABLE={0x24, 0x1, 'filter\x00'}, @TCA_IPT_INDEX={0x8, 0x3, 0x8}]}, {0x6f, 0x6, "bb8d5aaa22c77727f9fa7495c8af2e54298724b21d8e0b953183a8954965b010e4d3e4bbaa884834a33524a86c82a40ecf3205eae189289712b2543d272a66669db12237ffcc9c12a9bd491a98a9910e50c56f177ec16bf2357dcff5aca8fdc84e1b3b6b417447ce48996f"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}]}]}}, @TCA_CHAIN={0x8, 0xb, 0x5}, @TCA_RATE={0x6, 0x5, {0x81, 0x4}}]}, 0x1494}}, 0x4048090) ioctl$NS_GET_PARENT(r1, 0xb702, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:28 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) pipe(&(0x7f0000000180)) r1 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000080)={0x18, 0x0, {0x3, @broadcast, 'wlan1\x00'}}) sendmsg$NFT_BATCH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:30 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000004c0)=0x0) perf_event_open(&(0x7f0000000440)={0x3, 0x80, 0x4, 0x3c, 0x5, 0x2, 0x0, 0x2, 0x4, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0xfffffffffffffffc, 0x101}, 0x20, 0x6, 0xfffffff8, 0x8, 0x80000001, 0x6, 0x3, 0x0, 0x442, 0x0, 0x8}, r3, 0x2, r0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r5 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r5, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r5, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r5, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)={0x170, 0x0, 0x1, 0x70bd2d, 0x25dfdbfd, {}, [@ETHTOOL_A_FEATURES_WANTED={0x15c, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0xfb, 0x5, "a87e088b9e308ca7a67ec9422f8f7a7f816fbd18991d29487d7d1e42307b7b188773e0c22709a7fdf19a1e24fdb59a4bd25507dea21e9538088fad927aace910d92d028f5d4cdc127193dd82d6b25653a7dd02ce26bc903769a1ced573121ecd811f317b68b5a397228951d096cc573b8df79c5369894364b805e8480a5c41f9697735eb54c07a5b14c2a85683412fe9c294e2396654fc0c91a05a386d493a622b37d16ee546f7d104db1f6ec6ffd9826d5ef308ae40ff5706b835c4c7db328597f61662180e07f94aad9d3ba954273302a43bab855e101d6004743d0281f53a12076fa63b708fbe77eeed9d2e8285f3826175f96ac12d"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x3f}, @ETHTOOL_A_BITSET_MASK={0x2e, 0x5, "ba5ae23b3f15c8713196ddc7d04f1964838ca52805e702cc90b9f245bf1b3a23de3d09a7d94d466a7f0f"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x1f, 0x5, "a116b0e393e12a4b1495fe18594079f3ffb49123686d3797f8354b"}]}]}, 0x170}, 0x1, 0x0, 0x0, 0x20040895}, 0x4c040) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(r4, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) r6 = socket$unix(0x1, 0x2, 0x0) r7 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(r7, 0x84, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0x8) fchdir(r7) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r9 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r9, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r9, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r8, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r6, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000580)={&(0x7f00000006c0)=@delchain={0x1494, 0x65, 0xdb79b1471357368, 0x70bd28, 0x25dfdbfb, {0x0, 0x0, 0x0, r8, {0xb, 0x10}, {0xb, 0xfff2}, {0xffff, 0xb}}, [@filter_kind_options=@f_fw={{0x7}, {0x1458, 0x2, [@TCA_FW_ACT={0x1454, 0x4, [@m_sample={0xf0, 0xc, 0x0, 0x0, {{0xb}, {0x2c, 0x2, 0x0, 0x1, [@TCA_SAMPLE_TRUNC_SIZE={0x8, 0x4, 0xffffffff}, @TCA_SAMPLE_PARMS={0x18, 0x2, {0x1, 0x583f, 0x6, 0x3, 0x8}}, @TCA_SAMPLE_TRUNC_SIZE={0x8, 0x4, 0x2}]}, {0x9a, 0x6, "52fffdac5d6bfff86ee5a319210a2c1fb280e5f6929a316f5a16d327777865f4219fcbe61476438b1af069801b5eb8d8bf1053573a44020e50903d89c38e3e4ef24506bd1e27ec42c7d787b1bcf86c03eca8c29973327f125d8c826c0e601bc2da4d103519be9f5d4466e1b562a849eb7de0974736a1b393eac0492ae404541bf61f572111b921a43f1adcbd51d7cb44657706fa486c"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x2}}}}, @m_ife={0x1048, 0x7, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0xbba, 0x9, 0x6, 0x8, 0x1000}}}]}, {0x1004, 0x6, "1518fc5978e1e63b44152f9e51a22858c77e56ce5ece1e7c4f98a0667375257a8bcdfc31ab29c9e793ea470f45130517bd0206e0861ee1a1f4c9fb055a8865b08f97fea44943974ed9bf2aad10ae87b5c202f29ee042cdaa7cb28aa0335133d4c56f24e5b3397edb5719debb10fd4290cae004663f0c4a29a97b46ca06ff78852f59a45750d2040cf3368d494036e4823e799fad7bef9098aef5d2914246a28c69a0c69214251898e51595edea4e43eae38400939ed78d7515787077d04fc6b9a78af59d1df605ca25386d5447fddf39e941cdbc70bc7f66eb66e7298b6b4b2b0d9b20df8581e406a684b1d4331468081c71203a3ce3c1ff454c163b50428dc091e6f6a8b9ffd626db81eee784215edf403f86db3482fee115794c2abfc8eb04011d0d06b3a4d016020b4fab6b8f48d65a982db3856d144c5a6032369b41f14acdbba9b503bf477455d9661dff6a8af1376f71a7d7194ed296af6e7e29bf252315fc70124c19fa9d40131cf45a960a2377977dc345498c7ed903774abb086c2734e4010f935fbfcb0e9f0ee1fc755a8f5857d11cbd45f3a3d8d94b048ccc50d5ecbf94fd6653afa0eb062f1694519633c9f36354d162175d9fa334bdd92c151b729540f800a1c43537aeeca3f6e3ad523b139855b9e0d153db5b512cf4a542451a9fa475065b3a60fe329c89dd1e550b7537802533a177045dc7956bf5d75483e4d9c3f705814839053f948365ede4ce5f311ab0a75d79381b96f1ecdb40cbaa70d8c0489134e08f26123cdedaec5478ea62d3c4bb8f4eb5eaeb5b5e824404b1eb9402a6a30ff3296406ed3875df6b71eb4a25dc6355ef647898678bd853029f0934c8ea89be5592e7c64ec0215217eda16bcacfe16a964935e1798f6a7f1096f174c828ed0e301f682112bc5dc020292a3ac4872e7400b4940aa4696a6126e92657fc1a5f5493cc6203875bb2148113d8de5e754033fe2b5276a76368c8265ca2eed9178e503e6f777e5f44ba1bbde0fb77fc7f054aca6db17e79f2a26f68dcacdf6be927bdedc48a68a49162d92780beba4c1f6597f4e955d1c4dfcf7faabfac3bca954a4c3a5d19f2b480b938c23807e46d61cf93f65eb175b765d22ca68b5954ce38a6ad279f7089eb38e9bb7ab4ec3d953005119bcbf60e3bc74a251861140a415846a095f5399bbf8e72ea4c20220ccf3e89650e39757a413e7b03a0fc57e1f2dedc397ccae5677febac373243de900ffd6c889f6a0c33f00d880c56190aaf727e73b1819855858de41fb2566a2e1e274d96025a8b809b57aefd4f0bede5d3efc84675e9568dfa28a4d3f4525d5898ffd433ad262a7cd181b11ad837960f48f1aa8f3ad13e3e6f6b01fa73eb9df320b21e601ace1772eec81a4d2643f1c5fd868fdec415d90dbf607668fcfec0347dfc282f1a61c59ed56c305db3af143f53b7b2721437e0ef85e7593065b374b310909cf762aad9004db08dadcf5434cd48dd6d0294c82d0c9d18ae48807ee29ff2aa8818780002fac2b5dfde2b00955490b39b8c407199fe929719e6a0318d99942f75f9bda5f2bccf06b566c76d31fae503d4bfd29e14780afda62b60d2ff2d72919a3c56729761d7535b2c78e1a31b9ed8a0314c17c57c4912cbf9dc84417cdd742e0dc2666b84b0e30f29246342ff31c4ca5d8a2bbe926ed4cd8d69c0f7370bb0531e36d962eef48500f7d6935c912182889288400ef1ca91a20332c5d902da18d21525840620b8ffd5810b09dc12bc499f2c913a373885ab25db6d506d2c8985b403df79a9e3b128cad78ee5241830975b7dc2e7c4c926301f45dfc787f39dc9f8e670408a5696e9502157c255628c271eec35d1215860926aa96bb04fabcac7e2b8cd0279ac8690bb1db05c2bc20adbd245053d8b6b9e5418b906acbf4fa0af18338029c76ac3716698915fdec863297ac1331abee57050c0ee28ff75166746d368b5304f8a3070d0d2d2eb2b53fcab384763f5e2204c103d16a62dcde1b0cfdeb1cd180dd4b8115cf1113e994cbe36bacea2b7a007443e56f97645864ece704e2f6cc3a139d3ac4fd12e6518d92ae98c8d9a00bfc96ddf32372a1972eca11eef1031f34c41e1d71aaf5a4bd08874598b8496bed98cad9c1f88d77638fa390adfa2861dbbd29034a975e75b36401c51cc29ed3506a40b55fcbe2aec3ebd1704cb09a4ed64954bd74bf77c75d7cfe4485833b8af7ffac197e3c30cf5b67614aa8839bb4d4310207ae091ec5d754d3159a6a7cda70f390cfcf9b71c7191a9be330aeda7cbdc60d8cfb2cc681aec120753222d6b60184c521ca2cc4c0512ee58ff21dc6b0d1b0c95fefe8f425dcdbdf3d5496730e33deda3deb85051b48b1dfe84c3b14866f0a4d62bee68173b815e954c5b1e236616a06bd1f7fc239ed72d7c333077739573700df9a51d67a73f6c52a33020ce803cac377ad8afa32d938a6bc425e2ff3161961dc90caa19ce3511c541503b28f76f9654add1f6349bc8adfda2664deb0242896fbdc643eb197569bf046769cd45af29a65dc21236de9341f0707002034f24fa2a0c4dd352867e5f3fa0965449b2de2e27eeda7dbd5678b1e7b75d7eb7becf37f99619eecde90772bfb4d61973f285c9bb46564ee25a89ffd2e55d8620778ac062d7d4879c418ac1411ab1cdd46b950291f8149193ef0d89dcff3a926df5b7ae35a33df98fa1689e1577ec57ad8d657b9f00a8693f92089785d68d1769aa8fc47e5efc69ad7d7795f9d0cac9eed3d28ff8eee5f515d68b210dae7fdc48ead1d912d26a885c01673b57f6f56492327ae4c0cde7cd1cdcbda7b3250be5511d0a6c1c084caa9bcf819035a40c89d8e252ada75adfb2d8e7afe5e0a4f31d5436cb27a7b09ee335cde786e4b77109058b0986c8c5b73c89726744da0d34d32d6f7f82d5f62ef0784eb7bd2a7dfd0a02c31992da5d4377ecc4731f7d2eb0c84796f4c006419d34c98ddfec0a733bf33c914b7dd4181ef06505e4407c9f565d372fc515fe64bb3daa189aa6519e0f4abb261c96165e95fe74dbfea1c60d2355bb3800e0dadcf091076abff2d13432f241edf0784619674aee45187c499db0a7a4f19d86f6809195c6b5df3af12b7d5bbe78e49cc0771518db3e2635c904bd7195cb34ab5eaabb4d0f01e9927530dbea3d603724f5b49fb68e6fefc03a79d26072ad3f10e3be5d2a2aea9ab17cfc8d3cc98f0bad4bd4589e5e26ed7f15f95554f0c88628d995c3f6ee594544313cc316846ad637f89eadc1820cfb63b9142fe59e78fb16806de31fe4c9debae80a2e0254691bb6fdada6d21d0bd922825060fd3b645a365be6085d4622d63861ce6ad9bfb72c486dd738d1d0923adc8f71c127f57f1bbb3b9a5c0a0ada6fa345e40924a3e6586b73c077f11c3d598b16c1a0139ae02146a26331e884f23a3e415c616d089a6728ceb55aade77f1ca7a92eb2eab11124e90f60083433f6b7d73120b7249a29bb58cc4cce73ef50b4b1204eb19ed34939467394feb2596500674f7ad292dd2acdc5a3733c4f3c1d8bc592b0c249e0f40f6dc733ae2e58f60e043827d080eed729de108b289dbc33811f870a14f7e75953890b473e061bd5bce64fdfc34428c3577f17be8ad8cd797b53f3b1180b005544e909632709c2e947525aaf78c117195dbce4673bfffba17091dff3ef80205ed637bf495842a19e9c0fc68eda38df8e1201903a99e044f507b6dc54ebbe0f8adfd4f90cba6d9fb7181e93017bc6b3fe05e380f2d6e57c721f49b179b8369322692e62a2b1ef40d3fb840814cba3d6b372fca3e6db1eacf712b86df225a903fd5a6d696ce9243ac66c271ae522ee7bfd8ef8022e516d3917373476887dee535f3fb9bd8789798c8af605502f996dc5efdf4fa40992738d5706c77472d08ecbde0aa8a2930443bafc105cfac4a30436d06d56862e7d9d73707357a2e8ce74718b5e1f5fa221ee529b6d734a0565d270cbf61300215f1945410b86eb0d51580f5c6fb629d30c9ad9b70cf083ce9b556b387a3a9ea819b578b1aa82cb2d10ea6f5629407b429265e99553ed8e6d30b90f2b0c210c17e8b7698e1eb1091ce3cb0166b6ec9753318739893a39f39f6b6f29e6c2d773a6cd3d7a9a1bd233c2e61a3fae1586516311baaf5b2c0753e07c0ca0aed966dc0974cffb19f67dd56811070830e9cde2ab43214082307486d7cbe4613046c844a23dbab674a3fc98db0c186e97b8c9935e395b48a9bb7c1980ad21d5accbb27a3479a5b6e5150cc6f042334de73582b3d6f11766c8954823d6e0d9283206d95dfd41ecc3d6a3b98bacaf55155aba7cb68f63b1932b47a4775a0d689e2de42a6b2e15103f064d8dc2fca4381ba91169a8ffd3b87f46a95a01bea02f82dd221329652249b8657d9ea146187b4a7aa5416d4cd671ac87b6e2aa9cadfec2983539cca3df4e996bb4dbf7a264171363b517684a1e038d25756e91cc600c8f59e5ceab212cff01b4dd2dea0baa6cc56dd0cb3a9aaf9027c2ed7581ab84fe339d6bfaee8c630d5c1fec0cfb43619c6b76e698b0344b166d9729bd0cb0a1f1951a3279087b8b881748390dc97296db6f40053fd5ff10dd71cf9336fd14a2bf17737b39bc6944b6ce67f26cf6d1b640433fdb2d542b24b979b2691d20919419e6c0e3d9688ff49e0f7981033a4880e4d683a0704546227bb32ffdbe9fae9b2b52a453bcab07fc9dc8ca5fbe2df54960c8dde6a2b2f5a7a19a350b9dbd5b696928fbf9b5723a736110860d1dcdd14c6b0d8d85c5a72ea9dc45c8c17763444a4e4cb7d12c70ebea4ae11fde59cb79101f8920b895dbed9231ea06deffe15d75d4e20977b638c864634598ab617be3247069fe0f0fa1b7bc06b60da560fc856116a43fa86e7454502842d145b9a39196f4545ddee63c80f24da3b00d7a792bfc70c87798f2b098ecb4a58c4932d9f07ba3574c06c9cd3a03c51152812cac34e1c0c2311878e5a23c8a778da1c7f9e42ee16e2cfacc9cce24f311fa6f464d72de57ef1da5b736c8fa1fd370303e8632989c49d08dc685acb0352040ed07db062de1151d4be5128300d9f0562b969aabc609c20a6ee61be56344468347793fda161e0d938f60d62c9b5e87af42d18e008fb7515e7dac8c6352d929a6ce31f4aeab749e1466e2c2e81a6cb3e8814d23139960a9063487bbd39c7e7529c456b3d8e1ae4c6e4b23c3f1fed1383894a0fb8596917ef4721fb50c80e3a9eff3ac1f1b12a64e8b113975c400746b33ac46a61401ab914a8116bb4bc5fcaff9b4ef55518f598d8a96aa891cce8bb8588b051ddd4310d47d8e013cce9c79da1afadafe3afc0bfc3d1ab1ebf9390579ee7f6b3857a0a72e92fd52139533634d640323727ee2617fd927e85900db8113fe066a89ae0e49ced5b656ec82df68b7fc2e3cee28232db77b4996421134c87d5a4db67a71e29c211a5c20e4226072a8838c29aa3c6bdd7d3d432b505f9b31ac39f03d4af61b5a5de8c0e48cfbe51510f0cd6263231976773437e63b81026252aaa9097a749281f73e84ab29e563ce9bb1a721fbbf3eeb05fdc2df8fb7706549d5e8f14bfd39a98b3310fd186a93980643d551fc65efbe8c77aae55a286e9169b60dc17e6b872033d351b9671ea0453d2daa108af1634d626276f101a595a71c8e527f6865701979451f72981c4db99297576c6292b226194b33c7c9a132e211867b75be22ab65090b4cbc69a7fff0131e4f7cf1996d45e6d60071a763bd7535921ea6b4097237be5dc063684b4d7f322078"}, {0xc}, {0xc, 0x8, {0x2, 0x1}}}}, @m_skbedit={0x6c, 0xe, 0x0, 0x0, {{0xc}, {0x3c, 0x2, 0x0, 0x1, [@TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x7}, @TCA_SKBEDIT_QUEUE_MAPPING={0x6, 0x4, 0x6}, @TCA_SKBEDIT_QUEUE_MAPPING={0x6, 0x4, 0x80}, @TCA_SKBEDIT_PTYPE={0x6, 0x7, 0x4}, @TCA_SKBEDIT_PARMS={0x18, 0x2, {0x80000001, 0x7, 0x3, 0x1, 0x3ff}}]}, {0x5, 0x6, "f6"}, {0xc}, {0xc, 0x8, {0x0, 0x2}}}}, @m_skbmod={0xcc, 0x11, 0x0, 0x0, {{0xb}, {0x18, 0x2, 0x0, 0x1, [@TCA_SKBMOD_ETYPE={0x6, 0x5, 0x4}, @TCA_SKBMOD_SMAC={0xa, 0x4, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2e}}]}, {0x8a, 0x6, "f1263753f2f823301a8b6ae9d44a84dcd104329b91d1c9f9f11b45c181691c6b24bf64f690f345ff8f68ecbcbc6c606d6ee98273f74462ffc155074a8037d706d7be25955dd996f3544f6805358c51119eeedb2d422975c7b8947030110a4b50359a6ac0528c036037cb8ca5d7f685fa3c036dbd04f03a9db4315f63e0d4f766ab328608ebbe"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x1}}}}, @m_xt={0x1e0, 0xd, 0x0, 0x0, {{0x7}, {0x14c, 0x2, 0x0, 0x1, [@TCA_IPT_TARG={0x2a, 0x6, {0x800, 'security\x00', 0x2, 0x6}}, @TCA_IPT_HOOK={0x8, 0x2, 0x1}, @TCA_IPT_TABLE={0x24, 0x1, 'raw\x00'}, @TCA_IPT_TABLE={0x24, 0x1, 'security\x00'}, @TCA_IPT_TARG={0xa0, 0x6, {0x81, 'security\x00', 0xd5, 0x4e, "8d610f560a167679e936036ce0b9d2300391f4a0f197c2814df82ff4c9c67834b8e2b7b0a7c471c51142dbee93dec6b10719f1fdcc42d4ade022ae5998cfcfefe7f340a761055aee6152137cfbc169ead9685ddc44e1c8a066cdf0699e2f2a882810ffaf3f871631a6686e63971a649a4fee8f7fd305"}}, @TCA_IPT_TABLE={0x24, 0x1, 'filter\x00'}, @TCA_IPT_INDEX={0x8, 0x3, 0x8}]}, {0x6f, 0x6, "bb8d5aaa22c77727f9fa7495c8af2e54298724b21d8e0b953183a8954965b010e4d3e4bbaa884834a33524a86c82a40ecf3205eae189289712b2543d272a66669db12237ffcc9c12a9bd491a98a9910e50c56f177ec16bf2357dcff5aca8fdc84e1b3b6b417447ce48996f"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}]}]}}, @TCA_CHAIN={0x8, 0xb, 0x5}, @TCA_RATE={0x6, 0x5, {0x81, 0x4}}]}, 0x1494}}, 0x4048090) ioctl$NS_GET_PARENT(r1, 0xb702, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(r1, 0x0, 0x0) sendmsg$NL80211_CMD_SET_WIPHY(r1, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x1c, 0x0, 0x8, 0x70bd2b, 0x25dfdbfd, {}, [@NL80211_ATTR_WIPHY_TX_POWER_LEVEL={0x8, 0x62, 0x10001}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24048004}, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e, 0xb642}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000100001000000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 01:53:30 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d307830303030303030303030303034bd32312c667363616368652c63616368653d667363616368652c63d8406779f442529ae0616368657461673d736d6170735f726f6c6c7570002c70726976706f72742c76657273696f6e3d3970323030302c7665a8ccc56d909bcad5323030302c667363616368652c706f73215fc2fcb9697861636c2c6673757569643d64373338646238642d633835752d343730352d9a3635352d33000034346366302c726f6f74636f6e746578743d756e636f6e66696e65645f752c726f6f74636f6e746578743d726f6f742c6f626a5f726f6c653d2f70726f632f6d656d696e666f002c636f6e7465fb0978743d73797374656d5f752c726f6f74636f6e746578743d73797361646d5f752c6673757569643d62663431383438382d653639392d613332322d343566392d6530320f633430612c6673757569643d65313461646630622d396528392d666363002d376661312d6131335738306566def6c0eb6d553caf084ea76dcaae4391297b0b2bd83d5bcd62598ed46baee3ee58ef68c2687e5bc132274a178f051ad5f76fe8e52ec44951754b3f6525b15b02bdf665c998bdf0d6082aa724551e6add0b70b12b43495e14c4269c7eb05487f50167da4d13b59da0c2de11fafffffff9c439503fbdce4f07185f8eee37"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) r1 = socket$netlink(0x10, 0x3, 0x0) (async) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(r1, 0x0, 0x0) sendmsg$NL80211_CMD_SET_WIPHY(r1, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x1c, 0x0, 0x8, 0x70bd2b, 0x25dfdbfd, {}, [@NL80211_ATTR_WIPHY_TX_POWER_LEVEL={0x8, 0x62, 0x10001}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24048004}, 0x0) (async) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e, 0xb642}) (async) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) (async) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000100001000000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) (async, rerun: 64) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) (rerun: 64) 01:53:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) pipe(&(0x7f0000000180)) r1 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000080)={0x18, 0x0, {0x3, @broadcast, 'wlan1\x00'}}) sendmsg$NFT_BATCH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) (async) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) (async) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) (async) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) (async) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) (async) pipe(&(0x7f0000000180)) (async) socket(0x10, 0x2, 0x0) (async) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) (async) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) (async) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000080)={0x18, 0x0, {0x3, @broadcast, 'wlan1\x00'}}) (async) sendmsg$NFT_BATCH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) (async) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) (async) 01:53:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:31 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) (async) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) (async) sendmsg$NFT_BATCH(r1, 0x0, 0x0) (async) sendmsg$NL80211_CMD_SET_WIPHY(r1, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x1c, 0x0, 0x8, 0x70bd2b, 0x25dfdbfd, {}, [@NL80211_ATTR_WIPHY_TX_POWER_LEVEL={0x8, 0x62, 0x10001}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24048004}, 0x0) (async) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e, 0xb642}) (async) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000100001000000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 01:53:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) (async) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) (async) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) pipe(&(0x7f0000000180)) r1 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) (async) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f0000000080)={0x18, 0x0, {0x3, @broadcast, 'wlan1\x00'}}) (async) sendmsg$NFT_BATCH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) (async) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:31 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="0200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="0200", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:31 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d307830303030303030303030303034bd32312c667363616368652c63616368653d667363616368652c63d8406779f442529ae0616368657461673d736d6170735f726f6c6c7570002c70726976706f72742c76657273696f6e3d3970323030302c7665a8ccc56d909bcad5323030302c667363616368652c706f73215fc2fcb9697861636c2c6673757569643d64373338646238642d633835752d343730352d9a3635352d33000034346366302c726f6f74636f6e746578743d756e636f6e66696e65645f752c726f6f74636f6e746578743d726f6f742c6f626a5f726f6c653d2f70726f632f6d656d696e666f002c636f6e7465fb0978743d73797374656d5f752c726f6f74636f6e746578743d73797361646d5f752c6673757569643d62663431383438382d653639392d613332322d343566392d6530320f633430612c6673757569643d65313461646630622d396528392d666363002d376661312d6131335738306566def6c0eb6d553caf084ea76dcaae4391297b0b2bd83d5bcd62598ed46baee3ee58ef68c2687e5bc132274a178f051ad5f76fe8e52ec44951754b3f6525b15b02bdf665c998bdf0d6082aa724551e6add0b70b12b43495e14c4269c7eb05487f50167da4d13b59da0c2de11fafffffff9c439503fbdce4f07185f8eee37"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="0200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, 0x0) r3 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r3}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r4 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', 0x0, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r4, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r5, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:31 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:31 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="0200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(r2, 0x0, 0x0) r3 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000feffff7ffb75540cbb9e7d86108169470000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x4008881) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x401, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_BEACONS(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r6, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x51}, @val={0x8, 0x3, r7}, @void}}}, 0x24}}, 0x0) r8 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r8, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r8, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r8, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r1) r10 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_DEFRAG(r3, 0x50009402, 0x0) r11 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r10, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_BEACONS(r10, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r11, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x51}, @val={0x8, 0x3, r12}, @void}}}, 0x24}}, 0x0) sendmsg$NL80211_CMD_SET_BSS(r8, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x24, r9, 0x10, 0x70bd2d, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r12}, @void}}, [@NL80211_ATTR_P2P_CTWINDOW={0x5, 0xa2, 0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x4040803) syz_genetlink_get_family_id$devlink(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r4, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80040}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, 0x0, 0x4, 0x70bd29, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r7}, @void}}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0xc080}, 0x4040001) 01:53:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, 0x0) r3 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r3}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r4 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', 0x0, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r4, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r5, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:31 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="0200", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="020002", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(r2, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e, 0xb642}) r3 = socket(0x10, 0x2, 0x0) r4 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r6 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r6, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r6, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r5, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000a7b3075fdeb118259129040b508b152763e2bfcfce4e1d738e1dbe7df05d3ee054cd4aee86ea59bac82dadd68a2f6edf71d2ca91a8546336ede34a8b96f41a07ff5db7c46d50176aafe4a450aa06f37fe1953001dcbeecb62d17ebac186cfc3c1f0767d36ee1a87dcfe279d681", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r4, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r8, 0x89f1, &(0x7f0000000280)={'ip6gre0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x2f, 0x0, 0x79, 0x2, 0x44, @local, @loopback, 0x700, 0x7800, 0x7, 0xfffffff7}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r8, 0x89f2, &(0x7f0000002d00)={'syztnl0\x00', &(0x7f0000002c80)={'syztnl2\x00', 0x0, 0x4, 0x8, 0x2, 0x9, 0x42, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @empty, 0x80, 0x20, 0x9, 0x1ff}}) sendmsg$NBD_CMD_DISCONNECT(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x30}}, 0x0) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32=r9, @ANYBLOB="010a02a7d90259001c0012800b00010067726574617000000c00028008000100", @ANYRES32=r9, @ANYBLOB], 0x3c}}, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000005ac0)={0x4dc, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [{{0x8}, {0x1e4, 0x2, 0x0, 0x1, [{0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x7ff}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x200}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x7fff}}, {0x8}}}]}}, {{0x8}, {0xb4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8}, {0x180, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8}}, {0x8, 0x6, r5}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0xbf6}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x80000001}}}]}}, {{0x8, 0x1, r9}, {0x90, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x94d}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}]}, 0x4dc}, 0x1, 0x0, 0x0, 0x4010}, 0x40000) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r10 = openat$cgroup_subtree(r1, &(0x7f00000001c0), 0x2, 0x0) r11 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000240), 0x4400, 0x0) r12 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000002c0), 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000300)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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", @ANYRES32=r10, @ANYBLOB="0c0006002e2f66696c65300008000500", @ANYRES32=r11, @ANYBLOB="0c0006002e2f66696c653000060003000600000008000500", @ANYRES32=r12, @ANYBLOB="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", @ANYRES32, @ANYBLOB="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"], 0x53dc}, 0x1, 0x0, 0x0, 0x40000}, 0x2000081) sendmsg$NFT_BATCH(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="140000001000010000004813e28ba79ca62b8b17fdfc6181a9fc05f54bcf847b31a4c4b70d248c6b70173509b3b0f1ceb0e4f5e7a3431bc95a5ec789a6c497fdaf7ac9aa4051"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 01:53:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(r2, 0x0, 0x0) r3 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000feffff7ffb75540cbb9e7d86108169470000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x4008881) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x401, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_BEACONS(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r6, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x51}, @val={0x8, 0x3, r7}, @void}}}, 0x24}}, 0x0) r8 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r8, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r8, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r8, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r1) r10 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_DEFRAG(r3, 0x50009402, 0x0) r11 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r10, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_BEACONS(r10, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r11, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x51}, @val={0x8, 0x3, r12}, @void}}}, 0x24}}, 0x0) sendmsg$NL80211_CMD_SET_BSS(r8, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x24, r9, 0x10, 0x70bd2d, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r12}, @void}}, [@NL80211_ATTR_P2P_CTWINDOW={0x5, 0xa2, 0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x4040803) syz_genetlink_get_family_id$devlink(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r4, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80040}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, 0x0, 0x4, 0x70bd29, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r7}, @void}}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0xc080}, 0x4040001) 01:53:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="020002", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="020002", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, 0x0) r3 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r3}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r4 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', 0x0, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r4, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r5, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(r2, 0x0, 0x0) r3 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000feffff7ffb75540cbb9e7d86108169470000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x4008881) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x401, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_BEACONS(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r6, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x51}, @val={0x8, 0x3, r7}, @void}}}, 0x24}}, 0x0) r8 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r8, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r8, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r8, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r1) r10 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_DEFRAG(r3, 0x50009402, 0x0) r11 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r10, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_BEACONS(r10, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r11, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x51}, @val={0x8, 0x3, r12}, @void}}}, 0x24}}, 0x0) sendmsg$NL80211_CMD_SET_BSS(r8, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x24, r9, 0x10, 0x70bd2d, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r12}, @void}}, [@NL80211_ATTR_P2P_CTWINDOW={0x5, 0xa2, 0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x4040803) syz_genetlink_get_family_id$devlink(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_POWER_SAVE(r4, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80040}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, 0x0, 0x4, 0x70bd29, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r7}, @void}}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0xc080}, 0x4040001) 01:53:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(r2, 0x0, 0x0) r3 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000feffff7ffb75540cbb9e7d86108169470000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x4008881) openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x401, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_BEACONS(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r5, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x51}, @val={0x8, 0x3, r6}, @void}}}, 0x24}}, 0x0) r7 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r7, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r7, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r7, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r1) r9 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_DEFRAG(r3, 0x50009402, 0x0) r10 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r9, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_BEACONS(r9, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r10, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x51}, @val={0x8, 0x3, r11}, @void}}}, 0x24}}, 0x0) sendmsg$NL80211_CMD_SET_BSS(r7, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x24, r8, 0x10, 0x70bd2d, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_P2P_CTWINDOW={0x5, 0xa2, 0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x4040803) syz_genetlink_get_family_id$devlink(&(0x7f00000004c0), 0xffffffffffffffff) 01:53:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) r3 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r3}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r4 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', 0x0, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r4, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r5, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(r2, 0x0, 0x0) r3 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000feffff7ffb75540cbb9e7d86108169470000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x4008881) openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x401, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_BEACONS(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r5, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x51}, @val={0x8, 0x3, r6}, @void}}}, 0x24}}, 0x0) r7 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r7, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r7, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r7, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r1) r9 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_DEFRAG(r3, 0x50009402, 0x0) r10 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r9, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_BEACONS(r9, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r10, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x51}, @val={0x8, 0x3, r11}, @void}}}, 0x24}}, 0x0) sendmsg$NL80211_CMD_SET_BSS(r7, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x24, r8, 0x10, 0x70bd2d, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_P2P_CTWINDOW={0x5, 0xa2, 0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x4040803) 01:53:32 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) r3 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r3}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r4 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', 0x0, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r4, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r5, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(r2, 0x0, 0x0) r3 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000feffff7ffb75540cbb9e7d86108169470000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x4008881) openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x401, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_BEACONS(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r5, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x51}, @val={0x8, 0x3, r6}, @void}}}, 0x24}}, 0x0) r7 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r7, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r7, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r7, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r1) r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_DEFRAG(r3, 0x50009402, 0x0) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r8, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_BEACONS(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r9, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x51}, @val={0x8, 0x3, r10}, @void}}}, 0x24}}, 0x0) 01:53:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) r3 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r3}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r4 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', 0x0, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r4, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r5, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(r2, 0x0, 0x0) r3 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000feffff7ffb75540cbb9e7d86108169470000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x4008881) openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x401, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_BEACONS(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r5, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x51}, @val={0x8, 0x3, r6}, @void}}}, 0x24}}, 0x0) r7 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r7, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r7, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r7, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r1) r9 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_DEFRAG(r3, 0x50009402, 0x0) r10 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r9, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_BEACONS(r9, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r10, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x51}, @val={0x8, 0x3, r11}, @void}}}, 0x24}}, 0x0) sendmsg$NL80211_CMD_SET_BSS(r7, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x24, r8, 0x10, 0x70bd2d, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_P2P_CTWINDOW={0x5, 0xa2, 0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x4040803) 01:53:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x0, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:33 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="020004", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(r2, 0x0, 0x0) r3 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000feffff7ffb75540cbb9e7d86108169470000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x4008881) openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x401, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_BEACONS(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r5, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x51}, @val={0x8, 0x3, r6}, @void}}}, 0x24}}, 0x0) r7 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r7, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r7, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r7, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r1) r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_DEFRAG(r3, 0x50009402, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r8, 0x8933, &(0x7f0000000040)={'wlan0\x00'}) 01:53:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:33 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="0200", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:33 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(r2, 0x0, 0x0) r3 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000feffff7ffb75540cbb9e7d86108169470000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x4008881) openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x401, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_BEACONS(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r5, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x51}, @val={0x8, 0x3, r6}, @void}}}, 0x24}}, 0x0) r7 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r7, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r7, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r7, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r1) socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_DEFRAG(r3, 0x50009402, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) 01:53:33 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r1, 0x0, 0x0) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x0, 0xb642}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(r3, 0x84, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0x8) ioctl$FITRIM(r3, 0xc0185879, &(0x7f0000000080)={0x0, 0x5, 0xce75}) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 01:53:33 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_BEACONS(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x51}, @val={0x8, 0x3, r4}, @void}}}, 0x24}}, 0x0) sendmsg$NL80211_CMD_GET_MPATH(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xe764002d867264a9}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)={0x8c, r3, 0x300, 0x70bd25, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x1f, 0x47}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @broadcast}, @NL80211_ATTR_MAC={0xa}]}, 0x8c}, 0x1, 0x0, 0x0, 0x20008814}, 0x3004c045) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r5 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r5, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(r5, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r1, 0xb702, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x0, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:33 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r1 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r3 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r2, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r3}, 0x20) sendmsg$NFT_BATCH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) r4 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r2, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r4, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r5, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(r2, 0x0, 0x0) r3 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000feffff7ffb75540cbb9e7d86108169470000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x4008881) openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x401, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_BEACONS(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r5, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x51}, @val={0x8, 0x3, r6}, @void}}}, 0x24}}, 0x0) r7 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r7, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r7, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r7, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r1) socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_DEFRAG(r3, 0x50009402, 0x0) 01:53:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r1 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r3 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r2, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r3}, 0x20) sendmsg$NFT_BATCH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) r4 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r2, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r4, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r5, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:34 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x0, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(r2, 0x0, 0x0) r3 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000feffff7ffb75540cbb9e7d86108169470000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x4008881) openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x401, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_BEACONS(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r5, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x51}, @val={0x8, 0x3, r6}, @void}}}, 0x24}}, 0x0) r7 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r7, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r7, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r7, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r1) socket$nl_generic(0x10, 0x3, 0x10) 01:53:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x0, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r1 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r3 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r2, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r3}, 0x20) sendmsg$NFT_BATCH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) r4 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r2, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r4, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r5, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r1 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r3 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r2, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r3}, 0x20) sendmsg$NFT_BATCH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) r4 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r2, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r4, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r5, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d307830303030303030303030303034bd32312c667363616368652c63616368653d667363616368652c63d8406779f442529ae0616368657461673d736d6170735f726f6c6c7570002c70726976706f72742c76657273696f6e3d3970323030302c7665a8ccc56d909bcad5323030302c667363616368652c706f73215fc2fcb9697861636c2c6673757569643d64373338646238642d633835752d343730352d9a3635352d33000034346366302c726f6f74636f6e746578743d756e636f6e66696e65645f752c726f6f74636f6e746578743d726f6f742c6f626a5f726f6c653d2f70726f632f6d656d696e666f002c636f6e7465fb0978743d73797374656d5f752c726f6f74636f6e746578743d73797361646d5f752c6673757569643d62663431383438382d653639392d613332322d343566392d6530320f633430612c6673757569643d65313461646630622d396528392d666363002d376661312d6131335738306566def6c0eb6d553caf084ea76dcaae4391297b0b2bd83d5bcd62598ed46baee3ee58ef68c2687e5bc132274a178f051ad5f76fe8e52ec44951754b3f6525b15b02bdf665c998bdf0d6082aa724551e6add0b70b12b43495e14c4269c7eb05487f50167da4d13b59da0c2de11fafffffff9c439503fbdce4f07185f8eee37"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(r2, 0x0, 0x0) r3 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000feffff7ffb75540cbb9e7d86108169470000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x4008881) openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x401, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_BEACONS(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r5, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x51}, @val={0x8, 0x3, r6}, @void}}}, 0x24}}, 0x0) r7 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r7, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r7, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r7, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r1) 01:53:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x0, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x0, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r1 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r3 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r2, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r3}, 0x20) sendmsg$NFT_BATCH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) r4 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r2, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r4, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r5, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r1 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r3 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r2, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r3}, 0x20) sendmsg$NFT_BATCH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) r4 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r2, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r4, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r5, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(r1, 0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000feffff7ffb75540cbb9e7d86108169470000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x4008881) openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x401, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_BEACONS(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x51}, @val={0x8, 0x3, r5}, @void}}}, 0x24}}, 0x0) r6 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r6, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r6, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) 01:53:34 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x0, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:34 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="0200", @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r1 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r3 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r2, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r3}, 0x20) sendmsg$NFT_BATCH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r4 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r2, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r4, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r5, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x0, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="020000", @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(r1, 0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000feffff7ffb75540cbb9e7d86108169470000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x4008881) openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x401, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_BEACONS(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x51}, @val={0x8, 0x3, r5}, @void}}}, 0x24}}, 0x0) r6 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r6, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r6, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) 01:53:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="020000", @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(r1, 0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000feffff7ffb75540cbb9e7d86108169470000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x4008881) openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x401, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_BEACONS(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x51}, @val={0x8, 0x3, r5}, @void}}}, 0x24}}, 0x0) r6 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r6, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r6, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) 01:53:35 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r6, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYBLOB="08000500", @ANYRES32=r5, @ANYBLOB="08000300", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r6, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r7, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="020000", @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r1 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r3 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r2, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r3}, 0x20) sendmsg$NFT_BATCH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r4 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r2, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r4, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r5, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x0, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(r1, 0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000feffff7ffb75540cbb9e7d86108169470000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x4008881) openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x401, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_BEACONS(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x51}, @val={0x8, 0x3, r5}, @void}}}, 0x24}}, 0x0) r6 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r6, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) 01:53:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(r1, 0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000feffff7ffb75540cbb9e7d86108169470000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x4008881) openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x401, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_BEACONS(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x51}, @val={0x8, 0x3, r5}, @void}}}, 0x24}}, 0x0) r6 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r6, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r6, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) 01:53:35 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="080005", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(r1, 0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000feffff7ffb75540cbb9e7d86108169470000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x4008881) openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x401, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_BEACONS(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x51}, @val={0x8, 0x3, r5}, @void}}}, 0x24}}, 0x0) socket(0x10, 0x2, 0x0) 01:53:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x0, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r1 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r3 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r2, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r3}, 0x20) sendmsg$NFT_BATCH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r4 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r2, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r4, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r5, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x0, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(r1, 0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000feffff7ffb75540cbb9e7d86108169470000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x4008881) openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x401, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_BEACONS(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x51}, @val={0x8, 0x3, r5}, @void}}}, 0x24}}, 0x0) 01:53:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(r1, 0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000feffff7ffb75540cbb9e7d86108169470000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x4008881) openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x401, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_REGISTER_BEACONS(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x51}, @val={0x8}, @void}}}, 0x24}}, 0x0) 01:53:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x0, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d307830303030303030303030303034bd32312c667363616368652c63616368653d667363616368652c63d8406779f442529ae0616368657461673d736d6170735f726f6c6c7570002c70726976706f72742c76657273696f6e3d3970323030302c7665a8ccc56d909bcad5323030302c667363616368652c706f73215fc2fcb9697861636c2c6673757569643d64373338646238642d633835752d343730352d9a3635352d33000034346366302c726f6f74636f6e746578743d756e636f6e66696e65645f752c726f6f74636f6e746578743d726f6f742c6f626a5f726f6c653d2f70726f632f6d656d696e666f002c636f6e7465fb0978743d73797374656d5f752c726f6f74636f6e746578743d73797361646d5f752c6673757569643d62663431383438382d653639392d613332322d343566392d6530320f633430612c6673757569643d65313461646630622d396528392d666363002d376661312d6131335738306566def6c0eb6d553caf084ea76dcaae4391297b0b2bd83d5bcd62598ed46baee3ee58ef68c2687e5bc132274a178f051ad5f76fe8e52ec44951754b3f6525b15b02bdf665c998bdf0d6082aa724551e6add0b70b12b43495e14c4269c7eb05487f50167da4d13b59da0c2de11fafffffff9c439503fbdce4f07185f8eee37"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(r1, 0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000feffff7ffb75540cbb9e7d86108169470000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x4008881) openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x401, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_REGISTER_BEACONS(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x51}, @val={0x8}, @void}}}, 0x24}}, 0x0) 01:53:36 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(r1, 0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000feffff7ffb75540cbb9e7d86108169470000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x4008881) openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x401, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$NL80211_CMD_REGISTER_BEACONS(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x51}, @val={0x8}, @void}}}, 0x24}}, 0x0) 01:53:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:36 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(r1, 0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000feffff7ffb75540cbb9e7d86108169470000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x4008881) openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x401, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_BEACONS(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x51}, @val={0x8, 0x3, r4}, @void}}}, 0x24}}, 0x0) 01:53:36 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d307830303030303030303030303034bd32312c667363616368652c63616368653d667363616368652c63d8406779f442529ae0616368657461673d736d6170735f726f6c6c7570002c70726976706f72742c76657273696f6e3d3970323030302c7665a8ccc56d909bcad5323030302c667363616368652c706f73215fc2fcb9697861636c2c6673757569643d64373338646238642d633835752d343730352d9a3635352d33000034346366302c726f6f74636f6e746578743d756e636f6e66696e65645f752c726f6f74636f6e746578743d726f6f742c6f626a5f726f6c653d2f70726f632f6d656d696e666f002c636f6e7465fb0978743d73797374656d5f752c726f6f74636f6e746578743d73797361646d5f752c6673757569643d62663431383438382d653639392d613332322d343566392d6530320f633430612c6673757569643d65313461646630622d396528392d666363002d376661312d6131335738306566def6c0eb6d553caf084ea76dcaae4391297b0b2bd83d5bcd62598ed46baee3ee58ef68c2687e5bc132274a178f051ad5f76fe8e52ec44951754b3f6525b15b02bdf665c998bdf0d6082aa724551e6add0b70b12b43495e14c4269c7eb05487f50167da4d13b59da0c2de11fafffffff9c439503fbdce4f07185f8eee37"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d307830303030303030303030303034bd32312c667363616368652c63616368653d667363616368652c63d8406779f442529ae0616368657461673d736d6170735f726f6c6c7570002c70726976706f72742c76657273696f6e3d3970323030302c7665a8ccc56d909bcad5323030302c667363616368652c706f73215fc2fcb9697861636c2c6673757569643d64373338646238642d633835752d343730352d9a3635352d33000034346366302c726f6f74636f6e746578743d756e636f6e66696e65645f752c726f6f74636f6e746578743d726f6f742c6f626a5f726f6c653d2f70726f632f6d656d696e666f002c636f6e7465fb0978743d73797374656d5f752c726f6f74636f6e746578743d73797361646d5f752c6673757569643d62663431383438382d653639392d613332322d343566392d6530320f633430612c6673757569643d65313461646630622d396528392d666363002d376661312d6131335738306566def6c0eb6d553caf084ea76dcaae4391297b0b2bd83d5bcd62598ed46baee3ee58ef68c2687e5bc132274a178f051ad5f76fe8e52ec44951754b3f6525b15b02bdf665c998bdf0d6082aa724551e6add0b70b12b43495e14c4269c7eb05487f50167da4d13b59da0c2de11fafffffff9c439503fbdce4f07185f8eee37"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(r1, 0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000feffff7ffb75540cbb9e7d86108169470000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x4008881) openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x401, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_BEACONS(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x51}, @val={0x8, 0x3, r4}, @void}}}, 0x24}}, 0x0) 01:53:37 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(r1, 0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000feffff7ffb75540cbb9e7d86108169470000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x4008881) openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x401, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_BEACONS(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x51}, @val={0x8, 0x3, r4}, @void}}}, 0x24}}, 0x0) 01:53:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:37 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:37 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB, @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:37 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="0200", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(r1, 0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000feffff7ffb75540cbb9e7d86108169470000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x4008881) openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x401, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_BEACONS(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x51}, @val={0x8, 0x3, r4}, @void}}}, 0x24}}, 0x0) 01:53:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:37 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB, @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:37 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="0200", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e, 0xb642}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r5 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r5, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r5, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r4, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r3, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r6 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$inet6(0xa, 0x3, 0x6) r8 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r6, &(0x7f0000000080)={&(0x7f0000000340)={0x1d, r9, 0x3f420f00}, 0x10, &(0x7f0000000040)={0x0}, 0x1, 0x0, 0x0, 0x20000040}, 0x2004c810) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r7, 0x89f1, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000280)={'syztnl2\x00', r9, 0x29, 0x2, 0x14, 0xffffffff, 0x10, @empty, @local, 0x8, 0x803f, 0x0, 0xffff8000}}) clock_gettime(0x0, &(0x7f0000000640)={0x0, 0x0}) sendmsg$can_bcm(r5, &(0x7f0000000740)={&(0x7f00000004c0)={0x1d, r9}, 0x10, &(0x7f0000000700)={&(0x7f0000000680)={0x6, 0x100, 0x4d2a, {r10, r11/1000+60000}, {0x0, 0xea60}, {0x0, 0x1, 0x1}, 0x1, @canfd={{0x1, 0x0, 0x1, 0x1}, 0x15, 0x5, 0x0, 0x0, "040cfe2254388a6423787aaba6243ed687b768a6640d8e59b5b77f39105a57e2af19728b88d7de9931418145eda5aa14946427574fa63b51241de4db37f09c99"}}, 0x80}, 0x1, 0x0, 0x0, 0x80}, 0x41) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000140)={@rand_addr, 0x0}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=@ipv6_getnetconf={0x2c, 0x52, 0x100, 0x70bd2a, 0x25dfdbfb, {}, [@NETCONFA_IFINDEX={0x8, 0x1, r9}, @NETCONFA_IFINDEX={0x8, 0x1, r12}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4040}, 0xc044) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) sendmsg$nl_route(r0, 0x0, 0x0) 01:53:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(r1, 0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000feffff7ffb75540cbb9e7d86108169470000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x4008881) openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x401, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_BEACONS(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x51}, @val={0x8, 0x3, r4}, @void}}}, 0x24}}, 0x0) 01:53:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_rose_SIOCDELRT(r0, 0x890c, &(0x7f00000003c0)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0xf800, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0, 0x3, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r1 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r2, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)=@delqdisc={0xf4, 0x25, 0x0, 0x70bd29, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, {0x10, 0xffea}, {0xfff3, 0xfff1}, {0xfffe, 0x3}}, [@TCA_RATE={0x6, 0x5, {0x7, 0x8}}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x401}, @qdisc_kind_options=@q_pfifo={{0xa}, {0x8, 0x2, 0xfffffe01}}, @TCA_RATE={0x6, 0x5, {0x8, 0x6}}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x1ff}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x6}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x2}, @TCA_STAB={0x84, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x80, 0x5, 0x4, 0x2, 0x2, 0x7, 0x880d, 0x4}}, {0xc, 0x2, [0x1, 0x3, 0x6, 0x800]}}, {{0x1c, 0x1, {0xd5, 0x1, 0x4, 0x4, 0x1, 0xffffffe1, 0x10000, 0x2}}, {0x8, 0x2, [0xcfdf, 0x6250]}}, {{0x1c, 0x1, {0x4, 0x7, 0x3, 0x5, 0x2, 0x5, 0x8001, 0x9}}, {0x16, 0x2, [0x3ff, 0x1, 0x400, 0x7, 0x80, 0x9, 0x81, 0x2, 0x3]}}]}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x7}]}, 0xf4}, 0x1, 0x0, 0x0, 0x20000040}, 0x40880) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:37 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d307830303030303030303030303034bd32312c667363616368652c63616368653d667363616368652c63d8406779f442529ae0616368657461673d736d6170735f726f6c6c7570002c70726976706f72742c76657273696f6e3d3970323030302c7665a8ccc56d909bcad5323030302c667363616368652c706f73215fc2fcb9697861636c2c6673757569643d64373338646238642d633835752d343730352d9a3635352d33000034346366302c726f6f74636f6e746578743d756e636f6e66696e65645f752c726f6f74636f6e746578743d726f6f742c6f626a5f726f6c653d2f70726f632f6d656d696e666f002c636f6e7465fb0978743d73797374656d5f752c726f6f74636f6e746578743d73797361646d5f752c6673757569643d62663431383438382d653639392d613332322d343566392d6530320f633430612c6673757569643d65313461646630622d396528392d666363002d376661312d6131335738306566def6c0eb6d553caf084ea76dcaae4391297b0b2bd83d5bcd62598ed46baee3ee58ef68c2687e5bc132274a178f051ad5f76fe8e52ec44951754b3f6525b15b02bdf665c998bdf0d6082aa724551e6add0b70b12b43495e14c4269c7eb05487f50167da4d13b59da0c2de11fafffffff9c439503fbdce4f07185f8eee37"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB='\b\x00', @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:37 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="0200", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x0, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:37 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e, 0xb642}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r5 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r5, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r5, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r4, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r3, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r6 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$inet6(0xa, 0x3, 0x6) r8 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r6, &(0x7f0000000080)={&(0x7f0000000340)={0x1d, r9, 0x3f420f00}, 0x10, &(0x7f0000000040)={0x0}, 0x1, 0x0, 0x0, 0x20000040}, 0x2004c810) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r7, 0x89f1, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000280)={'syztnl2\x00', r9, 0x29, 0x2, 0x14, 0xffffffff, 0x10, @empty, @local, 0x8, 0x803f, 0x0, 0xffff8000}}) clock_gettime(0x0, &(0x7f0000000640)={0x0, 0x0}) sendmsg$can_bcm(r5, &(0x7f0000000740)={&(0x7f00000004c0)={0x1d, r9}, 0x10, &(0x7f0000000700)={&(0x7f0000000680)={0x6, 0x100, 0x4d2a, {r10, r11/1000+60000}, {0x0, 0xea60}, {0x0, 0x1, 0x1}, 0x1, @canfd={{0x1, 0x0, 0x1, 0x1}, 0x15, 0x5, 0x0, 0x0, "040cfe2254388a6423787aaba6243ed687b768a6640d8e59b5b77f39105a57e2af19728b88d7de9931418145eda5aa14946427574fa63b51241de4db37f09c99"}}, 0x80}, 0x1, 0x0, 0x0, 0x80}, 0x41) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000140)={@rand_addr, 0x0}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=@ipv6_getnetconf={0x2c, 0x52, 0x100, 0x70bd2a, 0x25dfdbfb, {}, [@NETCONFA_IFINDEX={0x8, 0x1, r9}, @NETCONFA_IFINDEX={0x8, 0x1, r12}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4040}, 0xc044) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) sendmsg$nl_route(r0, 0x0, 0x0) 01:53:37 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB='\b\x00', @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(r1, 0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000feffff7ffb75540cbb9e7d86108169470000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x4008881) openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x401, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_BEACONS(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x51}, @val={0x8, 0x3, r4}, @void}}}, 0x24}}, 0x0) 01:53:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_rose_SIOCDELRT(r0, 0x890c, &(0x7f00000003c0)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0xf800, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0, 0x3, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r1 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r2, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)=@delqdisc={0xf4, 0x25, 0x0, 0x70bd29, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, {0x10, 0xffea}, {0xfff3, 0xfff1}, {0xfffe, 0x3}}, [@TCA_RATE={0x6, 0x5, {0x7, 0x8}}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x401}, @qdisc_kind_options=@q_pfifo={{0xa}, {0x8, 0x2, 0xfffffe01}}, @TCA_RATE={0x6, 0x5, {0x8, 0x6}}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x1ff}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x6}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x2}, @TCA_STAB={0x84, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x80, 0x5, 0x4, 0x2, 0x2, 0x7, 0x880d, 0x4}}, {0xc, 0x2, [0x1, 0x3, 0x6, 0x800]}}, {{0x1c, 0x1, {0xd5, 0x1, 0x4, 0x4, 0x1, 0xffffffe1, 0x10000, 0x2}}, {0x8, 0x2, [0xcfdf, 0x6250]}}, {{0x1c, 0x1, {0x4, 0x7, 0x3, 0x5, 0x2, 0x5, 0x8001, 0x9}}, {0x16, 0x2, [0x3ff, 0x1, 0x400, 0x7, 0x80, 0x9, 0x81, 0x2, 0x3]}}]}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x7}]}, 0xf4}, 0x1, 0x0, 0x0, 0x20000040}, 0x40880) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r1 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r3 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r2, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r4 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r2, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r4, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r5, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(r1, 0x0, 0x0) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000feffff7ffb75540cbb9e7d86108169470000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x4000040}, 0x4008881) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_BEACONS(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x51}, @val={0x8, 0x3, r5}, @void}}}, 0x24}}, 0x0) 01:53:38 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="020000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x0, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:38 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e, 0xb642}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r5 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r5, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r5, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r4, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r3, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) r6 = perf_event_open(&(0x7f0000000500)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$inet6(0xa, 0x3, 0x6) r8 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) sendmsg$can_bcm(r6, &(0x7f0000000080)={&(0x7f0000000340)={0x1d, r9, 0x3f420f00}, 0x10, &(0x7f0000000040)={0x0}, 0x1, 0x0, 0x0, 0x20000040}, 0x2004c810) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r7, 0x89f1, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000280)={'syztnl2\x00', r9, 0x29, 0x2, 0x14, 0xffffffff, 0x10, @empty, @local, 0x8, 0x803f, 0x0, 0xffff8000}}) clock_gettime(0x0, &(0x7f0000000640)={0x0, 0x0}) sendmsg$can_bcm(r5, &(0x7f0000000740)={&(0x7f00000004c0)={0x1d, r9}, 0x10, &(0x7f0000000700)={&(0x7f0000000680)={0x6, 0x100, 0x4d2a, {r10, r11/1000+60000}, {0x0, 0xea60}, {0x0, 0x1, 0x1}, 0x1, @canfd={{0x1, 0x0, 0x1, 0x1}, 0x15, 0x5, 0x0, 0x0, "040cfe2254388a6423787aaba6243ed687b768a6640d8e59b5b77f39105a57e2af19728b88d7de9931418145eda5aa14946427574fa63b51241de4db37f09c99"}}, 0x80}, 0x1, 0x0, 0x0, 0x80}, 0x41) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000140)={@rand_addr, 0x0}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)=@ipv6_getnetconf={0x2c, 0x52, 0x100, 0x70bd2a, 0x25dfdbfb, {}, [@NETCONFA_IFINDEX={0x8, 0x1, r9}, @NETCONFA_IFINDEX={0x8, 0x1, r12}, @NETCONFA_PROXY_NEIGH={0x8, 0x5, 0x5}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4040}, 0xc044) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) sendmsg$nl_route(r0, 0x0, 0x0) 01:53:38 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="020000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(r0, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000feffff7ffb75540cbb9e7d86108169470000"], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_BEACONS(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x51}, @val={0x8, 0x3, r4}, @void}}}, 0x24}}, 0x0) 01:53:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$sock_rose_SIOCDELRT(r0, 0x890c, &(0x7f00000003c0)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0xf800, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0, 0x3, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r1 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r2, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$nl_route_sched(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f00000002c0)=@delqdisc={0xf4, 0x25, 0x0, 0x70bd29, 0x25dfdbfb, {0x0, 0x0, 0x0, 0x0, {0x10, 0xffea}, {0xfff3, 0xfff1}, {0xfffe, 0x3}}, [@TCA_RATE={0x6, 0x5, {0x7, 0x8}}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x401}, @qdisc_kind_options=@q_pfifo={{0xa}, {0x8, 0x2, 0xfffffe01}}, @TCA_RATE={0x6, 0x5, {0x8, 0x6}}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x1ff}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x6}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x2}, @TCA_STAB={0x84, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x80, 0x5, 0x4, 0x2, 0x2, 0x7, 0x880d, 0x4}}, {0xc, 0x2, [0x1, 0x3, 0x6, 0x800]}}, {{0x1c, 0x1, {0xd5, 0x1, 0x4, 0x4, 0x1, 0xffffffe1, 0x10000, 0x2}}, {0x8, 0x2, [0xcfdf, 0x6250]}}, {{0x1c, 0x1, {0x4, 0x7, 0x3, 0x5, 0x2, 0x5, 0x8001, 0x9}}, {0x16, 0x2, [0x3ff, 0x1, 0x400, 0x7, 0x80, 0x9, 0x81, 0x2, 0x3]}}]}, @TCA_INGRESS_BLOCK={0x8, 0xd, 0x7}]}, 0xf4}, 0x1, 0x0, 0x0, 0x20000040}, 0x40880) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x44010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r1 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r3 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r2, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r4 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r2, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r4, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r5, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(r0, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_BEACONS(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x51}, @val={0x8, 0x3, r4}, @void}}}, 0x24}}, 0x0) 01:53:38 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="020000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:38 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d307830303030303030303030303034bd32312c667363616368652c63616368653d667363616368652c63d8406779f442529ae0616368657461673d736d6170735f726f6c6c7570002c70726976706f72742c76657273696f6e3d3970323030302c7665a8ccc56d909bcad5323030302c667363616368652c706f73215fc2fcb9697861636c2c6673757569643d64373338646238642d633835752d343730352d9a3635352d33000034346366302c726f6f74636f6e746578743d756e636f6e66696e65645f752c726f6f74636f6e746578743d726f6f742c6f626a5f726f6c653d2f70726f632f6d656d696e666f002c636f6e7465fb0978743d73797374656d5f752c726f6f74636f6e746578743d73797361646d5f752c6673757569643d62663431383438382d653639392d613332322d343566392d6530320f633430612c6673757569643d65313461646630622d396528392d666363002d376661312d6131335738306566def6c0eb6d553caf084ea76dcaae4391297b0b2bd83d5bcd62598ed46baee3ee58ef68c2687e5bc132274a178f051ad5f76fe8e52ec44951754b3f6525b15b02bdf665c998bdf0d6082aa724551e6add0b70b12b43495e14c4269c7eb05487f50167da4d13b59da0c2de11fafffffff9c439503fbdce4f07185f8eee37"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="020000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x0, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r1 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r3 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r2, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r4 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r2, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r4, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r5, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(r0, 0x0, 0x0) r1 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_BEACONS(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x51}, @val={0x8, 0x3, r4}, @void}}}, 0x24}}, 0x0) 01:53:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r1 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r3 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r2, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r4 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r2, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r4, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r5, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:39 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e, 0xb642}) r1 = accept(r0, &(0x7f0000000140)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000080)=0x80) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r5 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r7 = socket$can_bcm(0x1d, 0x2, 0x2) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(r8, 0x84, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0x8) getsockopt$sock_timeval(r8, 0x1, 0x15, &(0x7f0000000400), &(0x7f0000000440)=0x10) connect$can_bcm(r7, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r7, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r6, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r5, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=@delqdisc={0x130, 0x25, 0x200, 0x70bd2b, 0x25dfdbfe, {0x0, 0x0, 0x0, r6, {0xfff2, 0xfff2}, {0x6, 0xffe0}, {0xffff, 0x8}}, [@TCA_RATE={0x6, 0x5, {0x2, 0x2}}, @qdisc_kind_options=@q_cbq={{0x8}, {0xac, 0x2, [@TCA_CBS_PARMS={0x18, 0x1, {0x0, '\x00', 0xd5, 0xffff8000, 0x5, 0xfffffffb}}, @TCA_CBS_PARMS={0x18, 0x1, {0xdb, '\x00', 0x0, 0x3, 0x6, 0x800}}, @TCA_CBS_PARMS={0x18, 0x1, {0x8, '\x00', 0x3f, 0x1e, 0x1, 0x1}}, @TCA_CBS_PARMS={0x18, 0x1, {0x6, '\x00', 0x1, 0x3, 0x7fff, 0x3}}, @TCA_CBS_PARMS={0x18, 0x1, {0x0, '\x00', 0x8, 0x1ff, 0x4, 0x1b3d}}, @TCA_CBS_PARMS={0x18, 0x1, {0x2, '\x00', 0xffffffff, 0x380000, 0x54b648b7, 0x4}}, @TCA_CBS_PARMS={0x18, 0x1, {0x20, '\x00', 0x1, 0x5, 0x3f, 0x3}}]}}, @qdisc_kind_options=@q_mq={0x7}, @qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_FSC={0x10, 0x2, {0x7, 0xffffffff, 0x8}}}}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0xfffffffb}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x8}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0xf7c}, @qdisc_kind_options=@q_pfifo_fast={0xf}]}, 0x130}, 0x1, 0x0, 0x0, 0x44080}, 0x4040000) r9 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r9, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r9, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r4, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r3, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@gettclass={0x24, 0x2a, 0xb00, 0x70bd27, 0x25dfdbff, {0x0, 0x0, 0x0, r4, {0x10, 0x2}, {0x0, 0xffff}, {0x9, 0x13}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x68001) r10 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r10, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r10, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) sendmsg$nl_route(r0, 0x0, 0x0) 01:53:39 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(r0, 0x0, 0x0) socket(0x10, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_BEACONS(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x51}, @val={0x8, 0x3, r3}, @void}}}, 0x24}}, 0x0) 01:53:39 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d307830303030303030303030303034bd32312c667363616368652c63616368653d667363616368652c63d8406779f442529ae0616368657461673d736d6170735f726f6c6c7570002c70726976706f72742c76657273696f6e3d3970323030302c7665a8ccc56d909bcad5323030302c667363616368652c706f73215fc2fcb9697861636c2c6673757569643d64373338646238642d633835752d343730352d9a3635352d33000034346366302c726f6f74636f6e746578743d756e636f6e66696e65645f752c726f6f74636f6e746578743d726f6f742c6f626a5f726f6c653d2f70726f632f6d656d696e666f002c636f6e7465fb0978743d73797374656d5f752c726f6f74636f6e746578743d73797361646d5f752c6673757569643d62663431383438382d653639392d613332322d343566392d6530320f633430612c6673757569643d65313461646630622d396528392d666363002d376661312d6131335738306566def6c0eb6d553caf084ea76dcaae4391297b0b2bd83d5bcd62598ed46baee3ee58ef68c2687e5bc132274a178f051ad5f76fe8e52ec44951754b3f6525b15b02bdf665c998bdf0d6082aa724551e6add0b70b12b43495e14c4269c7eb05487f50167da4d13b59da0c2de11fafffffff9c439503fbdce4f07185f8eee37"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e, 0xb642}) r1 = accept(r0, &(0x7f0000000140)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000080)=0x80) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r5 = socket$unix(0x1, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r7 = socket$can_bcm(0x1d, 0x2, 0x2) r8 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_CONTEXT(r8, 0x84, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0x8) getsockopt$sock_timeval(r8, 0x1, 0x15, &(0x7f0000000400), &(0x7f0000000440)=0x10) connect$can_bcm(r7, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r7, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r6, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r5, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000380)={&(0x7f00000006c0)=@delqdisc={0x130, 0x25, 0x200, 0x70bd2b, 0x25dfdbfe, {0x0, 0x0, 0x0, r6, {0xfff2, 0xfff2}, {0x6, 0xffe0}, {0xffff, 0x8}}, [@TCA_RATE={0x6, 0x5, {0x2, 0x2}}, @qdisc_kind_options=@q_cbq={{0x8}, {0xac, 0x2, [@TCA_CBS_PARMS={0x18, 0x1, {0x0, '\x00', 0xd5, 0xffff8000, 0x5, 0xfffffffb}}, @TCA_CBS_PARMS={0x18, 0x1, {0xdb, '\x00', 0x0, 0x3, 0x6, 0x800}}, @TCA_CBS_PARMS={0x18, 0x1, {0x8, '\x00', 0x3f, 0x1e, 0x1, 0x1}}, @TCA_CBS_PARMS={0x18, 0x1, {0x6, '\x00', 0x1, 0x3, 0x7fff, 0x3}}, @TCA_CBS_PARMS={0x18, 0x1, {0x0, '\x00', 0x8, 0x1ff, 0x4, 0x1b3d}}, @TCA_CBS_PARMS={0x18, 0x1, {0x2, '\x00', 0xffffffff, 0x380000, 0x54b648b7, 0x4}}, @TCA_CBS_PARMS={0x18, 0x1, {0x20, '\x00', 0x1, 0x5, 0x3f, 0x3}}]}}, @qdisc_kind_options=@q_mq={0x7}, @qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_FSC={0x10, 0x2, {0x7, 0xffffffff, 0x8}}}}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0xfffffffb}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x8}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0xf7c}, @qdisc_kind_options=@q_pfifo_fast={0xf}]}, 0x130}, 0x1, 0x0, 0x0, 0x44080}, 0x4040000) r9 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r9, &(0x7f0000000000), 0x10) sendmsg$can_bcm(r9, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r4, 0x3f420f00}, 0x10, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000e9ffffff0000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r3, @ANYBLOB="3bf81bb9f1"], 0x20000600}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)=@gettclass={0x24, 0x2a, 0xb00, 0x70bd27, 0x25dfdbff, {0x0, 0x0, 0x0, r4, {0x10, 0x2}, {0x0, 0xffff}, {0x9, 0x13}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x68001) r10 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r10, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r10, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0x40010}, 0x10) sendmsg$nl_route(r0, 0x0, 0x0) 01:53:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r1 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r3 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r2, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r4 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r2, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r4, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r5, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(r0, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_BEACONS(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x51}, @val={0x8, 0x3, r3}, @void}}}, 0x24}}, 0x0) 01:53:41 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="7472616e733d7463702c706f72743d307830303030303030303030303034bd32312c667363616368652c63616368653d667363616368652c63d8406779f442529ae0616368657461673d736d6170735f726f6c6c7570002c70726976706f72742c76657273696f6e3d3970323030302c7665a8ccc56d909bcad5323030302c667363616368652c706f73215fc2fcb9697861636c2c6673757569643d64373338646238642d633835752d343730352d9a3635352d33000034346366302c726f6f74636f6e746578743d756e636f6e66696e65645f752c726f6f74636f6e746578743d726f6f742c6f626a5f726f6c653d2f70726f632f6d656d696e666f002c636f6e7465fb0978743d73797374656d5f752c726f6f74636f6e746578743d73797361646d5f752c6673757569643d62663431383438382d653639392d613332322d343566392d6530320f633430612c6673757569643d65313461646630622d396528392d666363002d376661312d6131335738306566def6c0eb6d553caf084ea76dcaae4391297b0b2bd83d5bcd62598ed46baee3ee58ef68c2687e5bc132274a178f051ad5f76fe8e52ec44951754b3f6525b15b02bdf665c998bdf0d6082aa724551e6add0b70b12b43495e14c4269c7eb05487f50167da4d13b59da0c2de11fafffffff9c439503fbdce4f07185f8eee37"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:52 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(r0, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_BEACONS(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x51}, @val={0x8, 0x3, r3}, @void}}}, 0x24}}, 0x0) 01:53:54 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x50) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000280)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f00000004c0)=ANY=[@ANYBLOB="2e782f66696c65302fffef2f66696a65300085d285796347b30128842091342f78493b6f31f0c94b37062487c3fa7a3899c715a3807223936c6155b0fed7c61ff0d3cf60e04e8a8d28668f83a30f95986fb8e07ee0b65255b581"], &(0x7f00000000c0)='.', 0x0, 0x33080, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/meminfo\x00', 0x0, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x6cb0603c7497abb9) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0xa8) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="2964653d8af0a33be60e7cb7248b538581570a25961d03dd431c4ed16ffe4d5c06c26ab757ff1c41931d5534e1fc3a5884a829ff82"], &(0x7f0000000700)='./file0\x00', 0x0, 0x15410, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x40002, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='smaps_rollup\x00') setresuid(0x0, 0x0, 0xee01) mount$9p_tcp(&(0x7f0000000080), &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0), 0x0, &(0x7f0000003680)=ANY=[@ANYBLOB="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"]) unlink(&(0x7f0000000400)='./file1\x00') chown(&(0x7f00000006c0)='./file0\x00', 0xee00, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='mounts\x00') read$FUSE(r3, &(0x7f0000000340)={0x2020, 0x0, 0x0, 0x0}, 0x2020) chown(&(0x7f0000000140)='./file0\x00', r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000a80)='./file1\x00', &(0x7f0000000cc0), 0x400) statx(r1, &(0x7f0000000ac0)='./file0\x00', 0x100, 0x4, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r0, &(0x7f0000001480)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f00000003c0)=0xc) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x8000, &(0x7f0000000780)=ANY=[@ANYBLOB="e203c4be0a1ada93f96efe332ba713fd51c22466fb10d0384f4d1ef0abe339334b55c8f9c109826dd268b96efc521baab5afb28b1d00d416a7e4baab4c4a159a699c7111b460af1988010de14ba3ab4c3c7b2e4f922455478a3fd765e2a0c7b25d0ffaf8f95b79da72caa6fc02ea3a75580b35dc538ecedc0982d3bdd0de3a4ec8316381257df07a047cd98bf655f27d1d36c4bf6e1d2aab7feed82c675dc4dc2b7c00549e526e8e7e616c1f070ca99c8359a954a6d32f2e5682be1b6c5f46a330b6b543f26f28d04268e4f0904c60e8fef0ed845c4d11f39826606d", @ANYRES64, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',fowner=', @ANYRESDEC=r7, @ANYBLOB="2c7375626a5f757365723d2f212f2c7375626a5f726f6c653d53454736002c736d61636b66737472616e736d7574653dffffffffffff2c7063723d30303030303030303030303030303030303031332c6f626a5f726f6c653d5c2d232c646f6e745f61707072616973652c00"]) stat(&(0x7f0000000e40)='./file2\x00', &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000380)='./file2\x00', &(0x7f0000000780)='system.posix_acl_access\x00', &(0x7f0000000f00)=ANY=[@ANYBLOB="02000000010002000000000002000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000000", @ANYRES32, @ANYBLOB="02000200", @ANYRES32=0x0, @ANYBLOB="02000800", @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="02000500", @ANYRES32=0x0, @ANYBLOB="02000400", @ANYRES32=r4, @ANYBLOB="040002000000000008000400", @ANYRES32=r5, @ANYBLOB="08000500", @ANYRES32=r6, @ANYBLOB="08000300", @ANYRES32=r6, @ANYRES32=0xee01, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB='\b\x00\a\x00', @ANYRES32, @ANYBLOB="08000600", @ANYRES32=r7, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r8, @ANYBLOB="10000400000000002000050000000000"], 0xb4, 0x3) pivot_root(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='./file0\x00') rmdir(&(0x7f0000000440)='./file0\x00') ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="08000000ff2000000000010000000000"]) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000540)=""/99, 0x63}, {&(0x7f00000007c0)=""/242, 0xf2}, {&(0x7f0000001380)=""/235, 0xeb}, {&(0x7f0000000380)}, {&(0x7f00000005c0)=""/126, 0x7e}], 0x6, 0xffffffff, 0x20000) 01:53:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r1 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r3 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r2, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) sendmsg$NFT_BATCH(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r4 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r1, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r3, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r2, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r4, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r5, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) 01:53:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/block/loop0', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x0, {0x0, @random="1a8a8778bb32", 'team_slave_1\x00'}}, 0x1e) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(0xffffffffffffffff, 0xc010f508, &(0x7f0000000680)={0x289e}) r2 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r2, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r2, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @mcast2={0xff, 0x3}}}) r4 = socket(0x10, 0x2, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000540)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000100)={'syztnl1\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r4, 0x89f1, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f0000000000)={'syztnl0\x00', r3, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2={0xff, 0x3}}}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r1, &(0x7f00000002c0)="7a064bb5439f89bf9ca0cad0d41280366137084907a0340e0773431a641fbbd25bb1075c3a89cf49450aa94d4d8b30e04767e1343d29c230fe3bdfa5bc948e9a7382d65e3272e541896fdcb3005bb8a2939eae5997f1cc87b44b2a9a51412eecd3674dc55d8904e200096ee4eb90016cdebdb78acf4bd09bbe45df1bddebdc762475dd3e4f2176d39cd0f8b3eee63df9078bfdf076d074fd0b204524c65fb0957a481e66e2a601788d2b72cfe09aaa40ea67e170f08596897551c622a46c7debcf41fab19eb3775b1676c64c6a185e48ad5e29ef09ba6135e608", &(0x7f0000000080)=@tcp6=r4}, 0x20) sendmsg$NFT_BATCH(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1a78a821def16ae}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r5 = socket(0x2c, 0xa, 0xffffffff) ioctl$IMHOLD_L1(r2, 0x80044948, &(0x7f0000000480)=0xfffffffd) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000440)={'syztnl1\x00', &(0x7f00000003c0)={'ip6tnl0\x00', r3, 0x29, 0x80, 0xff, 0x2, 0x42, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, 0x40, 0x40, 0x9, 0x296}}) sendmsg$nl_route_sched(r5, &(0x7f0000000580)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000500)={&(0x7f00000005c0)=ANY=[@ANYBLOB="6800002cab5f4e5e8c5ae8dc00250000022abd700001000000000000001322b904b99dc02144a2d85d1f2ae0af4db88f640b966dc18884111301c25ec646aada8f9b25ebd81c235bbe1da9b58b5e37f7b81839fd266f820569f60df9ddde0f30", @ANYRES32=r6, @ANYBLOB="ffff03000500f2ff0900e0ff090001007072696f0000000018000200ffffff7f8d5b28ae9656d0795e455f567f6a7f2408000d000200000008000e000200000008000e00ffffffff08000e0078dba953"], 0x68}, 0x1, 0x0, 0x0, 0x4008000}, 0x50) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@RTM_NEWNSID={0x24, 0x58, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@NETNSA_PID={0x8}, @NETNSA_FD={0x8}]}, 0x24}}, 0x0) [ 477.914308] ------------[ cut here ]------------ [ 477.920097] ODEBUG: free active (active state 0) object type: hrtimer hint: bcm_tx_timeout_handler+0x0/0x50 [ 477.930243] WARNING: CPU: 0 PID: 2802 at lib/debugobjects.c:325 debug_print_object+0x160/0x250 [ 477.938966] Kernel panic - not syncing: panic_on_warn set ... [ 477.938966] [ 477.946308] CPU: 0 PID: 2802 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 477.954083] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 477.963411] Call Trace: [ 477.965980] dump_stack+0x1fc/0x2ef [ 477.969587] panic+0x26a/0x50e [ 477.972758] ? __warn_printk+0xf3/0xf3 [ 477.976626] ? debug_print_object+0x160/0x250 [ 477.981101] ? __probe_kernel_read+0x130/0x1b0 [ 477.985659] ? __warn.cold+0x5/0x5a [ 477.989262] ? __warn+0xe4/0x200 [ 477.992603] ? debug_print_object+0x160/0x250 [ 477.997075] __warn.cold+0x20/0x5a [ 478.000589] ? debug_print_object+0x160/0x250 [ 478.005060] report_bug+0x262/0x2b0 [ 478.008663] do_error_trap+0x1d7/0x310 [ 478.012527] ? math_error+0x310/0x310 [ 478.016304] ? irq_work_claim+0xa6/0xc0 [ 478.020258] ? irq_work_queue+0x29/0x80 [ 478.024211] ? wake_up_klogd.part.0+0x8c/0xc0 [ 478.028686] ? error_entry+0x72/0xd0 [ 478.032385] ? trace_hardirqs_off_caller+0x2c/0x210 [ 478.037468] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 478.042288] invalid_op+0x14/0x20 [ 478.045741] RIP: 0010:debug_print_object+0x160/0x250 [ 478.050837] Code: dd 20 f1 b3 88 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 bf 00 00 00 48 8b 14 dd 20 f1 b3 88 48 c7 c7 40 e5 b3 88 e8 65 92 7b 04 <0f> 0b 83 05 73 e6 af 07 01 48 83 c4 20 5b 5d 41 5c 41 5d c3 48 89 [ 478.069722] RSP: 0018:ffff88804fb57890 EFLAGS: 00010082 [ 478.075072] RAX: 0000000000000000 RBX: 0000000000000003 RCX: 0000000000000000 [ 478.082406] RDX: 0000000000000000 RSI: ffffffff814dff01 RDI: ffffed1009f6af04 [ 478.089650] RBP: 0000000000000001 R08: 0000000000000001 R09: 0000000000000000 [ 478.096893] R10: 0000000000000005 R11: ffffffff8c66501b R12: ffffffff89f94720 [ 478.104147] R13: ffffffff8153f830 R14: 0000000000000000 R15: dffffc0000000000 [ 478.111528] ? ktime_add_safe+0x70/0x70 [ 478.115489] ? vprintk_func+0x81/0x180 [ 478.119359] ? __free_object+0xdd/0x1e0 [ 478.123371] debug_check_no_obj_freed+0x271/0x490 [ 478.128206] kfree+0xb9/0x210 [ 478.131293] bcm_release+0x260/0x950 [ 478.134988] __sock_release+0xcd/0x2a0 [ 478.138854] ? __sock_release+0x2a0/0x2a0 [ 478.142979] sock_close+0x15/0x20 [ 478.146412] __fput+0x2ce/0x890 [ 478.149674] task_work_run+0x148/0x1c0 [ 478.153541] do_exit+0xbf3/0x2be0 [ 478.156975] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 478.161709] ? rcu_nmi_exit+0xb3/0x180 [ 478.165662] ? mm_update_next_owner+0x650/0x650 [ 478.170471] ? retint_kernel+0x2d/0x2d [ 478.174372] ? do_group_exit+0x118/0x310 [ 478.178439] do_group_exit+0x125/0x310 [ 478.182410] get_signal+0x3f2/0x1f70 [ 478.186112] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 478.190850] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 478.195590] do_signal+0x8f/0x1670 [ 478.199121] ? setup_sigcontext+0x820/0x820 [ 478.203424] ? fput+0x2b/0x190 [ 478.206593] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 478.211329] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 478.215889] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 478.220625] ? rcu_nmi_exit+0xb3/0x180 [ 478.224494] ? retint_kernel+0x2d/0x2d [ 478.228361] exit_to_usermode_loop+0x204/0x2a0 [ 478.232919] do_syscall_64+0x538/0x620 [ 478.236786] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 478.241952] RIP: 0033:0x7f0c9056d0d9 [ 478.245645] Code: Bad RIP value. [ 478.248987] RSP: 002b:00007f0c8eadf168 EFLAGS: 00000246 ORIG_RAX: 000000000000002b [ 478.256673] RAX: ffffffffffffffa1 RBX: 00007f0c9068cf80 RCX: 00007f0c9056d0d9 [ 478.263919] RDX: 0000000020000080 RSI: 0000000020000140 RDI: 0000000000000005 [ 478.271171] RBP: 00007f0c905c8ae9 R08: 0000000000000000 R09: 0000000000000000 [ 478.278419] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 478.285666] R13: 00007ffe08a3e84f R14: 00007f0c8eadf300 R15: 0000000000022000 [ 478.292920] [ 478.292923] ====================================================== [ 478.292926] WARNING: possible circular locking dependency detected [ 478.292928] 4.19.211-syzkaller #0 Not tainted [ 478.292931] ------------------------------------------------------ [ 478.292934] syz-executor.0/2802 is trying to acquire lock: [ 478.292936] 000000001eaf5b3d ((console_sem).lock){-...}, at: down_trylock+0xe/0x60 [ 478.292943] [ 478.292946] but task is already holding lock: [ 478.292947] 000000009e9dde43 (&obj_hash[i].lock){-.-.}, at: debug_check_no_obj_freed+0xb5/0x490 [ 478.292955] [ 478.292957] which lock already depends on the new lock. [ 478.292958] [ 478.292960] [ 478.292962] the existing dependency chain (in reverse order) is: [ 478.292963] [ 478.292965] -> #5 (&obj_hash[i].lock){-.-.}: [ 478.292972] debug_object_activate+0x12f/0x450 [ 478.292974] enqueue_hrtimer+0x27/0x3d0 [ 478.292976] hrtimer_start_range_ns+0x70a/0xd60 [ 478.292979] watchdog_enable+0x13b/0x1f0 [ 478.292981] softlockup_start_fn+0x11/0x20 [ 478.292983] smp_call_on_cpu_callback+0xde/0x1f0 [ 478.292985] process_one_work+0x864/0x1570 [ 478.292987] worker_thread+0x64c/0x1130 [ 478.292989] kthread+0x33f/0x460 [ 478.292991] ret_from_fork+0x24/0x30 [ 478.292992] [ 478.292994] -> #4 (hrtimer_bases.lock){-.-.}: [ 478.293001] hrtimer_start_range_ns+0xe6/0xd60 [ 478.293003] enqueue_task_rt+0x5a4/0xea0 [ 478.293006] __sched_setscheduler.constprop.0+0xd9c/0x20a0 [ 478.293008] do_sched_setscheduler+0x155/0x290 [ 478.293011] __x64_sys_sched_setscheduler+0x73/0xb0 [ 478.293013] do_syscall_64+0xf9/0x620 [ 478.293015] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 478.293016] [ 478.293017] -> #3 (&rt_b->rt_runtime_lock){-.-.}: [ 478.293025] rq_online_rt+0xaf/0x390 [ 478.293027] set_rq_online.part.0+0xe0/0x130 [ 478.293029] sched_cpu_activate+0x173/0x280 [ 478.293031] cpuhp_invoke_callback+0x201/0x1b80 [ 478.293033] cpuhp_thread_fun+0x467/0x850 [ 478.293036] smpboot_thread_fn+0x655/0x9e0 [ 478.293038] kthread+0x33f/0x460 [ 478.293040] ret_from_fork+0x24/0x30 [ 478.293041] [ 478.293042] -> #2 (&rq->lock){-.-.}: [ 478.293049] task_fork_fair+0x6a/0x4c0 [ 478.293051] sched_fork+0x3d5/0xb70 [ 478.293053] copy_process.part.0+0x1884/0x8260 [ 478.293055] _do_fork+0x22f/0xf30 [ 478.293057] kernel_thread+0x2f/0x40 [ 478.293059] rest_init+0x1f/0x323 [ 478.293061] start_kernel+0x8d6/0x911 [ 478.293063] secondary_startup_64+0xa4/0xb0 [ 478.293064] [ 478.293065] -> #1 (&p->pi_lock){-.-.}: [ 478.293072] try_to_wake_up+0x7b/0x1050 [ 478.293074] up+0x75/0xb0 [ 478.293076] __up_console_sem+0xb3/0x1c0 [ 478.293078] console_unlock+0x633/0x1110 [ 478.293080] vt_ioctl+0x1898/0x2380 [ 478.293082] tty_ioctl+0x5b0/0x1630 [ 478.293084] do_vfs_ioctl+0xcdb/0x12e0 [ 478.293086] ksys_ioctl+0x9b/0xc0 [ 478.293088] __x64_sys_ioctl+0x6f/0xb0 [ 478.293090] do_syscall_64+0xf9/0x620 [ 478.293093] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 478.293094] [ 478.293095] -> #0 ((console_sem).lock){-...}: [ 478.293102] _raw_spin_lock_irqsave+0x8c/0xc0 [ 478.293104] down_trylock+0xe/0x60 [ 478.293107] __down_trylock_console_sem+0xa3/0x210 [ 478.293109] vprintk_emit+0x283/0x740 [ 478.293111] vprintk_func+0x79/0x180 [ 478.293112] printk+0xba/0xed [ 478.293115] __warn_printk+0x9b/0xf3 [ 478.293118] debug_print_object+0x160/0x250 [ 478.293121] debug_check_no_obj_freed+0x271/0x490 [ 478.293123] kfree+0xb9/0x210 [ 478.293125] bcm_release+0x260/0x950 [ 478.293127] __sock_release+0xcd/0x2a0 [ 478.293129] sock_close+0x15/0x20 [ 478.293131] __fput+0x2ce/0x890 [ 478.293133] task_work_run+0x148/0x1c0 [ 478.293135] do_exit+0xbf3/0x2be0 [ 478.293137] do_group_exit+0x125/0x310 [ 478.293139] get_signal+0x3f2/0x1f70 [ 478.293141] do_signal+0x8f/0x1670 [ 478.293143] exit_to_usermode_loop+0x204/0x2a0 [ 478.293145] do_syscall_64+0x538/0x620 [ 478.293148] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 478.293149] [ 478.293151] other info that might help us debug this: [ 478.293153] [ 478.293154] Chain exists of: [ 478.293155] (console_sem).lock --> hrtimer_bases.lock --> &obj_hash[i].lock [ 478.293165] [ 478.293167] Possible unsafe locking scenario: [ 478.293168] [ 478.293170] CPU0 CPU1 [ 478.293172] ---- ---- [ 478.293173] lock(&obj_hash[i].lock); [ 478.293178] lock(hrtimer_bases.lock); [ 478.293183] lock(&obj_hash[i].lock); [ 478.293187] lock((console_sem).lock); [ 478.293191] [ 478.293193] *** DEADLOCK *** [ 478.293194] [ 478.293196] 3 locks held by syz-executor.0/2802: [ 478.293197] #0: 0000000012d2ba2c (&sb->s_type->i_mutex_key#13){+.+.}, at: __sock_release+0x86/0x2a0 [ 478.293207] #1: 0000000074781b1a (sk_lock-AF_CAN){+.+.}, at: bcm_release+0x1ff/0x950 [ 478.293216] #2: 000000009e9dde43 (&obj_hash[i].lock){-.-.}, at: debug_check_no_obj_freed+0xb5/0x490 [ 478.293225] [ 478.293226] stack backtrace: [ 478.293230] CPU: 0 PID: 2802 Comm: syz-executor.0 Not tainted 4.19.211-syzkaller #0 [ 478.293234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 478.293235] Call Trace: [ 478.293237] dump_stack+0x1fc/0x2ef [ 478.293240] print_circular_bug.constprop.0.cold+0x2d7/0x41e [ 478.293242] __lock_acquire+0x30c9/0x3ff0 [ 478.293244] ? format_decode+0x230/0xad0 [ 478.293247] ? mark_held_locks+0xf0/0xf0 [ 478.293249] ? enable_ptr_key_workfn+0x30/0x30 [ 478.293251] ? get_reg+0x176/0x1f0 [ 478.293253] ? memcpy+0x35/0x50 [ 478.293255] ? kvm_sched_clock_read+0x14/0x40 [ 478.293257] ? sched_clock+0x2a/0x40 [ 478.293259] ? sched_clock_cpu+0x18/0x1b0 [ 478.293261] lock_acquire+0x170/0x3c0 [ 478.293263] ? down_trylock+0xe/0x60 [ 478.293265] ? vprintk_func+0x79/0x180 [ 478.293267] _raw_spin_lock_irqsave+0x8c/0xc0 [ 478.293269] ? down_trylock+0xe/0x60 [ 478.293271] down_trylock+0xe/0x60 [ 478.293273] ? vprintk_func+0x79/0x180 [ 478.293275] ? vprintk_func+0x79/0x180 [ 478.293278] __down_trylock_console_sem+0xa3/0x210 [ 478.293280] vprintk_emit+0x283/0x740 [ 478.293282] ? ktime_add_safe+0x70/0x70 [ 478.293284] vprintk_func+0x79/0x180 [ 478.293286] printk+0xba/0xed [ 478.293288] ? log_store.cold+0x16/0x16 [ 478.293289] ? kfree+0xcc/0x210 [ 478.293291] ? sock_close+0x15/0x20 [ 478.293293] ? __fput+0x2ce/0x890 [ 478.293296] ? task_work_run+0x148/0x1c0 [ 478.293297] ? do_exit+0xbf3/0x2be0 [ 478.293300] ? do_group_exit+0x125/0x310 [ 478.293302] ? get_signal+0x3f2/0x1f70 [ 478.293304] ? do_signal+0x8f/0x1670 [ 478.293306] ? exit_to_usermode_loop+0x204/0x2a0 [ 478.293308] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 478.293311] ? __warn_printk+0x8f/0xf3 [ 478.293313] ? bcm_recvmsg+0x410/0x410 [ 478.293315] __warn_printk+0x9b/0xf3 [ 478.293317] ? add_taint.cold+0x16/0x16 [ 478.293319] ? lock_downgrade+0x720/0x720 [ 478.293321] ? lock_acquire+0x170/0x3c0 [ 478.293323] ? __free_object+0x17/0x1e0 [ 478.293325] ? bcm_recvmsg+0x410/0x410 [ 478.293327] debug_print_object+0x160/0x250 [ 478.293329] ? __free_object+0xdd/0x1e0 [ 478.293331] debug_check_no_obj_freed+0x271/0x490 [ 478.293333] kfree+0xb9/0x210 [ 478.293335] bcm_release+0x260/0x950 [ 478.293337] __sock_release+0xcd/0x2a0 [ 478.293339] ? __sock_release+0x2a0/0x2a0 [ 478.293341] sock_close+0x15/0x20 [ 478.293343] __fput+0x2ce/0x890 [ 478.293345] task_work_run+0x148/0x1c0 [ 478.293347] do_exit+0xbf3/0x2be0 [ 478.293350] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 478.293352] ? rcu_nmi_exit+0xb3/0x180 [ 478.293354] ? mm_update_next_owner+0x650/0x650 [ 478.293356] ? retint_kernel+0x2d/0x2d [ 478.293358] ? do_group_exit+0x118/0x310 [ 478.293360] do_group_exit+0x125/0x310 [ 478.293362] get_signal+0x3f2/0x1f70 [ 478.293364] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 478.293367] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 478.293369] do_signal+0x8f/0x1670 [ 478.293371] ? setup_sigcontext+0x820/0x820 [ 478.293373] ? fput+0x2b/0x190 [ 478.293375] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 478.293377] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 478.293380] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 478.293382] ? rcu_nmi_exit+0xb3/0x180 [ 478.293398] ? retint_kernel+0x2d/0x2d [ 478.293400] exit_to_usermode_loop+0x204/0x2a0 [ 478.293402] do_syscall_64+0x538/0x620 [ 478.293405] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 478.293407] RIP: 0033:0x7f0c9056d0d9 [ 478.293409] Code: Bad RIP value. [ 478.293411] RSP: 002b:00007f0c8eadf168 EFLAGS: 00000246 ORIG_RAX: 000000000000002b [ 478.293417] RAX: ffffffffffffffa1 RBX: 00007f0c9068cf80 RCX: 00007f0c9056d0d9 [ 478.293420] RDX: 0000000020000080 RSI: 0000000020000140 RDI: 0000000000000005 [ 478.293423] RBP: 00007f0c905c8ae9 R08: 0000000000000000 R09: 0000000000000000 [ 478.293426] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 478.293429] R13: 00007ffe08a3e84f R14: 00007f0c8eadf300 R15: 0000000000022000 [ 479.394387] Shutting down cpus with NMI [ 480.269230] Kernel Offset: disabled [ 480.272936] Rebooting in 86400 seconds..