syzkaller login: [ 44.090766] sshd (243) used greatest stack depth: 24768 bytes left Warning: Permanently added '[localhost]:29895' (ECDSA) to the list of known hosts. 2022/09/15 11:22:33 fuzzer started 2022/09/15 11:22:34 dialing manager at localhost:36559 [ 46.816618] cgroup: Unknown subsys name 'net' [ 46.908859] cgroup: Unknown subsys name 'rlimit' 2022/09/15 11:22:47 syscalls: 2215 2022/09/15 11:22:47 code coverage: enabled 2022/09/15 11:22:47 comparison tracing: enabled 2022/09/15 11:22:47 extra coverage: enabled 2022/09/15 11:22:47 setuid sandbox: enabled 2022/09/15 11:22:47 namespace sandbox: enabled 2022/09/15 11:22:47 Android sandbox: enabled 2022/09/15 11:22:47 fault injection: enabled 2022/09/15 11:22:47 leak checking: enabled 2022/09/15 11:22:47 net packet injection: enabled 2022/09/15 11:22:47 net device setup: enabled 2022/09/15 11:22:47 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/09/15 11:22:47 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/09/15 11:22:47 USB emulation: enabled 2022/09/15 11:22:47 hci packet injection: enabled 2022/09/15 11:22:47 wifi device emulation: failed to parse kernel version (6.0.0-rc5-next-20220915) 2022/09/15 11:22:47 802.15.4 emulation: enabled 2022/09/15 11:22:47 fetching corpus: 0, signal 0/2000 (executing program) 2022/09/15 11:22:48 fetching corpus: 49, signal 32352/35373 (executing program) 2022/09/15 11:22:48 fetching corpus: 99, signal 41823/45925 (executing program) 2022/09/15 11:22:48 fetching corpus: 149, signal 53201/58026 (executing program) 2022/09/15 11:22:48 fetching corpus: 199, signal 61264/66828 (executing program) 2022/09/15 11:22:48 fetching corpus: 249, signal 67927/74068 (executing program) 2022/09/15 11:22:48 fetching corpus: 299, signal 71844/78614 (executing program) 2022/09/15 11:22:49 fetching corpus: 349, signal 79520/86415 (executing program) 2022/09/15 11:22:49 fetching corpus: 399, signal 83547/90840 (executing program) 2022/09/15 11:22:49 fetching corpus: 449, signal 86898/94550 (executing program) 2022/09/15 11:22:49 fetching corpus: 499, signal 91320/98985 (executing program) 2022/09/15 11:22:49 fetching corpus: 549, signal 94361/102205 (executing program) 2022/09/15 11:22:49 fetching corpus: 599, signal 97029/105052 (executing program) 2022/09/15 11:22:50 fetching corpus: 649, signal 98892/107219 (executing program) 2022/09/15 11:22:50 fetching corpus: 699, signal 102401/110648 (executing program) 2022/09/15 11:22:50 fetching corpus: 749, signal 104510/112812 (executing program) 2022/09/15 11:22:50 fetching corpus: 799, signal 106767/115166 (executing program) 2022/09/15 11:22:50 fetching corpus: 849, signal 109577/117793 (executing program) 2022/09/15 11:22:50 fetching corpus: 899, signal 112509/120342 (executing program) 2022/09/15 11:22:51 fetching corpus: 949, signal 115931/123297 (executing program) 2022/09/15 11:22:51 fetching corpus: 999, signal 118411/125479 (executing program) 2022/09/15 11:22:51 fetching corpus: 1049, signal 120647/127362 (executing program) 2022/09/15 11:22:51 fetching corpus: 1099, signal 123206/129379 (executing program) 2022/09/15 11:22:51 fetching corpus: 1149, signal 125179/130891 (executing program) 2022/09/15 11:22:51 fetching corpus: 1199, signal 127982/133000 (executing program) 2022/09/15 11:22:51 fetching corpus: 1249, signal 130181/134620 (executing program) 2022/09/15 11:22:52 fetching corpus: 1299, signal 132453/136202 (executing program) 2022/09/15 11:22:52 fetching corpus: 1349, signal 134549/137691 (executing program) 2022/09/15 11:22:52 fetching corpus: 1399, signal 135582/138425 (executing program) 2022/09/15 11:22:52 fetching corpus: 1426, signal 136713/139217 (executing program) 2022/09/15 11:22:52 fetching corpus: 1426, signal 136713/139310 (executing program) 2022/09/15 11:22:52 fetching corpus: 1426, signal 136713/139379 (executing program) 2022/09/15 11:22:52 fetching corpus: 1426, signal 136713/139471 (executing program) 2022/09/15 11:22:52 fetching corpus: 1426, signal 136713/139527 (executing program) 2022/09/15 11:22:52 fetching corpus: 1426, signal 136713/139598 (executing program) 2022/09/15 11:22:52 fetching corpus: 1426, signal 136713/139677 (executing program) 2022/09/15 11:22:52 fetching corpus: 1426, signal 136713/139766 (executing program) 2022/09/15 11:22:52 fetching corpus: 1426, signal 136713/139852 (executing program) 2022/09/15 11:22:52 fetching corpus: 1426, signal 136713/139939 (executing program) 2022/09/15 11:22:52 fetching corpus: 1426, signal 136713/140006 (executing program) 2022/09/15 11:22:52 fetching corpus: 1426, signal 136713/140090 (executing program) 2022/09/15 11:22:52 fetching corpus: 1426, signal 136713/140178 (executing program) 2022/09/15 11:22:52 fetching corpus: 1426, signal 136713/140264 (executing program) 2022/09/15 11:22:52 fetching corpus: 1426, signal 136713/140331 (executing program) 2022/09/15 11:22:52 fetching corpus: 1426, signal 136713/140419 (executing program) 2022/09/15 11:22:52 fetching corpus: 1426, signal 136713/140506 (executing program) 2022/09/15 11:22:52 fetching corpus: 1426, signal 136713/140583 (executing program) 2022/09/15 11:22:52 fetching corpus: 1426, signal 136713/140664 (executing program) 2022/09/15 11:22:52 fetching corpus: 1426, signal 136713/140749 (executing program) 2022/09/15 11:22:52 fetching corpus: 1426, signal 136713/140825 (executing program) 2022/09/15 11:22:52 fetching corpus: 1426, signal 136713/140919 (executing program) 2022/09/15 11:22:52 fetching corpus: 1426, signal 136713/140992 (executing program) 2022/09/15 11:22:52 fetching corpus: 1426, signal 136713/141084 (executing program) 2022/09/15 11:22:52 fetching corpus: 1426, signal 136713/141161 (executing program) 2022/09/15 11:22:52 fetching corpus: 1426, signal 136713/141233 (executing program) 2022/09/15 11:22:52 fetching corpus: 1426, signal 136713/141305 (executing program) 2022/09/15 11:22:52 fetching corpus: 1426, signal 136713/141385 (executing program) 2022/09/15 11:22:52 fetching corpus: 1426, signal 136713/141457 (executing program) 2022/09/15 11:22:52 fetching corpus: 1426, signal 136713/141554 (executing program) 2022/09/15 11:22:52 fetching corpus: 1426, signal 136713/141627 (executing program) 2022/09/15 11:22:52 fetching corpus: 1426, signal 136713/141716 (executing program) 2022/09/15 11:22:52 fetching corpus: 1426, signal 136713/141811 (executing program) 2022/09/15 11:22:52 fetching corpus: 1426, signal 136713/141885 (executing program) 2022/09/15 11:22:52 fetching corpus: 1426, signal 136713/141972 (executing program) 2022/09/15 11:22:52 fetching corpus: 1426, signal 136713/142055 (executing program) 2022/09/15 11:22:52 fetching corpus: 1426, signal 136713/142286 (executing program) 2022/09/15 11:22:52 fetching corpus: 1426, signal 136713/142384 (executing program) 2022/09/15 11:22:52 fetching corpus: 1426, signal 136713/142620 (executing program) 2022/09/15 11:22:52 fetching corpus: 1426, signal 136713/142674 (executing program) 2022/09/15 11:22:52 fetching corpus: 1426, signal 136713/142674 (executing program) 2022/09/15 11:22:54 starting 8 fuzzer processes 11:22:54 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x1, &(0x7f0000000c40)=[{0x0}], 0x0, &(0x7f0000000d00)) 11:22:54 executing program 1: mknod(&(0x7f0000008d80)='./file0\x00', 0x1000, 0x0) acct(&(0x7f0000000000)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 11:22:54 executing program 2: request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='\x00', 0xfffffffffffffffb) 11:22:54 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0xe, &(0x7f00000007c0)="af1a4555", 0x4) 11:22:54 executing program 7: perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x303c2, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x1c3c00, 0x0) ioctl$CDROM_DISC_STATUS(r0, 0x5311) 11:22:54 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) 11:22:54 executing program 4: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000040), 0x40, 0x0) [ 66.446540] audit: type=1400 audit(1663240974.404:6): avc: denied { execmem } for pid=287 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 11:22:54 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) [ 67.685130] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 67.688599] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 67.690160] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 67.703974] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 67.706115] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 67.708032] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 67.714176] Bluetooth: hci0: HCI_REQ-0x0c1a [ 67.748734] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 67.758497] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 67.760434] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 67.772532] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 67.774041] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 67.776100] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 67.777887] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 67.779388] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 67.780776] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 67.783946] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 67.785243] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 67.786780] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 67.788573] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 67.791412] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 67.793165] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 67.797378] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 67.798570] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 67.800257] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 67.801582] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 67.803783] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 67.805505] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 67.807419] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 67.808860] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 67.813311] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 67.815169] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 67.818695] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 67.820611] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 67.822168] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 67.823556] Bluetooth: hci1: HCI_REQ-0x0c1a [ 67.830568] Bluetooth: hci3: HCI_REQ-0x0c1a [ 67.840023] Bluetooth: hci4: HCI_REQ-0x0c1a [ 67.853918] Bluetooth: hci5: HCI_REQ-0x0c1a [ 67.872554] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 67.874390] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 67.878797] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 67.880394] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 67.887509] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 67.889776] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 67.892667] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 67.897844] Bluetooth: hci6: HCI_REQ-0x0c1a [ 67.905104] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 67.912759] Bluetooth: hci2: HCI_REQ-0x0c1a [ 67.954978] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 67.957145] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 67.958907] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 67.962528] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 67.981116] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 67.988095] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 67.993416] Bluetooth: hci7: HCI_REQ-0x0c1a [ 69.773745] Bluetooth: hci0: command 0x0409 tx timeout [ 69.837297] Bluetooth: hci3: command 0x0409 tx timeout [ 69.901247] Bluetooth: hci5: command 0x0409 tx timeout [ 69.901703] Bluetooth: hci4: command 0x0409 tx timeout [ 69.902109] Bluetooth: hci1: command 0x0409 tx timeout [ 69.965240] Bluetooth: hci2: command 0x0409 tx timeout [ 69.965957] Bluetooth: hci6: command 0x0409 tx timeout [ 70.028411] Bluetooth: hci7: command 0x0409 tx timeout [ 71.820320] Bluetooth: hci0: command 0x041b tx timeout [ 71.884248] Bluetooth: hci3: command 0x041b tx timeout [ 71.948277] Bluetooth: hci1: command 0x041b tx timeout [ 71.948781] Bluetooth: hci4: command 0x041b tx timeout [ 71.949394] Bluetooth: hci5: command 0x041b tx timeout [ 72.012244] Bluetooth: hci6: command 0x041b tx timeout [ 72.012752] Bluetooth: hci2: command 0x041b tx timeout [ 72.076767] Bluetooth: hci7: command 0x041b tx timeout [ 73.868518] Bluetooth: hci0: command 0x040f tx timeout [ 73.932249] Bluetooth: hci3: command 0x040f tx timeout [ 73.996796] Bluetooth: hci5: command 0x040f tx timeout [ 73.997478] Bluetooth: hci4: command 0x040f tx timeout [ 73.997908] Bluetooth: hci1: command 0x040f tx timeout [ 74.060344] Bluetooth: hci2: command 0x040f tx timeout [ 74.060831] Bluetooth: hci6: command 0x040f tx timeout [ 74.124287] Bluetooth: hci7: command 0x040f tx timeout [ 75.916603] Bluetooth: hci0: command 0x0419 tx timeout [ 75.980302] Bluetooth: hci3: command 0x0419 tx timeout [ 76.044312] Bluetooth: hci1: command 0x0419 tx timeout [ 76.046464] Bluetooth: hci4: command 0x0419 tx timeout [ 76.047378] Bluetooth: hci5: command 0x0419 tx timeout [ 76.108317] Bluetooth: hci6: command 0x0419 tx timeout [ 76.109533] Bluetooth: hci2: command 0x0419 tx timeout [ 76.172403] Bluetooth: hci7: command 0x0419 tx timeout 11:23:50 executing program 1: mknod(&(0x7f0000008d80)='./file0\x00', 0x1000, 0x0) acct(&(0x7f0000000000)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 11:23:50 executing program 1: mknod(&(0x7f0000008d80)='./file0\x00', 0x1000, 0x0) acct(&(0x7f0000000000)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 11:23:50 executing program 1: mknod(&(0x7f0000008d80)='./file0\x00', 0x1000, 0x0) acct(&(0x7f0000000000)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 11:23:50 executing program 1: mknod(&(0x7f0000008d80)='./file0\x00', 0x1000, 0x0) acct(&(0x7f0000000000)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 11:23:51 executing program 1: mknod(&(0x7f0000008d80)='./file0\x00', 0x1000, 0x0) acct(&(0x7f0000000000)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 11:23:51 executing program 1: mknod(&(0x7f0000008d80)='./file0\x00', 0x1000, 0x0) acct(&(0x7f0000000000)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 11:23:51 executing program 1: mknod(&(0x7f0000008d80)='./file0\x00', 0x1000, 0x0) acct(&(0x7f0000000000)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 11:23:51 executing program 1: mknod(&(0x7f0000008d80)='./file0\x00', 0x1000, 0x0) acct(&(0x7f0000000000)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 125.343038] audit: type=1400 audit(1663241033.301:7): avc: denied { open } for pid=3836 comm="syz-executor.7" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 125.349569] audit: type=1400 audit(1663241033.301:8): avc: denied { kernel } for pid=3836 comm="syz-executor.7" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 127.059277] syz-executor.5 (302) used greatest stack depth: 24608 bytes left [ 129.382007] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 129.384836] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 129.387353] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 129.394394] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 129.396703] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 129.398649] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 129.403476] Bluetooth: hci5: HCI_REQ-0x0c1a [ 129.466974] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 129.470888] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 129.471783] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 129.477353] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 129.479734] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 129.480908] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 129.488678] Bluetooth: hci7: HCI_REQ-0x0c1a [ 131.341247] Bluetooth: hci2: Opcode 0x c03 failed: -110 [ 131.404252] Bluetooth: hci3: Opcode 0x c03 failed: -110 [ 131.405257] Bluetooth: hci4: Opcode 0x c03 failed: -110 [ 131.468281] Bluetooth: hci6: Opcode 0x c03 failed: -110 [ 131.469511] Bluetooth: hci5: command 0x0409 tx timeout [ 131.532244] Bluetooth: hci7: command 0x0409 tx timeout [ 133.516303] Bluetooth: hci5: command 0x041b tx timeout [ 133.580229] Bluetooth: hci7: command 0x041b tx timeout [ 133.780072] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 133.781922] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 133.783966] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 133.786439] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 133.787521] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 133.788322] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 133.791736] Bluetooth: hci3: HCI_REQ-0x0c1a [ 133.856878] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 133.863352] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 133.864568] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 133.866444] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 133.872336] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 133.873031] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 133.876070] Bluetooth: hci4: HCI_REQ-0x0c1a [ 135.564419] Bluetooth: hci5: command 0x040f tx timeout [ 135.628228] Bluetooth: hci7: command 0x040f tx timeout [ 135.693282] Bluetooth: hci2: Opcode 0x c03 failed: -110 [ 135.821290] Bluetooth: hci3: command 0x0409 tx timeout [ 135.884271] Bluetooth: hci4: command 0x0409 tx timeout [ 135.948246] Bluetooth: hci6: Opcode 0x c03 failed: -110 [ 137.612280] Bluetooth: hci5: command 0x0419 tx timeout [ 137.676297] Bluetooth: hci7: command 0x0419 tx timeout [ 137.868289] Bluetooth: hci3: command 0x041b tx timeout [ 137.932273] Bluetooth: hci4: command 0x041b tx timeout [ 138.064886] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 138.066141] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 138.067635] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 138.070857] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 138.073108] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 138.074142] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 138.078344] Bluetooth: hci2: HCI_REQ-0x0c1a [ 138.399960] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 138.401773] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 138.403770] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 138.408019] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 138.408998] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 138.410604] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 138.414256] Bluetooth: hci6: HCI_REQ-0x0c1a [ 139.916374] Bluetooth: hci3: command 0x040f tx timeout [ 139.980323] Bluetooth: hci4: command 0x040f tx timeout [ 140.109262] Bluetooth: hci2: command 0x0409 tx timeout [ 140.429296] Bluetooth: hci6: command 0x0409 tx timeout [ 141.964299] Bluetooth: hci3: command 0x0419 tx timeout [ 142.029247] Bluetooth: hci4: command 0x0419 tx timeout [ 142.157261] Bluetooth: hci2: command 0x041b tx timeout [ 142.477281] Bluetooth: hci6: command 0x041b tx timeout [ 144.204339] Bluetooth: hci2: command 0x040f tx timeout [ 144.524331] Bluetooth: hci6: command 0x040f tx timeout [ 146.253235] Bluetooth: hci2: command 0x0419 tx timeout [ 146.573372] Bluetooth: hci6: command 0x0419 tx timeout [ 171.520228] FAT-fs (loop0): bogus number of reserved sectors [ 171.520755] FAT-fs (loop0): Can't find a valid FAT filesystem [ 171.536696] FAT-fs (loop0): bogus number of reserved sectors [ 171.537140] FAT-fs (loop0): Can't find a valid FAT filesystem [ 175.872591] ------------[ cut here ]------------ [ 175.872618] [ 175.872622] ====================================================== [ 175.872625] WARNING: possible circular locking dependency detected [ 175.872630] 6.0.0-rc5-next-20220915 #1 Not tainted [ 175.872638] ------------------------------------------------------ [ 175.872641] syz-executor.5/6464 is trying to acquire lock: [ 175.872648] ffffffff853fa878 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 175.872686] [ 175.872686] but task is already holding lock: [ 175.872688] ffff888008d3fc20 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 175.872716] [ 175.872716] which lock already depends on the new lock. [ 175.872716] [ 175.872719] [ 175.872719] the existing dependency chain (in reverse order) is: [ 175.872722] [ 175.872722] -> #3 (&ctx->lock){....}-{2:2}: [ 175.872736] _raw_spin_lock+0x2a/0x40 [ 175.872754] __perf_event_task_sched_out+0x53b/0x18d0 [ 175.872766] __schedule+0xedd/0x2470 [ 175.872777] schedule+0xda/0x1b0 [ 175.872787] exit_to_user_mode_prepare+0x114/0x1a0 [ 175.872807] syscall_exit_to_user_mode+0x19/0x40 [ 175.872825] do_syscall_64+0x48/0x90 [ 175.872839] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 175.872857] [ 175.872857] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 175.872870] _raw_spin_lock_nested+0x30/0x40 [ 175.872886] raw_spin_rq_lock_nested+0x1e/0x30 [ 175.872898] task_fork_fair+0x63/0x4d0 [ 175.872915] sched_cgroup_fork+0x3d0/0x540 [ 175.872929] copy_process+0x4183/0x6e20 [ 175.872939] kernel_clone+0xe7/0x890 [ 175.872949] user_mode_thread+0xad/0xf0 [ 175.872959] rest_init+0x24/0x250 [ 175.872976] arch_call_rest_init+0xf/0x14 [ 175.872988] start_kernel+0x4c1/0x4e6 [ 175.872998] secondary_startup_64_no_verify+0xe0/0xeb [ 175.873012] [ 175.873012] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 175.873026] _raw_spin_lock_irqsave+0x39/0x60 [ 175.873041] try_to_wake_up+0xab/0x1920 [ 175.873055] up+0x75/0xb0 [ 175.873066] __up_console_sem+0x6e/0x80 [ 175.873082] console_unlock+0x46a/0x590 [ 175.873098] vt_ioctl+0x2822/0x2ca0 [ 175.873111] tty_ioctl+0x7c4/0x1700 [ 175.873122] __x64_sys_ioctl+0x19a/0x210 [ 175.873138] do_syscall_64+0x3b/0x90 [ 175.873152] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 175.873169] [ 175.873169] -> #0 ((console_sem).lock){....}-{2:2}: [ 175.873185] __lock_acquire+0x2a02/0x5e70 [ 175.873202] lock_acquire+0x1a2/0x530 [ 175.873218] _raw_spin_lock_irqsave+0x39/0x60 [ 175.873234] down_trylock+0xe/0x70 [ 175.873246] __down_trylock_console_sem+0x3b/0xd0 [ 175.873262] vprintk_emit+0x16b/0x560 [ 175.873279] vprintk+0x84/0xa0 [ 175.873295] _printk+0xba/0xf1 [ 175.873314] report_bug.cold+0x72/0xab [ 175.873327] handle_bug+0x3c/0x70 [ 175.873340] exc_invalid_op+0x14/0x50 [ 175.873354] asm_exc_invalid_op+0x16/0x20 [ 175.873370] group_sched_out.part.0+0x2c7/0x460 [ 175.873381] ctx_sched_out+0x8f1/0xc10 [ 175.873391] __perf_event_task_sched_out+0x6d0/0x18d0 [ 175.873403] __schedule+0xedd/0x2470 [ 175.873413] schedule+0xda/0x1b0 [ 175.873423] futex_wait_queue+0xf5/0x1e0 [ 175.873433] futex_wait+0x28e/0x690 [ 175.873443] do_futex+0x2ff/0x380 [ 175.873452] __x64_sys_futex+0x1c6/0x4d0 [ 175.873462] do_syscall_64+0x3b/0x90 [ 175.873475] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 175.873493] [ 175.873493] other info that might help us debug this: [ 175.873493] [ 175.873496] Chain exists of: [ 175.873496] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 175.873496] [ 175.873510] Possible unsafe locking scenario: [ 175.873510] [ 175.873513] CPU0 CPU1 [ 175.873515] ---- ---- [ 175.873517] lock(&ctx->lock); [ 175.873523] lock(&rq->__lock); [ 175.873534] lock(&ctx->lock); [ 175.873541] lock((console_sem).lock); [ 175.873546] [ 175.873546] *** DEADLOCK *** [ 175.873546] [ 175.873548] 2 locks held by syz-executor.5/6464: [ 175.873555] #0: ffff88806ce37cd8 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 175.873581] #1: ffff888008d3fc20 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 175.873608] [ 175.873608] stack backtrace: [ 175.873611] CPU: 0 PID: 6464 Comm: syz-executor.5 Not tainted 6.0.0-rc5-next-20220915 #1 [ 175.873623] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 175.873631] Call Trace: [ 175.873635] [ 175.873639] dump_stack_lvl+0x8b/0xb3 [ 175.873655] check_noncircular+0x263/0x2e0 [ 175.873672] ? format_decode+0x26c/0xb50 [ 175.873688] ? print_circular_bug+0x450/0x450 [ 175.873706] ? enable_ptr_key_workfn+0x20/0x20 [ 175.873722] ? format_decode+0x26c/0xb50 [ 175.873738] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 175.873757] __lock_acquire+0x2a02/0x5e70 [ 175.873781] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 175.873799] ? __mutex_add_waiter+0x120/0x120 [ 175.873818] lock_acquire+0x1a2/0x530 [ 175.873836] ? down_trylock+0xe/0x70 [ 175.873851] ? rcu_read_unlock+0x40/0x40 [ 175.873873] ? vprintk+0x84/0xa0 [ 175.873892] _raw_spin_lock_irqsave+0x39/0x60 [ 175.873908] ? down_trylock+0xe/0x70 [ 175.873922] down_trylock+0xe/0x70 [ 175.873936] ? vprintk+0x84/0xa0 [ 175.873953] __down_trylock_console_sem+0x3b/0xd0 [ 175.873971] vprintk_emit+0x16b/0x560 [ 175.873991] vprintk+0x84/0xa0 [ 175.874009] _printk+0xba/0xf1 [ 175.874028] ? record_print_text.cold+0x16/0x16 [ 175.874052] ? report_bug.cold+0x66/0xab [ 175.874067] ? group_sched_out.part.0+0x2c7/0x460 [ 175.874079] report_bug.cold+0x72/0xab [ 175.874095] handle_bug+0x3c/0x70 [ 175.874109] exc_invalid_op+0x14/0x50 [ 175.874124] asm_exc_invalid_op+0x16/0x20 [ 175.874143] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 175.874155] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 175.874167] RSP: 0018:ffff88803d5bf8f8 EFLAGS: 00010006 [ 175.874176] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 175.874183] RDX: ffff888018445040 RSI: ffffffff81566027 RDI: 0000000000000005 [ 175.874191] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001 [ 175.874198] R10: 0000000000000000 R11: ffffffff865ac01b R12: ffff888008d3fc00 [ 175.874206] R13: ffff88806ce3d100 R14: ffffffff8547c660 R15: 0000000000000002 [ 175.874218] ? group_sched_out.part.0+0x2c7/0x460 [ 175.874232] ? group_sched_out.part.0+0x2c7/0x460 [ 175.874245] ctx_sched_out+0x8f1/0xc10 [ 175.874258] __perf_event_task_sched_out+0x6d0/0x18d0 [ 175.874275] ? lock_is_held_type+0xd7/0x130 [ 175.874294] ? __perf_cgroup_move+0x160/0x160 [ 175.874306] ? set_next_entity+0x304/0x550 [ 175.874327] ? lock_is_held_type+0xd7/0x130 [ 175.874347] __schedule+0xedd/0x2470 [ 175.874362] ? io_schedule_timeout+0x150/0x150 [ 175.874374] ? futex_wait_setup+0x166/0x230 [ 175.874389] schedule+0xda/0x1b0 [ 175.874401] futex_wait_queue+0xf5/0x1e0 [ 175.874413] futex_wait+0x28e/0x690 [ 175.874426] ? futex_wait_setup+0x230/0x230 [ 175.874440] ? wake_up_q+0x8b/0xf0 [ 175.874453] ? do_raw_spin_unlock+0x4f/0x220 [ 175.874473] ? futex_wake+0x158/0x490 [ 175.874491] ? fd_install+0x1f9/0x640 [ 175.874508] do_futex+0x2ff/0x380 [ 175.874520] ? __ia32_compat_sys_get_robust_list+0x3b0/0x3b0 [ 175.874537] __x64_sys_futex+0x1c6/0x4d0 [ 175.874550] ? __x64_sys_futex_time32+0x480/0x480 [ 175.874563] ? syscall_enter_from_user_mode+0x1d/0x50 [ 175.874582] ? syscall_enter_from_user_mode+0x1d/0x50 [ 175.874604] do_syscall_64+0x3b/0x90 [ 175.874619] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 175.874637] RIP: 0033:0x7f4bf83a0b19 [ 175.874646] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 175.874657] RSP: 002b:00007f4bf5916218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 175.874667] RAX: ffffffffffffffda RBX: 00007f4bf84b3f68 RCX: 00007f4bf83a0b19 [ 175.874675] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f4bf84b3f68 [ 175.874682] RBP: 00007f4bf84b3f60 R08: 0000000000000000 R09: 0000000000000000 [ 175.874689] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4bf84b3f6c [ 175.874696] R13: 00007ffcc4524e3f R14: 00007f4bf5916300 R15: 0000000000022000 [ 175.874711] [ 175.933036] WARNING: CPU: 0 PID: 6464 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 175.933726] Modules linked in: [ 175.933965] CPU: 0 PID: 6464 Comm: syz-executor.5 Not tainted 6.0.0-rc5-next-20220915 #1 [ 175.934547] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 175.935355] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 175.935754] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 175.937066] RSP: 0018:ffff88803d5bf8f8 EFLAGS: 00010006 [ 175.937455] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 175.937983] RDX: ffff888018445040 RSI: ffffffff81566027 RDI: 0000000000000005 [ 175.938505] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001 [ 175.939019] R10: 0000000000000000 R11: ffffffff865ac01b R12: ffff888008d3fc00 [ 175.939532] R13: ffff88806ce3d100 R14: ffffffff8547c660 R15: 0000000000000002 [ 175.940044] FS: 00007f4bf5916700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 175.940625] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 175.941047] CR2: 000055a9bde5dd18 CR3: 000000000ffd2000 CR4: 0000000000350ef0 [ 175.941573] Call Trace: [ 175.941763] [ 175.941937] ctx_sched_out+0x8f1/0xc10 [ 175.942226] __perf_event_task_sched_out+0x6d0/0x18d0 [ 175.942612] ? lock_is_held_type+0xd7/0x130 [ 175.942939] ? __perf_cgroup_move+0x160/0x160 [ 175.943271] ? set_next_entity+0x304/0x550 [ 175.943591] ? lock_is_held_type+0xd7/0x130 [ 175.943912] __schedule+0xedd/0x2470 [ 175.944194] ? io_schedule_timeout+0x150/0x150 [ 175.944537] ? futex_wait_setup+0x166/0x230 [ 175.944857] schedule+0xda/0x1b0 [ 175.945113] futex_wait_queue+0xf5/0x1e0 [ 175.945420] futex_wait+0x28e/0x690 [ 175.945712] ? futex_wait_setup+0x230/0x230 [ 175.946039] ? wake_up_q+0x8b/0xf0 [ 175.946308] ? do_raw_spin_unlock+0x4f/0x220 [ 175.946640] ? futex_wake+0x158/0x490 [ 175.946935] ? fd_install+0x1f9/0x640 [ 175.947224] do_futex+0x2ff/0x380 [ 175.947487] ? __ia32_compat_sys_get_robust_list+0x3b0/0x3b0 [ 175.947918] __x64_sys_futex+0x1c6/0x4d0 [ 175.948225] ? __x64_sys_futex_time32+0x480/0x480 [ 175.948584] ? syscall_enter_from_user_mode+0x1d/0x50 [ 175.948969] ? syscall_enter_from_user_mode+0x1d/0x50 [ 175.949359] do_syscall_64+0x3b/0x90 [ 175.949651] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 175.950038] RIP: 0033:0x7f4bf83a0b19 [ 175.950313] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 175.951632] RSP: 002b:00007f4bf5916218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 175.952189] RAX: ffffffffffffffda RBX: 00007f4bf84b3f68 RCX: 00007f4bf83a0b19 [ 175.952717] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f4bf84b3f68 [ 175.953231] RBP: 00007f4bf84b3f60 R08: 0000000000000000 R09: 0000000000000000 [ 175.953760] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4bf84b3f6c [ 175.954273] R13: 00007ffcc4524e3f R14: 00007f4bf5916300 R15: 0000000000022000 [ 175.954801] [ 175.954980] irq event stamp: 310 [ 175.955225] hardirqs last enabled at (309): [] syscall_enter_from_user_mode+0x1d/0x50 [ 175.955920] hardirqs last disabled at (310): [] __schedule+0x1225/0x2470 [ 175.956522] softirqs last enabled at (60): [] __irq_exit_rcu+0x11b/0x180 [ 175.957132] softirqs last disabled at (55): [] __irq_exit_rcu+0x11b/0x180 [ 175.957765] ---[ end trace 0000000000000000 ]--- 11:24:45 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x1, &(0x7f0000000c40)=[{0x0}], 0x0, &(0x7f0000000d00)) 11:24:45 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) 11:24:45 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) 11:24:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0xe, &(0x7f00000007c0)="af1a4555", 0x4) 11:24:45 executing program 4: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000040), 0x40, 0x0) 11:24:45 executing program 7: perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x303c2, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x1c3c00, 0x0) ioctl$CDROM_DISC_STATUS(r0, 0x5311) 11:24:45 executing program 2: request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='\x00', 0xfffffffffffffffb) 11:24:45 executing program 1: mknod(&(0x7f0000008d80)='./file0\x00', 0x1000, 0x0) acct(&(0x7f0000000000)='./file0\x00') openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) [ 177.929975] FAT-fs (loop0): bogus number of reserved sectors [ 177.930482] FAT-fs (loop0): Can't find a valid FAT filesystem 11:24:45 executing program 2: request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='\x00', 0xfffffffffffffffb) 11:24:45 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) 11:24:45 executing program 4: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000040), 0x40, 0x0) 11:24:45 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0xe, &(0x7f00000007c0)="af1a4555", 0x4) 11:24:45 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) 11:24:45 executing program 7: perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x303c2, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x1c3c00, 0x0) ioctl$CDROM_DISC_STATUS(r0, 0x5311) [ 178.099236] FAT-fs (loop0): bogus number of reserved sectors [ 178.099710] FAT-fs (loop0): Can't find a valid FAT filesystem 11:24:46 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x1, &(0x7f0000000c40)=[{0x0}], 0x0, &(0x7f0000000d00)) 11:24:46 executing program 6: r0 = syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, 0x0) 11:24:46 executing program 2: request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='\x00', 0xfffffffffffffffb) 11:24:46 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0xe, &(0x7f00000007c0)="af1a4555", 0x4) 11:24:46 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) 11:24:46 executing program 7: perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x303c2, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x1c3c00, 0x0) ioctl$CDROM_DISC_STATUS(r0, 0x5311) 11:24:46 executing program 1: perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x303c2, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x1c3c00, 0x0) ioctl$CDROM_DISC_STATUS(r0, 0x5311) 11:24:46 executing program 4: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000040), 0x40, 0x0) 11:24:46 executing program 0: syz_mount_image$vfat(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x1, &(0x7f0000000c40)=[{0x0}], 0x0, &(0x7f0000000d00)) 11:24:46 executing program 3: r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) mknodat$null(r1, &(0x7f0000000040)='./file0\x00', 0xffffc000, 0x103) 11:24:46 executing program 6: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x200800, 0x0) [ 178.213953] FAT-fs (loop0): bogus number of reserved sectors [ 178.215502] FAT-fs (loop0): Can't find a valid FAT filesystem 11:24:46 executing program 3: r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) mknodat$null(r1, &(0x7f0000000040)='./file0\x00', 0xffffc000, 0x103) 11:24:46 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x180000, 0x0) read$usbmon(r0, 0x0, 0x0) 11:24:46 executing program 5: openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15182, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x3, &(0x7f0000000700)=[0xee00, 0xee01, 0xffffffffffffffff]) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r0, 0x0, 0x22, &(0x7f0000000080)={@rand_addr, @remote}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffec9, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:24:46 executing program 6: socket$netlink(0x10, 0x3, 0x17) 11:24:46 executing program 1: perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x303c2, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x1c3c00, 0x0) ioctl$CDROM_DISC_STATUS(r0, 0x5311) 11:24:46 executing program 3: r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) mknodat$null(r1, &(0x7f0000000040)='./file0\x00', 0xffffc000, 0x103) 11:24:46 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001a00010212c91e1bbeb3f02a250800ff085e762ac65f7d91053f295d4ffc20d65892ef07d227fdbe18dbfb1af3e0dd6a380e71c4fcf7eb3843a0a27d26af18626c51db155af69e0000000000000000090000000000df63a36fd407eb99643bb3409a86448396cd1499fc9022822e14cf2d0493dedf4e77766175ac5c31d7d34cf901e24917654cb8d3c73e60c6c12f77588b00000000cb029fc621b6cee12eb8459bf1b75803ac062baa94cd7dfdf5af4315b56bc0b876e61fa3a5d8f3ac20a51e8f575c1d58f19000"/215], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) pwritev2(r1, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000200)={'vxcan1\x00', {0x2, 0x0, @remote}}) r2 = gettid() rt_sigqueueinfo(r2, 0x11, &(0x7f0000000000)={0x0, 0x0, 0xfffffffe}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f0000001fc0)=[{{&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000000c0)="2a4999f1ced3a04d3e945455e6cab8493379abc3d5c2d89b792050158475106b14ac9b07e08fb2384b519262b6", 0x2d}, {&(0x7f0000000140)="e9", 0x1}, {0x0}], 0x3, 0xfffffffffffffffc}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001f00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}], 0x40, 0x20040401}}], 0x2, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r4, 0x29, 0x6, 0x0, &(0x7f0000000140)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) 11:24:46 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x180000, 0x0) read$usbmon(r0, 0x0, 0x0) 11:24:46 executing program 1: perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x303c2, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x1c3c00, 0x0) ioctl$CDROM_DISC_STATUS(r0, 0x5311) 11:24:46 executing program 6: socket$netlink(0x10, 0x3, 0x17) 11:24:46 executing program 3: r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) mknodat$null(r1, &(0x7f0000000040)='./file0\x00', 0xffffc000, 0x103) 11:24:46 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001a00010212c91e1bbeb3f02a250800ff085e762ac65f7d91053f295d4ffc20d65892ef07d227fdbe18dbfb1af3e0dd6a380e71c4fcf7eb3843a0a27d26af18626c51db155af69e0000000000000000090000000000df63a36fd407eb99643bb3409a86448396cd1499fc9022822e14cf2d0493dedf4e77766175ac5c31d7d34cf901e24917654cb8d3c73e60c6c12f77588b00000000cb029fc621b6cee12eb8459bf1b75803ac062baa94cd7dfdf5af4315b56bc0b876e61fa3a5d8f3ac20a51e8f575c1d58f19000"/215], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) pwritev2(r1, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000200)={'vxcan1\x00', {0x2, 0x0, @remote}}) r2 = gettid() rt_sigqueueinfo(r2, 0x11, &(0x7f0000000000)={0x0, 0x0, 0xfffffffe}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f0000001fc0)=[{{&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000000c0)="2a4999f1ced3a04d3e945455e6cab8493379abc3d5c2d89b792050158475106b14ac9b07e08fb2384b519262b6", 0x2d}, {&(0x7f0000000140)="e9", 0x1}, {0x0}], 0x3, 0xfffffffffffffffc}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001f00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}], 0x40, 0x20040401}}], 0x2, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r4, 0x29, 0x6, 0x0, &(0x7f0000000140)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) [ 178.845198] hrtimer: interrupt took 16781 ns 11:24:47 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x180000, 0x0) read$usbmon(r0, 0x0, 0x0) 11:24:47 executing program 6: socket$netlink(0x10, 0x3, 0x17) 11:24:47 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001a00010212c91e1bbeb3f02a250800ff085e762ac65f7d91053f295d4ffc20d65892ef07d227fdbe18dbfb1af3e0dd6a380e71c4fcf7eb3843a0a27d26af18626c51db155af69e0000000000000000090000000000df63a36fd407eb99643bb3409a86448396cd1499fc9022822e14cf2d0493dedf4e77766175ac5c31d7d34cf901e24917654cb8d3c73e60c6c12f77588b00000000cb029fc621b6cee12eb8459bf1b75803ac062baa94cd7dfdf5af4315b56bc0b876e61fa3a5d8f3ac20a51e8f575c1d58f19000"/215], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) pwritev2(r1, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000200)={'vxcan1\x00', {0x2, 0x0, @remote}}) r2 = gettid() rt_sigqueueinfo(r2, 0x11, &(0x7f0000000000)={0x0, 0x0, 0xfffffffe}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f0000001fc0)=[{{&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000000c0)="2a4999f1ced3a04d3e945455e6cab8493379abc3d5c2d89b792050158475106b14ac9b07e08fb2384b519262b6", 0x2d}, {&(0x7f0000000140)="e9", 0x1}, {0x0}], 0x3, 0xfffffffffffffffc}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001f00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}], 0x40, 0x20040401}}], 0x2, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r4, 0x29, 0x6, 0x0, &(0x7f0000000140)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) 11:24:47 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001a00010212c91e1bbeb3f02a250800ff085e762ac65f7d91053f295d4ffc20d65892ef07d227fdbe18dbfb1af3e0dd6a380e71c4fcf7eb3843a0a27d26af18626c51db155af69e0000000000000000090000000000df63a36fd407eb99643bb3409a86448396cd1499fc9022822e14cf2d0493dedf4e77766175ac5c31d7d34cf901e24917654cb8d3c73e60c6c12f77588b00000000cb029fc621b6cee12eb8459bf1b75803ac062baa94cd7dfdf5af4315b56bc0b876e61fa3a5d8f3ac20a51e8f575c1d58f19000"/215], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) pwritev2(r1, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000200)={'vxcan1\x00', {0x2, 0x0, @remote}}) r2 = gettid() rt_sigqueueinfo(r2, 0x11, &(0x7f0000000000)={0x0, 0x0, 0xfffffffe}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f0000001fc0)=[{{&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000000c0)="2a4999f1ced3a04d3e945455e6cab8493379abc3d5c2d89b792050158475106b14ac9b07e08fb2384b519262b6", 0x2d}, {&(0x7f0000000140)="e9", 0x1}, {0x0}], 0x3, 0xfffffffffffffffc}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001f00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}], 0x40, 0x20040401}}], 0x2, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r4, 0x29, 0x6, 0x0, &(0x7f0000000140)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) 11:24:47 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001a00010212c91e1bbeb3f02a250800ff085e762ac65f7d91053f295d4ffc20d65892ef07d227fdbe18dbfb1af3e0dd6a380e71c4fcf7eb3843a0a27d26af18626c51db155af69e0000000000000000090000000000df63a36fd407eb99643bb3409a86448396cd1499fc9022822e14cf2d0493dedf4e77766175ac5c31d7d34cf901e24917654cb8d3c73e60c6c12f77588b00000000cb029fc621b6cee12eb8459bf1b75803ac062baa94cd7dfdf5af4315b56bc0b876e61fa3a5d8f3ac20a51e8f575c1d58f19000"/215], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) pwritev2(r1, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000200)={'vxcan1\x00', {0x2, 0x0, @remote}}) r2 = gettid() rt_sigqueueinfo(r2, 0x11, &(0x7f0000000000)={0x0, 0x0, 0xfffffffe}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f0000001fc0)=[{{&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000000c0)="2a4999f1ced3a04d3e945455e6cab8493379abc3d5c2d89b792050158475106b14ac9b07e08fb2384b519262b6", 0x2d}, {&(0x7f0000000140)="e9", 0x1}, {0x0}], 0x3, 0xfffffffffffffffc}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001f00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}], 0x40, 0x20040401}}], 0x2, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r4, 0x29, 0x6, 0x0, &(0x7f0000000140)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) 11:24:47 executing program 5: openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15182, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x3, &(0x7f0000000700)=[0xee00, 0xee01, 0xffffffffffffffff]) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r0, 0x0, 0x22, &(0x7f0000000080)={@rand_addr, @remote}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffec9, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:24:47 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001a00010212c91e1bbeb3f02a250800ff085e762ac65f7d91053f295d4ffc20d65892ef07d227fdbe18dbfb1af3e0dd6a380e71c4fcf7eb3843a0a27d26af18626c51db155af69e0000000000000000090000000000df63a36fd407eb99643bb3409a86448396cd1499fc9022822e14cf2d0493dedf4e77766175ac5c31d7d34cf901e24917654cb8d3c73e60c6c12f77588b00000000cb029fc621b6cee12eb8459bf1b75803ac062baa94cd7dfdf5af4315b56bc0b876e61fa3a5d8f3ac20a51e8f575c1d58f19000"/215], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) pwritev2(r1, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000200)={'vxcan1\x00', {0x2, 0x0, @remote}}) r2 = gettid() rt_sigqueueinfo(r2, 0x11, &(0x7f0000000000)={0x0, 0x0, 0xfffffffe}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f0000001fc0)=[{{&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000000c0)="2a4999f1ced3a04d3e945455e6cab8493379abc3d5c2d89b792050158475106b14ac9b07e08fb2384b519262b6", 0x2d}, {&(0x7f0000000140)="e9", 0x1}, {0x0}], 0x3, 0xfffffffffffffffc}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001f00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}], 0x40, 0x20040401}}], 0x2, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r4, 0x29, 0x6, 0x0, &(0x7f0000000140)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) 11:24:47 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001a00010212c91e1bbeb3f02a250800ff085e762ac65f7d91053f295d4ffc20d65892ef07d227fdbe18dbfb1af3e0dd6a380e71c4fcf7eb3843a0a27d26af18626c51db155af69e0000000000000000090000000000df63a36fd407eb99643bb3409a86448396cd1499fc9022822e14cf2d0493dedf4e77766175ac5c31d7d34cf901e24917654cb8d3c73e60c6c12f77588b00000000cb029fc621b6cee12eb8459bf1b75803ac062baa94cd7dfdf5af4315b56bc0b876e61fa3a5d8f3ac20a51e8f575c1d58f19000"/215], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) pwritev2(r1, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000200)={'vxcan1\x00', {0x2, 0x0, @remote}}) r2 = gettid() rt_sigqueueinfo(r2, 0x11, &(0x7f0000000000)={0x0, 0x0, 0xfffffffe}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f0000001fc0)=[{{&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000000c0)="2a4999f1ced3a04d3e945455e6cab8493379abc3d5c2d89b792050158475106b14ac9b07e08fb2384b519262b6", 0x2d}, {&(0x7f0000000140)="e9", 0x1}, {0x0}], 0x3, 0xfffffffffffffffc}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001f00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}], 0x40, 0x20040401}}], 0x2, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r4, 0x29, 0x6, 0x0, &(0x7f0000000140)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) 11:24:47 executing program 5: openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15182, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x3, &(0x7f0000000700)=[0xee00, 0xee01, 0xffffffffffffffff]) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r0, 0x0, 0x22, &(0x7f0000000080)={@rand_addr, @remote}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffec9, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:24:47 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001a00010212c91e1bbeb3f02a250800ff085e762ac65f7d91053f295d4ffc20d65892ef07d227fdbe18dbfb1af3e0dd6a380e71c4fcf7eb3843a0a27d26af18626c51db155af69e0000000000000000090000000000df63a36fd407eb99643bb3409a86448396cd1499fc9022822e14cf2d0493dedf4e77766175ac5c31d7d34cf901e24917654cb8d3c73e60c6c12f77588b00000000cb029fc621b6cee12eb8459bf1b75803ac062baa94cd7dfdf5af4315b56bc0b876e61fa3a5d8f3ac20a51e8f575c1d58f19000"/215], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) pwritev2(r1, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000200)={'vxcan1\x00', {0x2, 0x0, @remote}}) r2 = gettid() rt_sigqueueinfo(r2, 0x11, &(0x7f0000000000)={0x0, 0x0, 0xfffffffe}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f0000001fc0)=[{{&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000000c0)="2a4999f1ced3a04d3e945455e6cab8493379abc3d5c2d89b792050158475106b14ac9b07e08fb2384b519262b6", 0x2d}, {&(0x7f0000000140)="e9", 0x1}, {0x0}], 0x3, 0xfffffffffffffffc}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001f00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}], 0x40, 0x20040401}}], 0x2, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r4, 0x29, 0x6, 0x0, &(0x7f0000000140)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) 11:24:47 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001a00010212c91e1bbeb3f02a250800ff085e762ac65f7d91053f295d4ffc20d65892ef07d227fdbe18dbfb1af3e0dd6a380e71c4fcf7eb3843a0a27d26af18626c51db155af69e0000000000000000090000000000df63a36fd407eb99643bb3409a86448396cd1499fc9022822e14cf2d0493dedf4e77766175ac5c31d7d34cf901e24917654cb8d3c73e60c6c12f77588b00000000cb029fc621b6cee12eb8459bf1b75803ac062baa94cd7dfdf5af4315b56bc0b876e61fa3a5d8f3ac20a51e8f575c1d58f19000"/215], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) pwritev2(r1, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000200)={'vxcan1\x00', {0x2, 0x0, @remote}}) r2 = gettid() rt_sigqueueinfo(r2, 0x11, &(0x7f0000000000)={0x0, 0x0, 0xfffffffe}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f0000001fc0)=[{{&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000000c0)="2a4999f1ced3a04d3e945455e6cab8493379abc3d5c2d89b792050158475106b14ac9b07e08fb2384b519262b6", 0x2d}, {&(0x7f0000000140)="e9", 0x1}, {0x0}], 0x3, 0xfffffffffffffffc}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001f00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}], 0x40, 0x20040401}}], 0x2, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r4, 0x29, 0x6, 0x0, &(0x7f0000000140)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) 11:24:47 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f0000000040), 0x180000, 0x0) read$usbmon(r0, 0x0, 0x0) 11:24:47 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001a00010212c91e1bbeb3f02a250800ff085e762ac65f7d91053f295d4ffc20d65892ef07d227fdbe18dbfb1af3e0dd6a380e71c4fcf7eb3843a0a27d26af18626c51db155af69e0000000000000000090000000000df63a36fd407eb99643bb3409a86448396cd1499fc9022822e14cf2d0493dedf4e77766175ac5c31d7d34cf901e24917654cb8d3c73e60c6c12f77588b00000000cb029fc621b6cee12eb8459bf1b75803ac062baa94cd7dfdf5af4315b56bc0b876e61fa3a5d8f3ac20a51e8f575c1d58f19000"/215], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) pwritev2(r1, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000200)={'vxcan1\x00', {0x2, 0x0, @remote}}) r2 = gettid() rt_sigqueueinfo(r2, 0x11, &(0x7f0000000000)={0x0, 0x0, 0xfffffffe}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f0000001fc0)=[{{&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000000c0)="2a4999f1ced3a04d3e945455e6cab8493379abc3d5c2d89b792050158475106b14ac9b07e08fb2384b519262b6", 0x2d}, {&(0x7f0000000140)="e9", 0x1}, {0x0}], 0x3, 0xfffffffffffffffc}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001f00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}], 0x40, 0x20040401}}], 0x2, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r4, 0x29, 0x6, 0x0, &(0x7f0000000140)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) 11:24:47 executing program 6: socket$netlink(0x10, 0x3, 0x17) 11:24:47 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001a00010212c91e1bbeb3f02a250800ff085e762ac65f7d91053f295d4ffc20d65892ef07d227fdbe18dbfb1af3e0dd6a380e71c4fcf7eb3843a0a27d26af18626c51db155af69e0000000000000000090000000000df63a36fd407eb99643bb3409a86448396cd1499fc9022822e14cf2d0493dedf4e77766175ac5c31d7d34cf901e24917654cb8d3c73e60c6c12f77588b00000000cb029fc621b6cee12eb8459bf1b75803ac062baa94cd7dfdf5af4315b56bc0b876e61fa3a5d8f3ac20a51e8f575c1d58f19000"/215], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) pwritev2(r1, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000200)={'vxcan1\x00', {0x2, 0x0, @remote}}) r2 = gettid() rt_sigqueueinfo(r2, 0x11, &(0x7f0000000000)={0x0, 0x0, 0xfffffffe}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f0000001fc0)=[{{&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000000c0)="2a4999f1ced3a04d3e945455e6cab8493379abc3d5c2d89b792050158475106b14ac9b07e08fb2384b519262b6", 0x2d}, {&(0x7f0000000140)="e9", 0x1}, {0x0}], 0x3, 0xfffffffffffffffc}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001f00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}], 0x40, 0x20040401}}], 0x2, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r4, 0x29, 0x6, 0x0, &(0x7f0000000140)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) 11:24:47 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001a00010212c91e1bbeb3f02a250800ff085e762ac65f7d91053f295d4ffc20d65892ef07d227fdbe18dbfb1af3e0dd6a380e71c4fcf7eb3843a0a27d26af18626c51db155af69e0000000000000000090000000000df63a36fd407eb99643bb3409a86448396cd1499fc9022822e14cf2d0493dedf4e77766175ac5c31d7d34cf901e24917654cb8d3c73e60c6c12f77588b00000000cb029fc621b6cee12eb8459bf1b75803ac062baa94cd7dfdf5af4315b56bc0b876e61fa3a5d8f3ac20a51e8f575c1d58f19000"/215], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) pwritev2(r1, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000200)={'vxcan1\x00', {0x2, 0x0, @remote}}) r2 = gettid() rt_sigqueueinfo(r2, 0x11, &(0x7f0000000000)={0x0, 0x0, 0xfffffffe}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f0000001fc0)=[{{&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000000c0)="2a4999f1ced3a04d3e945455e6cab8493379abc3d5c2d89b792050158475106b14ac9b07e08fb2384b519262b6", 0x2d}, {&(0x7f0000000140)="e9", 0x1}, {0x0}], 0x3, 0xfffffffffffffffc}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001f00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}], 0x40, 0x20040401}}], 0x2, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r4, 0x29, 0x6, 0x0, &(0x7f0000000140)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) 11:24:47 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001a00010212c91e1bbeb3f02a250800ff085e762ac65f7d91053f295d4ffc20d65892ef07d227fdbe18dbfb1af3e0dd6a380e71c4fcf7eb3843a0a27d26af18626c51db155af69e0000000000000000090000000000df63a36fd407eb99643bb3409a86448396cd1499fc9022822e14cf2d0493dedf4e77766175ac5c31d7d34cf901e24917654cb8d3c73e60c6c12f77588b00000000cb029fc621b6cee12eb8459bf1b75803ac062baa94cd7dfdf5af4315b56bc0b876e61fa3a5d8f3ac20a51e8f575c1d58f19000"/215], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) pwritev2(r1, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000200)={'vxcan1\x00', {0x2, 0x0, @remote}}) r2 = gettid() rt_sigqueueinfo(r2, 0x11, &(0x7f0000000000)={0x0, 0x0, 0xfffffffe}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f0000001fc0)=[{{&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000000c0)="2a4999f1ced3a04d3e945455e6cab8493379abc3d5c2d89b792050158475106b14ac9b07e08fb2384b519262b6", 0x2d}, {&(0x7f0000000140)="e9", 0x1}, {0x0}], 0x3, 0xfffffffffffffffc}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001f00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}], 0x40, 0x20040401}}], 0x2, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r4, 0x29, 0x6, 0x0, &(0x7f0000000140)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) 11:24:47 executing program 6: openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15182, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x3, &(0x7f0000000700)=[0xee00, 0xee01, 0xffffffffffffffff]) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r0, 0x0, 0x22, &(0x7f0000000080)={@rand_addr, @remote}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffec9, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:24:47 executing program 5: openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15182, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x3, &(0x7f0000000700)=[0xee00, 0xee01, 0xffffffffffffffff]) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r0, 0x0, 0x22, &(0x7f0000000080)={@rand_addr, @remote}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffec9, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:24:47 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001a00010212c91e1bbeb3f02a250800ff085e762ac65f7d91053f295d4ffc20d65892ef07d227fdbe18dbfb1af3e0dd6a380e71c4fcf7eb3843a0a27d26af18626c51db155af69e0000000000000000090000000000df63a36fd407eb99643bb3409a86448396cd1499fc9022822e14cf2d0493dedf4e77766175ac5c31d7d34cf901e24917654cb8d3c73e60c6c12f77588b00000000cb029fc621b6cee12eb8459bf1b75803ac062baa94cd7dfdf5af4315b56bc0b876e61fa3a5d8f3ac20a51e8f575c1d58f19000"/215], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) pwritev2(r1, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000200)={'vxcan1\x00', {0x2, 0x0, @remote}}) r2 = gettid() rt_sigqueueinfo(r2, 0x11, &(0x7f0000000000)={0x0, 0x0, 0xfffffffe}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f0000001fc0)=[{{&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000000c0)="2a4999f1ced3a04d3e945455e6cab8493379abc3d5c2d89b792050158475106b14ac9b07e08fb2384b519262b6", 0x2d}, {&(0x7f0000000140)="e9", 0x1}, {0x0}], 0x3, 0xfffffffffffffffc}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001f00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}], 0x40, 0x20040401}}], 0x2, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r4, 0x29, 0x6, 0x0, &(0x7f0000000140)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) 11:24:47 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001a00010212c91e1bbeb3f02a250800ff085e762ac65f7d91053f295d4ffc20d65892ef07d227fdbe18dbfb1af3e0dd6a380e71c4fcf7eb3843a0a27d26af18626c51db155af69e0000000000000000090000000000df63a36fd407eb99643bb3409a86448396cd1499fc9022822e14cf2d0493dedf4e77766175ac5c31d7d34cf901e24917654cb8d3c73e60c6c12f77588b00000000cb029fc621b6cee12eb8459bf1b75803ac062baa94cd7dfdf5af4315b56bc0b876e61fa3a5d8f3ac20a51e8f575c1d58f19000"/215], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) pwritev2(r1, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000200)={'vxcan1\x00', {0x2, 0x0, @remote}}) r2 = gettid() rt_sigqueueinfo(r2, 0x11, &(0x7f0000000000)={0x0, 0x0, 0xfffffffe}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f0000001fc0)=[{{&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000000c0)="2a4999f1ced3a04d3e945455e6cab8493379abc3d5c2d89b792050158475106b14ac9b07e08fb2384b519262b6", 0x2d}, {&(0x7f0000000140)="e9", 0x1}, {0x0}], 0x3, 0xfffffffffffffffc}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001f00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}], 0x40, 0x20040401}}], 0x2, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r4, 0x29, 0x6, 0x0, &(0x7f0000000140)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) 11:24:47 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001a00010212c91e1bbeb3f02a250800ff085e762ac65f7d91053f295d4ffc20d65892ef07d227fdbe18dbfb1af3e0dd6a380e71c4fcf7eb3843a0a27d26af18626c51db155af69e0000000000000000090000000000df63a36fd407eb99643bb3409a86448396cd1499fc9022822e14cf2d0493dedf4e77766175ac5c31d7d34cf901e24917654cb8d3c73e60c6c12f77588b00000000cb029fc621b6cee12eb8459bf1b75803ac062baa94cd7dfdf5af4315b56bc0b876e61fa3a5d8f3ac20a51e8f575c1d58f19000"/215], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) pwritev2(r1, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000200)={'vxcan1\x00', {0x2, 0x0, @remote}}) r2 = gettid() rt_sigqueueinfo(r2, 0x11, &(0x7f0000000000)={0x0, 0x0, 0xfffffffe}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f0000001fc0)=[{{&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000000c0)="2a4999f1ced3a04d3e945455e6cab8493379abc3d5c2d89b792050158475106b14ac9b07e08fb2384b519262b6", 0x2d}, {&(0x7f0000000140)="e9", 0x1}, {0x0}], 0x3, 0xfffffffffffffffc}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001f00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}], 0x40, 0x20040401}}], 0x2, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r4, 0x29, 0x6, 0x0, &(0x7f0000000140)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) 11:24:47 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001a00010212c91e1bbeb3f02a250800ff085e762ac65f7d91053f295d4ffc20d65892ef07d227fdbe18dbfb1af3e0dd6a380e71c4fcf7eb3843a0a27d26af18626c51db155af69e0000000000000000090000000000df63a36fd407eb99643bb3409a86448396cd1499fc9022822e14cf2d0493dedf4e77766175ac5c31d7d34cf901e24917654cb8d3c73e60c6c12f77588b00000000cb029fc621b6cee12eb8459bf1b75803ac062baa94cd7dfdf5af4315b56bc0b876e61fa3a5d8f3ac20a51e8f575c1d58f19000"/215], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) pwritev2(r1, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000200)={'vxcan1\x00', {0x2, 0x0, @remote}}) r2 = gettid() rt_sigqueueinfo(r2, 0x11, &(0x7f0000000000)={0x0, 0x0, 0xfffffffe}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f0000001fc0)=[{{&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000000c0)="2a4999f1ced3a04d3e945455e6cab8493379abc3d5c2d89b792050158475106b14ac9b07e08fb2384b519262b6", 0x2d}, {&(0x7f0000000140)="e9", 0x1}, {0x0}], 0x3, 0xfffffffffffffffc}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001f00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}], 0x40, 0x20040401}}], 0x2, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r4, 0x29, 0x6, 0x0, &(0x7f0000000140)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) 11:24:47 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001a00010212c91e1bbeb3f02a250800ff085e762ac65f7d91053f295d4ffc20d65892ef07d227fdbe18dbfb1af3e0dd6a380e71c4fcf7eb3843a0a27d26af18626c51db155af69e0000000000000000090000000000df63a36fd407eb99643bb3409a86448396cd1499fc9022822e14cf2d0493dedf4e77766175ac5c31d7d34cf901e24917654cb8d3c73e60c6c12f77588b00000000cb029fc621b6cee12eb8459bf1b75803ac062baa94cd7dfdf5af4315b56bc0b876e61fa3a5d8f3ac20a51e8f575c1d58f19000"/215], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) pwritev2(r1, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000200)={'vxcan1\x00', {0x2, 0x0, @remote}}) r2 = gettid() rt_sigqueueinfo(r2, 0x11, &(0x7f0000000000)={0x0, 0x0, 0xfffffffe}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f0000001fc0)=[{{&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000000c0)="2a4999f1ced3a04d3e945455e6cab8493379abc3d5c2d89b792050158475106b14ac9b07e08fb2384b519262b6", 0x2d}, {&(0x7f0000000140)="e9", 0x1}, {0x0}], 0x3, 0xfffffffffffffffc}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001f00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}], 0x40, 0x20040401}}], 0x2, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r4, 0x29, 0x6, 0x0, &(0x7f0000000140)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) 11:24:47 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001a00010212c91e1bbeb3f02a250800ff085e762ac65f7d91053f295d4ffc20d65892ef07d227fdbe18dbfb1af3e0dd6a380e71c4fcf7eb3843a0a27d26af18626c51db155af69e0000000000000000090000000000df63a36fd407eb99643bb3409a86448396cd1499fc9022822e14cf2d0493dedf4e77766175ac5c31d7d34cf901e24917654cb8d3c73e60c6c12f77588b00000000cb029fc621b6cee12eb8459bf1b75803ac062baa94cd7dfdf5af4315b56bc0b876e61fa3a5d8f3ac20a51e8f575c1d58f19000"/215], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) pwritev2(r1, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000200)={'vxcan1\x00', {0x2, 0x0, @remote}}) r2 = gettid() rt_sigqueueinfo(r2, 0x11, &(0x7f0000000000)={0x0, 0x0, 0xfffffffe}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f0000001fc0)=[{{&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000000c0)="2a4999f1ced3a04d3e945455e6cab8493379abc3d5c2d89b792050158475106b14ac9b07e08fb2384b519262b6", 0x2d}, {&(0x7f0000000140)="e9", 0x1}, {0x0}], 0x3, 0xfffffffffffffffc}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001f00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}], 0x40, 0x20040401}}], 0x2, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r4, 0x29, 0x6, 0x0, &(0x7f0000000140)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) 11:24:47 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001a00010212c91e1bbeb3f02a250800ff085e762ac65f7d91053f295d4ffc20d65892ef07d227fdbe18dbfb1af3e0dd6a380e71c4fcf7eb3843a0a27d26af18626c51db155af69e0000000000000000090000000000df63a36fd407eb99643bb3409a86448396cd1499fc9022822e14cf2d0493dedf4e77766175ac5c31d7d34cf901e24917654cb8d3c73e60c6c12f77588b00000000cb029fc621b6cee12eb8459bf1b75803ac062baa94cd7dfdf5af4315b56bc0b876e61fa3a5d8f3ac20a51e8f575c1d58f19000"/215], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) pwritev2(r1, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000200)={'vxcan1\x00', {0x2, 0x0, @remote}}) r2 = gettid() rt_sigqueueinfo(r2, 0x11, &(0x7f0000000000)={0x0, 0x0, 0xfffffffe}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f0000001fc0)=[{{&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000000c0)="2a4999f1ced3a04d3e945455e6cab8493379abc3d5c2d89b792050158475106b14ac9b07e08fb2384b519262b6", 0x2d}, {&(0x7f0000000140)="e9", 0x1}, {0x0}], 0x3, 0xfffffffffffffffc}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001f00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}], 0x40, 0x20040401}}], 0x2, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r4, 0x29, 0x6, 0x0, &(0x7f0000000140)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) 11:24:47 executing program 6: openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15182, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x3, &(0x7f0000000700)=[0xee00, 0xee01, 0xffffffffffffffff]) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r0, 0x0, 0x22, &(0x7f0000000080)={@rand_addr, @remote}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffec9, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:24:47 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001a00010212c91e1bbeb3f02a250800ff085e762ac65f7d91053f295d4ffc20d65892ef07d227fdbe18dbfb1af3e0dd6a380e71c4fcf7eb3843a0a27d26af18626c51db155af69e0000000000000000090000000000df63a36fd407eb99643bb3409a86448396cd1499fc9022822e14cf2d0493dedf4e77766175ac5c31d7d34cf901e24917654cb8d3c73e60c6c12f77588b00000000cb029fc621b6cee12eb8459bf1b75803ac062baa94cd7dfdf5af4315b56bc0b876e61fa3a5d8f3ac20a51e8f575c1d58f19000"/215], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) pwritev2(r1, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000200)={'vxcan1\x00', {0x2, 0x0, @remote}}) r2 = gettid() rt_sigqueueinfo(r2, 0x11, &(0x7f0000000000)={0x0, 0x0, 0xfffffffe}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f0000001fc0)=[{{&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000000c0)="2a4999f1ced3a04d3e945455e6cab8493379abc3d5c2d89b792050158475106b14ac9b07e08fb2384b519262b6", 0x2d}, {&(0x7f0000000140)="e9", 0x1}, {0x0}], 0x3, 0xfffffffffffffffc}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001f00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}], 0x40, 0x20040401}}], 0x2, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r4, 0x29, 0x6, 0x0, &(0x7f0000000140)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) 11:24:47 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001a00010212c91e1bbeb3f02a250800ff085e762ac65f7d91053f295d4ffc20d65892ef07d227fdbe18dbfb1af3e0dd6a380e71c4fcf7eb3843a0a27d26af18626c51db155af69e0000000000000000090000000000df63a36fd407eb99643bb3409a86448396cd1499fc9022822e14cf2d0493dedf4e77766175ac5c31d7d34cf901e24917654cb8d3c73e60c6c12f77588b00000000cb029fc621b6cee12eb8459bf1b75803ac062baa94cd7dfdf5af4315b56bc0b876e61fa3a5d8f3ac20a51e8f575c1d58f19000"/215], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) pwritev2(r1, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000200)={'vxcan1\x00', {0x2, 0x0, @remote}}) r2 = gettid() rt_sigqueueinfo(r2, 0x11, &(0x7f0000000000)={0x0, 0x0, 0xfffffffe}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f0000001fc0)=[{{&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000000c0)="2a4999f1ced3a04d3e945455e6cab8493379abc3d5c2d89b792050158475106b14ac9b07e08fb2384b519262b6", 0x2d}, {&(0x7f0000000140)="e9", 0x1}, {0x0}], 0x3, 0xfffffffffffffffc}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001f00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}], 0x40, 0x20040401}}], 0x2, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r4, 0x29, 0x6, 0x0, &(0x7f0000000140)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) 11:24:47 executing program 6: openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x15182, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getgroups(0x3, &(0x7f0000000700)=[0xee00, 0xee01, 0xffffffffffffffff]) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r0, 0x0, 0x22, &(0x7f0000000080)={@rand_addr, @remote}, 0xc) perf_event_open(&(0x7f0000000080)={0x2, 0xfffffffffffffec9, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 11:24:47 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001a00010212c91e1bbeb3f02a250800ff085e762ac65f7d91053f295d4ffc20d65892ef07d227fdbe18dbfb1af3e0dd6a380e71c4fcf7eb3843a0a27d26af18626c51db155af69e0000000000000000090000000000df63a36fd407eb99643bb3409a86448396cd1499fc9022822e14cf2d0493dedf4e77766175ac5c31d7d34cf901e24917654cb8d3c73e60c6c12f77588b00000000cb029fc621b6cee12eb8459bf1b75803ac062baa94cd7dfdf5af4315b56bc0b876e61fa3a5d8f3ac20a51e8f575c1d58f19000"/215], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) pwritev2(r1, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000200)={'vxcan1\x00', {0x2, 0x0, @remote}}) r2 = gettid() rt_sigqueueinfo(r2, 0x11, &(0x7f0000000000)={0x0, 0x0, 0xfffffffe}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f0000001fc0)=[{{&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000000c0)="2a4999f1ced3a04d3e945455e6cab8493379abc3d5c2d89b792050158475106b14ac9b07e08fb2384b519262b6", 0x2d}, {&(0x7f0000000140)="e9", 0x1}, {0x0}], 0x3, 0xfffffffffffffffc}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001f00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}], 0x40, 0x20040401}}], 0x2, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r4, 0x29, 0x6, 0x0, &(0x7f0000000140)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) 11:24:47 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001a00010212c91e1bbeb3f02a250800ff085e762ac65f7d91053f295d4ffc20d65892ef07d227fdbe18dbfb1af3e0dd6a380e71c4fcf7eb3843a0a27d26af18626c51db155af69e0000000000000000090000000000df63a36fd407eb99643bb3409a86448396cd1499fc9022822e14cf2d0493dedf4e77766175ac5c31d7d34cf901e24917654cb8d3c73e60c6c12f77588b00000000cb029fc621b6cee12eb8459bf1b75803ac062baa94cd7dfdf5af4315b56bc0b876e61fa3a5d8f3ac20a51e8f575c1d58f19000"/215], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) pwritev2(r1, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000200)={'vxcan1\x00', {0x2, 0x0, @remote}}) r2 = gettid() rt_sigqueueinfo(r2, 0x11, &(0x7f0000000000)={0x0, 0x0, 0xfffffffe}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f0000001fc0)=[{{&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000000c0)="2a4999f1ced3a04d3e945455e6cab8493379abc3d5c2d89b792050158475106b14ac9b07e08fb2384b519262b6", 0x2d}, {&(0x7f0000000140)="e9", 0x1}, {0x0}], 0x3, 0xfffffffffffffffc}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001f00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}], 0x40, 0x20040401}}], 0x2, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r4, 0x29, 0x6, 0x0, &(0x7f0000000140)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) 11:24:47 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001a00010212c91e1bbeb3f02a250800ff085e762ac65f7d91053f295d4ffc20d65892ef07d227fdbe18dbfb1af3e0dd6a380e71c4fcf7eb3843a0a27d26af18626c51db155af69e0000000000000000090000000000df63a36fd407eb99643bb3409a86448396cd1499fc9022822e14cf2d0493dedf4e77766175ac5c31d7d34cf901e24917654cb8d3c73e60c6c12f77588b00000000cb029fc621b6cee12eb8459bf1b75803ac062baa94cd7dfdf5af4315b56bc0b876e61fa3a5d8f3ac20a51e8f575c1d58f19000"/215], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) pwritev2(r1, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000200)={'vxcan1\x00', {0x2, 0x0, @remote}}) r2 = gettid() rt_sigqueueinfo(r2, 0x11, &(0x7f0000000000)={0x0, 0x0, 0xfffffffe}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f0000001fc0)=[{{&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000000c0)="2a4999f1ced3a04d3e945455e6cab8493379abc3d5c2d89b792050158475106b14ac9b07e08fb2384b519262b6", 0x2d}, {&(0x7f0000000140)="e9", 0x1}, {0x0}], 0x3, 0xfffffffffffffffc}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001f00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}], 0x40, 0x20040401}}], 0x2, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r4, 0x29, 0x6, 0x0, &(0x7f0000000140)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) 11:24:47 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001a00010212c91e1bbeb3f02a250800ff085e762ac65f7d91053f295d4ffc20d65892ef07d227fdbe18dbfb1af3e0dd6a380e71c4fcf7eb3843a0a27d26af18626c51db155af69e0000000000000000090000000000df63a36fd407eb99643bb3409a86448396cd1499fc9022822e14cf2d0493dedf4e77766175ac5c31d7d34cf901e24917654cb8d3c73e60c6c12f77588b00000000cb029fc621b6cee12eb8459bf1b75803ac062baa94cd7dfdf5af4315b56bc0b876e61fa3a5d8f3ac20a51e8f575c1d58f19000"/215], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) pwritev2(r1, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000200)={'vxcan1\x00', {0x2, 0x0, @remote}}) r2 = gettid() rt_sigqueueinfo(r2, 0x11, &(0x7f0000000000)={0x0, 0x0, 0xfffffffe}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f0000001fc0)=[{{&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000000c0)="2a4999f1ced3a04d3e945455e6cab8493379abc3d5c2d89b792050158475106b14ac9b07e08fb2384b519262b6", 0x2d}, {&(0x7f0000000140)="e9", 0x1}, {0x0}], 0x3, 0xfffffffffffffffc}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001f00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}], 0x40, 0x20040401}}], 0x2, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r4, 0x29, 0x6, 0x0, &(0x7f0000000140)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) 11:24:47 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001a00010212c91e1bbeb3f02a250800ff085e762ac65f7d91053f295d4ffc20d65892ef07d227fdbe18dbfb1af3e0dd6a380e71c4fcf7eb3843a0a27d26af18626c51db155af69e0000000000000000090000000000df63a36fd407eb99643bb3409a86448396cd1499fc9022822e14cf2d0493dedf4e77766175ac5c31d7d34cf901e24917654cb8d3c73e60c6c12f77588b00000000cb029fc621b6cee12eb8459bf1b75803ac062baa94cd7dfdf5af4315b56bc0b876e61fa3a5d8f3ac20a51e8f575c1d58f19000"/215], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) pwritev2(r1, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000200)={'vxcan1\x00', {0x2, 0x0, @remote}}) r2 = gettid() rt_sigqueueinfo(r2, 0x11, &(0x7f0000000000)={0x0, 0x0, 0xfffffffe}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f0000001fc0)=[{{&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000000c0)="2a4999f1ced3a04d3e945455e6cab8493379abc3d5c2d89b792050158475106b14ac9b07e08fb2384b519262b6", 0x2d}, {&(0x7f0000000140)="e9", 0x1}, {0x0}], 0x3, 0xfffffffffffffffc}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001f00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}], 0x40, 0x20040401}}], 0x2, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r4, 0x29, 0x6, 0x0, &(0x7f0000000140)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) 11:24:47 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001a00010212c91e1bbeb3f02a250800ff085e762ac65f7d91053f295d4ffc20d65892ef07d227fdbe18dbfb1af3e0dd6a380e71c4fcf7eb3843a0a27d26af18626c51db155af69e0000000000000000090000000000df63a36fd407eb99643bb3409a86448396cd1499fc9022822e14cf2d0493dedf4e77766175ac5c31d7d34cf901e24917654cb8d3c73e60c6c12f77588b00000000cb029fc621b6cee12eb8459bf1b75803ac062baa94cd7dfdf5af4315b56bc0b876e61fa3a5d8f3ac20a51e8f575c1d58f19000"/215], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) pwritev2(r1, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000200)={'vxcan1\x00', {0x2, 0x0, @remote}}) r2 = gettid() rt_sigqueueinfo(r2, 0x11, &(0x7f0000000000)={0x0, 0x0, 0xfffffffe}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f0000001fc0)=[{{&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000000c0)="2a4999f1ced3a04d3e945455e6cab8493379abc3d5c2d89b792050158475106b14ac9b07e08fb2384b519262b6", 0x2d}, {&(0x7f0000000140)="e9", 0x1}, {0x0}], 0x3, 0xfffffffffffffffc}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001f00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}], 0x40, 0x20040401}}], 0x2, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r4, 0x29, 0x6, 0x0, &(0x7f0000000140)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) 11:24:47 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001a00010212c91e1bbeb3f02a250800ff085e762ac65f7d91053f295d4ffc20d65892ef07d227fdbe18dbfb1af3e0dd6a380e71c4fcf7eb3843a0a27d26af18626c51db155af69e0000000000000000090000000000df63a36fd407eb99643bb3409a86448396cd1499fc9022822e14cf2d0493dedf4e77766175ac5c31d7d34cf901e24917654cb8d3c73e60c6c12f77588b00000000cb029fc621b6cee12eb8459bf1b75803ac062baa94cd7dfdf5af4315b56bc0b876e61fa3a5d8f3ac20a51e8f575c1d58f19000"/215], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) pwritev2(r1, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000200)={'vxcan1\x00', {0x2, 0x0, @remote}}) r2 = gettid() rt_sigqueueinfo(r2, 0x11, &(0x7f0000000000)={0x0, 0x0, 0xfffffffe}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f0000001fc0)=[{{&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000000c0)="2a4999f1ced3a04d3e945455e6cab8493379abc3d5c2d89b792050158475106b14ac9b07e08fb2384b519262b6", 0x2d}, {&(0x7f0000000140)="e9", 0x1}, {0x0}], 0x3, 0xfffffffffffffffc}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001f00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}], 0x40, 0x20040401}}], 0x2, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r4, 0x29, 0x6, 0x0, &(0x7f0000000140)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) 11:24:47 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001a00010212c91e1bbeb3f02a250800ff085e762ac65f7d91053f295d4ffc20d65892ef07d227fdbe18dbfb1af3e0dd6a380e71c4fcf7eb3843a0a27d26af18626c51db155af69e0000000000000000090000000000df63a36fd407eb99643bb3409a86448396cd1499fc9022822e14cf2d0493dedf4e77766175ac5c31d7d34cf901e24917654cb8d3c73e60c6c12f77588b00000000cb029fc621b6cee12eb8459bf1b75803ac062baa94cd7dfdf5af4315b56bc0b876e61fa3a5d8f3ac20a51e8f575c1d58f19000"/215], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) pwritev2(r1, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000200)={'vxcan1\x00', {0x2, 0x0, @remote}}) r2 = gettid() rt_sigqueueinfo(r2, 0x11, &(0x7f0000000000)={0x0, 0x0, 0xfffffffe}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f0000001fc0)=[{{&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000000c0)="2a4999f1ced3a04d3e945455e6cab8493379abc3d5c2d89b792050158475106b14ac9b07e08fb2384b519262b6", 0x2d}, {&(0x7f0000000140)="e9", 0x1}, {0x0}], 0x3, 0xfffffffffffffffc}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001f00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}], 0x40, 0x20040401}}], 0x2, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r4, 0x29, 0x6, 0x0, &(0x7f0000000140)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) 11:24:47 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001a00010212c91e1bbeb3f02a250800ff085e762ac65f7d91053f295d4ffc20d65892ef07d227fdbe18dbfb1af3e0dd6a380e71c4fcf7eb3843a0a27d26af18626c51db155af69e0000000000000000090000000000df63a36fd407eb99643bb3409a86448396cd1499fc9022822e14cf2d0493dedf4e77766175ac5c31d7d34cf901e24917654cb8d3c73e60c6c12f77588b00000000cb029fc621b6cee12eb8459bf1b75803ac062baa94cd7dfdf5af4315b56bc0b876e61fa3a5d8f3ac20a51e8f575c1d58f19000"/215], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) pwritev2(r1, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000200)={'vxcan1\x00', {0x2, 0x0, @remote}}) r2 = gettid() rt_sigqueueinfo(r2, 0x11, &(0x7f0000000000)={0x0, 0x0, 0xfffffffe}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f0000001fc0)=[{{&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000000c0)="2a4999f1ced3a04d3e945455e6cab8493379abc3d5c2d89b792050158475106b14ac9b07e08fb2384b519262b6", 0x2d}, {&(0x7f0000000140)="e9", 0x1}, {0x0}], 0x3, 0xfffffffffffffffc}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001f00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}], 0x40, 0x20040401}}], 0x2, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r4, 0x29, 0x6, 0x0, &(0x7f0000000140)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) 11:24:48 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001a00010212c91e1bbeb3f02a250800ff085e762ac65f7d91053f295d4ffc20d65892ef07d227fdbe18dbfb1af3e0dd6a380e71c4fcf7eb3843a0a27d26af18626c51db155af69e0000000000000000090000000000df63a36fd407eb99643bb3409a86448396cd1499fc9022822e14cf2d0493dedf4e77766175ac5c31d7d34cf901e24917654cb8d3c73e60c6c12f77588b00000000cb029fc621b6cee12eb8459bf1b75803ac062baa94cd7dfdf5af4315b56bc0b876e61fa3a5d8f3ac20a51e8f575c1d58f19000"/215], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) pwritev2(r1, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000200)={'vxcan1\x00', {0x2, 0x0, @remote}}) r2 = gettid() rt_sigqueueinfo(r2, 0x11, &(0x7f0000000000)={0x0, 0x0, 0xfffffffe}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f0000001fc0)=[{{&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000000c0)="2a4999f1ced3a04d3e945455e6cab8493379abc3d5c2d89b792050158475106b14ac9b07e08fb2384b519262b6", 0x2d}, {&(0x7f0000000140)="e9", 0x1}, {0x0}], 0x3, 0xfffffffffffffffc}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001f00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}], 0x40, 0x20040401}}], 0x2, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r4, 0x29, 0x6, 0x0, &(0x7f0000000140)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) 11:24:48 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001a00010212c91e1bbeb3f02a250800ff085e762ac65f7d91053f295d4ffc20d65892ef07d227fdbe18dbfb1af3e0dd6a380e71c4fcf7eb3843a0a27d26af18626c51db155af69e0000000000000000090000000000df63a36fd407eb99643bb3409a86448396cd1499fc9022822e14cf2d0493dedf4e77766175ac5c31d7d34cf901e24917654cb8d3c73e60c6c12f77588b00000000cb029fc621b6cee12eb8459bf1b75803ac062baa94cd7dfdf5af4315b56bc0b876e61fa3a5d8f3ac20a51e8f575c1d58f19000"/215], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) pwritev2(r1, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000200)={'vxcan1\x00', {0x2, 0x0, @remote}}) r2 = gettid() rt_sigqueueinfo(r2, 0x11, &(0x7f0000000000)={0x0, 0x0, 0xfffffffe}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f0000001fc0)=[{{&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000000c0)="2a4999f1ced3a04d3e945455e6cab8493379abc3d5c2d89b792050158475106b14ac9b07e08fb2384b519262b6", 0x2d}, {&(0x7f0000000140)="e9", 0x1}, {0x0}], 0x3, 0xfffffffffffffffc}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001f00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}], 0x40, 0x20040401}}], 0x2, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r4, 0x29, 0x6, 0x0, &(0x7f0000000140)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) 11:24:48 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001a00010212c91e1bbeb3f02a250800ff085e762ac65f7d91053f295d4ffc20d65892ef07d227fdbe18dbfb1af3e0dd6a380e71c4fcf7eb3843a0a27d26af18626c51db155af69e0000000000000000090000000000df63a36fd407eb99643bb3409a86448396cd1499fc9022822e14cf2d0493dedf4e77766175ac5c31d7d34cf901e24917654cb8d3c73e60c6c12f77588b00000000cb029fc621b6cee12eb8459bf1b75803ac062baa94cd7dfdf5af4315b56bc0b876e61fa3a5d8f3ac20a51e8f575c1d58f19000"/215], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) pwritev2(r1, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000200)={'vxcan1\x00', {0x2, 0x0, @remote}}) r2 = gettid() rt_sigqueueinfo(r2, 0x11, &(0x7f0000000000)={0x0, 0x0, 0xfffffffe}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f0000001fc0)=[{{&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000000c0)="2a4999f1ced3a04d3e945455e6cab8493379abc3d5c2d89b792050158475106b14ac9b07e08fb2384b519262b6", 0x2d}, {&(0x7f0000000140)="e9", 0x1}, {0x0}], 0x3, 0xfffffffffffffffc}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001f00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}], 0x40, 0x20040401}}], 0x2, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r4, 0x29, 0x6, 0x0, &(0x7f0000000140)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) 11:24:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x19, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000100000005000000000004000040000020000000d6f4655fd6f4655f0100ffff53ef010001000000d5f4655f000000000000000001000000000000000b0000000001000018000000c28500002b0200000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e38303439393233303000"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000f4e089668a0d4000840a22d1089d0f04010040000c00000000000000d5f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000500400000000000000000000000000000004300000000000000", 0x40, 0x540}, {&(0x7f0000010300)="02000000030000000400000019000f0003000400"/32, 0x20, 0x800}, {&(0x7f0000010400)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d5f4655fd5f4655fd5f4655f00"/4128, 0x1020, 0x1000}, {&(0x7f0000011500)="ed41000000080000d5f4655fd6f4655fd6f4655f00000000000004004000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x2100}, {&(0x7f0000011600)="200000006418e53c6418e53c00000000d5f4655f00"/32, 0x20, 0x2180}, {&(0x7f0000011700)="8081000000601020d5f4655fd5f4655fd5f4655f00000000000001004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000d5f4655f00"/160, 0xa0, 0x2600}, {&(0x7f0000011800)="c041000000380000d5f4655fd5f4655fd5f4655f00000000000002004000000000000800000000000af301000400000000000000000000000700000020000000", 0x40, 0x2a00}, {&(0x7f0000011900)="20000000000000000000000000000000d5f4655f000000000000000000000000000002ea00"/64, 0x40, 0x2a80}, {&(0x7f0000011a00)="ed4100003c000000d6f4655fd6f4655fd6f4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c6531000000000000000000000000000000000000000000000000000000be5839ad000000000000000000000000000000000000000000000000200000006418e53c6418e53c14f4f03bd6f4655f14f4f03b0000000000000000000002ea04070000000000000000000000000000646174610000000000000000", 0xc0, 0x2b00}, {&(0x7f0000011b00)="ed8100001a040000d6f4655fd6f4655fd6f4655f00000000000001004000000000000800010000000af301000400000000000000000000000100000050000000000000000000000000000000000000000000000000000000000000000000000000000000f3be7438000000000000000000000000000000000000000000000000200000006418e53c6418e53c6418e53cd6f4655f6418e53c0000000000000000", 0xa0, 0x2c00}, {&(0x7f0000011c00)="ffa1000026000000d6f4655fd6f4655fd6f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3830343939323330302f66696c65302f66696c653000000000000000000000000000000000000000000000f583dfd0000000000000000000000000000000000000000000000000200000006418e53c6418e53c6418e53cd6f4655f6418e53c0000000000000000", 0xa0, 0x2d00}, {&(0x7f0000011d00)="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", 0x1a0, 0x2e00}, {&(0x7f0000011f00)="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", 0x100, 0x3000}, {&(0x7f0000012000)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x80, 0x8000}, {&(0x7f0000012100)="0b0000000c0001022e000000020000000c0002022e2e000000000000e8070000", 0x20, 0x10000}, {&(0x7f0000012200)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x10800}, {&(0x7f0000012300)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x11000}, {&(0x7f0000012400)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x11800}, {&(0x7f0000012500)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x12000}, {&(0x7f0000012600)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x12800}, {&(0x7f0000012700)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x13000}, {&(0x7f0000012800)="504d4d00504d4dffd6f4655f00000000647679756b6f762d676c6170746f70320000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c6f6f7032390075782f746573742f73797a5f6d6f756e745f696d6167655f650500"/128, 0x80, 0x20000}, {&(0x7f0000012900)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x28000}], 0x0, &(0x7f0000012e00)) 11:24:48 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001a00010212c91e1bbeb3f02a250800ff085e762ac65f7d91053f295d4ffc20d65892ef07d227fdbe18dbfb1af3e0dd6a380e71c4fcf7eb3843a0a27d26af18626c51db155af69e0000000000000000090000000000df63a36fd407eb99643bb3409a86448396cd1499fc9022822e14cf2d0493dedf4e77766175ac5c31d7d34cf901e24917654cb8d3c73e60c6c12f77588b00000000cb029fc621b6cee12eb8459bf1b75803ac062baa94cd7dfdf5af4315b56bc0b876e61fa3a5d8f3ac20a51e8f575c1d58f19000"/215], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) pwritev2(r1, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f0000000200)={'vxcan1\x00', {0x2, 0x0, @remote}}) r2 = gettid() rt_sigqueueinfo(r2, 0x11, &(0x7f0000000000)={0x0, 0x0, 0xfffffffe}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f0000001fc0)=[{{&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000000c0)="2a4999f1ced3a04d3e945455e6cab8493379abc3d5c2d89b792050158475106b14ac9b07e08fb2384b519262b6", 0x2d}, {&(0x7f0000000140)="e9", 0x1}, {0x0}], 0x3, 0xfffffffffffffffc}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001f00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff, 0xee01}}}], 0x40, 0x20040401}}], 0x2, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r4, 0x29, 0x6, 0x0, &(0x7f0000000140)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) [ 180.187978] loop4: detected capacity change from 0 to 2048 11:24:48 executing program 2: mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0x3000, 0x6, &(0x7f0000ffb000/0x3000)=nil) munmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000) madvise(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x2) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4000, 0x4, &(0x7f0000ffc000/0x4000)=nil) shmat(0x0, &(0x7f0000ffc000/0x3000)=nil, 0x6000) r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmat(r0, &(0x7f0000ffa000/0x1000)=nil, 0x7000 VM DIAGNOSIS: 11:24:44 Registers: info registers vcpu 0 RAX=0000000000000078 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822b29f1 RDI=ffffffff87641ba0 RBP=ffffffff87641b60 RSP=ffff88803d5bf348 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000078 R11=0000000000000001 R12=0000000000000078 R13=ffffffff87641b60 R14=0000000000000010 R15=ffffffff822b29e0 RIP=ffffffff822b2a49 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f4bf5916700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=000055a9bde5dd18 CR3=000000000ffd2000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007f4bf84877c0 00007f4bf84877c8 YMM02=0000000000000000 0000000000000000 00007f4bf84877e0 00007f4bf84877c0 YMM03=0000000000000000 0000000000000000 00007f4bf84877c8 00007f4bf84877c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000000000000000 RBX=ffff88806ce3eda0 RCX=0000000000000000 RDX=ffff88801a780000 RSI=ffffffff813bccdb RDI=0000000000000005 RBP=0000000000000003 RSP=ffff88803728f960 R8 =0000000000000005 R9 =0000000000000000 R10=0000000000000001 R11=0000000000000001 R12=ffffed100d9c7db5 R13=ffff88806ce3eda8 R14=0000000000000001 R15=dffffc0000000000 RIP=ffffffff813bccdd RFL=00000293 [--S-A-C] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0000 0000000000000000 00000000 00000000 DS =0000 0000000000000000 00000000 00000000 FS =0000 00005555558b3400 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f4bf84a96dc CR3=000000000ffd2000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007f4bf84877c0 00007f4bf84877c8 YMM02=0000000000000000 0000000000000000 00007f4bf84877e0 00007f4bf84877c0 YMM03=0000000000000000 0000000000000000 00007f4bf84877c8 00007f4bf84877c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000