a7efb7aff0a363866208857de47fb222c6875991bdd4399eb948e6e3967a5036cda0cce126de1e56c9e32b9d298695219b25d5f25cf9e8a846e0730311f1b490817c4655e70616817660405092d10ed3d0b83f3e0b5795149038abe8d724acd5d0b1a07875c4662a6a97f2e21fd48fb7cc363e2e39b8b145cdac7ddb67befaa2295c2b3a79d19b8178eadae59e6", @ANYRES16=0x0, @ANYBLOB="020025bd7000fcdbdf2502000000080009000000000008000400ac1e01010800090000000000080002000100000008000400ffffffff08000200000000000c0003000200000000000000"], 0x50}, 0x1, 0x0, 0x0, 0x44}, 0x40841) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:40:43 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xec01, 0x0, 0x0, &(0x7f0000000040)) 18:40:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xa00, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x2f) 18:40:43 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1, 0x0, 0x5b21}, 0x10}}, 0x0) 18:40:43 executing program 5: r0 = getpgid(0x0) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x2000, 0x0) r2 = syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0x100000000, 0x80c0) ioctl$RAW_CHAR_CTRL_SETBIND(r2, 0xac00, &(0x7f0000000200)={0x0, 0x7, 0x0}) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000100)={&(0x7f0000000340)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="000225bd7000fedbdf253100000008000100170000000800db00", @ANYRES32=r2, @ANYBLOB='\b\x00R\x00', @ANYRES32=r0, @ANYBLOB], 0x2c}, 0x1, 0x0, 0x0, 0x4880}, 0x8800) ioctl$KDGKBLED(r2, 0x4b64, &(0x7f0000000240)) getpgid(r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000280)={0x0, 0x0}) syz_open_procfs$namespace(r3, &(0x7f0000000140)='ns/uts\x00') r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r4, &(0x7f0000000300)={0x18}, 0x18) ioctl$NS_GET_PARENT(r4, 0xb705, 0x0) 18:40:43 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xed00, 0x0, 0x0, &(0x7f0000000040)) 18:40:43 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) r2 = ioctl$NS_GET_PARENT(r1, 0xb701, 0x0) setns(r2, 0x40000000) 18:40:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xc00, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x48) 18:40:43 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1, 0x0, 0xf000}, 0x10}}, 0x0) 18:40:43 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xed01, 0x0, 0x0, &(0x7f0000000040)) 18:40:43 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') r1 = ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) setns(r1, 0x2000000) 18:40:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xe00, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20000160) 18:40:43 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1, 0x0, 0x34000}, 0x10}}, 0x0) 18:40:43 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xee00, 0x0, 0x0, &(0x7f0000000040)) 18:40:43 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040)='gtp\x00', 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r2, 0x1}, 0x14}}, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x2c, r2, 0x200, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_O_TEI={0x8}, @GTPA_I_TEI={0x8, 0x8, 0x1}, @GTPA_FLOW={0x6, 0x6, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8080}, 0x800) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) sendmsg$MPTCP_PM_CMD_GET_ADDR(r1, &(0x7f0000004ec0)={&(0x7f0000004e00)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000004e80)={&(0x7f0000004e40)={0x24, 0x0, 0x100, 0x70bd2a, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}]}, 0x24}, 0x1, 0x0, 0x0, 0x4060014}, 0x4) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000004d40)=[{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f00000001c0)="5e7e88e65755846270e1323a8573f15ab05bbd", 0x13}, {&(0x7f0000000200)="0ffad73ef165e8a7a4fe54810aaac8d2dfb3cf418cbba5c3c8458c641a5f64439e3486dafdc221845f4b54a380713c5cce1ef3ba9c57b4c67b6b954f2bb0d5811216ec4fb8cc1950c97e963b27abe207236a4e6669850a7dce0f4b7ec320c758dbffa06ed15ce4a68abb50986b2919659c56a6b9eb35af184b501b55ab1ca95c787ac7b001b25309caf76f5574075c216e2c8e62f093f2a8908ca8054a96491ed69eda25b42853953d54267faaf41f4a611a070ab298bc13531ebdf5e70128025d75a8065ad9e6004f38f861e0f9d0e8e17163977f8ee11d", 0xd8}, {&(0x7f0000000300)="b0bc78c22bd48ab6f8071143213dc548a5ba8873aa33f16f01f70f295744710462ad98b8006a8136cd3240ce1fca3ee75e416f1c9dd94e77811f14cef2f41d80c8b27e6731c9837585fe7f978a80068c53f6b67244ac2472f3771bf497b3dbe61bccb2bd851d34ea231034bc53039cb5f84aa81ecea2d6be653ac719aedbc6ab8d9f4175c6dacbea90e773bc1601694c35c8617a837814c4498ca5a9c9ad521a3bddb6b06f0fe64ff8da03ccc84e07e061e98d33b4141aa67c12e0c908ef4209ec5cc11fa4912869af23c5a95ece6e5cc6c4e2a8fb16a832190647655a296167017869def672fccbee11a69d82150d252b7384dbc8", 0xf5}, {&(0x7f0000000400)="8076acc04028c6a2a6275856546769094587a63dd49644baf21fbbbccd8e0ed5c822d6bc91e508bd38d09adf1518afdea4ae827902934cb8b99c2ff3d260b7181da83998ae118734cc1b1e8768e635c34452b92ddb7def79b646a75845fee503575c02ca0c6cdc1f839713015e051867ea77a73318ab11596e02240741e78d161d5e96a7aeaeb3f7728d38802dc87915afca226fbead3048b53868145579aa", 0x9f}, {&(0x7f00000004c0)="8c37845b8dcd67952ca419b8feefc10cae2a091501f69aac19137f8d02a1ec4f8fca4733e3570b12be0f45cb006a5e492c309287857d30983fc9420ee08fd2352d42786d1aed1fe68b3a83", 0x4b}, {&(0x7f0000000540)="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", 0x1000}, {&(0x7f0000001540)="e21c97ce37d1664f6b60586224233535a2d5", 0x12}], 0x7, &(0x7f0000001600)=[@assoc={0x18, 0x117, 0x4, 0x8}, @iv={0x48, 0x117, 0x2, 0x34, "f16f26ea04d75a866c4e608c01391dd62b959363b31372ee950345ce18b4b3a4e51e2491e087cfecdf1813c436a6947030b29322"}, @assoc={0x18, 0x117, 0x4, 0x400}], 0x78, 0x8040}, {0x0, 0x0, &(0x7f00000018c0)=[{&(0x7f0000001680)="a5", 0x1}, {&(0x7f00000016c0)="0646ddc828dca010160f16b724ab0767900cc912da79315de0f7eaadbece5104db6ab688a97c9d4e187765b33b1b9fc4bd2a61d80640d46e93c7f4c23dba30e60ccba0642caafece599ff291b2a1bc7179b1bbdccb87b76b55e560cc2cd6d2104405bfc59afff97bcc351b267e0cdec6e1571e25e48fdcc0712d4ddfcf4c814b723bae4db3737add63dc3c003629bde6bd5352d1d6a027069310a70967b4961447e025c4130be4fce68400cde657da17fd39f3156cbe286466e799cede40643286561a4620db55d952144134e94a87f0a8685fcb9a6ade04a6b5b1ad3cad263867c662bae5cf9dd6bec1f8269cf5b7", 0xef}, {&(0x7f00000017c0)="87518e5e2f00bd5d6b4e65c2012e0ec84c2c32a39704c9296e94a4835f84595eb5e160e3815caef4eb1e62473ef9e37227bc9581db2a2023becbbc96e5f39f2ce37429575cfcd19aab52c282c3837674331456e42f1a30c44b287cd5b700888730cde302499bd32392927991f9c4dead615a815eb8a8232da9e79af1f40c08fa65682429d16cf6d664857c55a223162759f23e1b41f6f3a9bba925a12c355f328ee3d5b6ca88705571a48fd404149f35b5a647a780524e34ffeb6efd455ef5d616ca1e82ff9a3caedfcf572ac32fbec070b714bb4dfbcb7bb01e809d63bb74a396ddf29bc61d602727ddd66627", 0xed}], 0x3, &(0x7f0000001900)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18, 0x4000000}, {0x0, 0x0, &(0x7f0000004cc0)=[{&(0x7f0000001940)="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", 0x1000}, {&(0x7f0000002940)="c1cb5ce777e2b2978e0ef6384d8b44772676a0a1c332d29ce6d2186a7d6157bf129c25bd0f80758d2029cae1d31bcf5c3367bf395fe3df87e09b978ea2c6525064079dd160c8a5512bdeee0d68560ef34a6dfd1b0ca9250c9bfa70af3c82ed2557fab548e3d883b936e5aaf9941d4416aa2049b433e2572dc40c668d8b9cf8f1ad31cd2859a1b5988e2e37f54aa5849fec1f7c5f7167b54a80509833ad85b7986a7e8935e716e053e46a8895c1bccff61ed25711833c831a6d60b7387510b84063b6353e13144594c7c66f450bb56f4c46", 0xd1}, {&(0x7f0000002a40)="ea14a227", 0x4}, {&(0x7f0000002a80)="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", 0x1000}, {&(0x7f0000003a80)="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", 0xff}, {&(0x7f0000003b80)="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", 0x1000}, {&(0x7f0000004b80)="5c5830b4eb769cd864a8c5ebaef1e0c60e118eb7126db1757c153813112c1bfaaaddb0c016a40bce032f7e3b557095b9fa5c6184565036cc2978eaf7b124a38ee84af84a56ebe22e0487", 0x4a}, {&(0x7f0000004c00)="086e5dea32b4ee1a6c0a0d3d0aca707773bb01a038551ff1d7f9b6964f178bf47d4e2baa6ecb941bac1311c62537d5dc65042d49da57c3fb11630c26ba96cd0088bbeb12e01a7351227b1c63624882d85c6d5b9512f75e684c7c8d36860b76bb4a4d9054a03e94635f473869c5540fd4aaf4ba34b0322f222fd8e9827fba15ae6625723933ff2da6d656", 0x8a}], 0x8, 0x0, 0x0, 0x94}], 0x3, 0x4000004) 18:40:43 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="010026bd7000fcdbdf250100000008000200000000000600060004000000080004007f000001080008000000000008000500e0000001"], 0x3c}, 0x1, 0x0, 0x0, 0x50}, 0x0) openat$char_raw_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/raw/rawctl\x00', 0x204000, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x8971, &(0x7f0000000040)={'veth1_to_batadv\x00', @ifru_mtu}) 18:40:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x4800, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:43 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18, 0x71, 0x0, {{0x0, 0x4}}}, 0x18) r2 = ioctl$NS_GET_PARENT(r1, 0xb702, 0x0) r3 = syz_open_dev$vcsu(&(0x7f00000000c0)='/dev/vcsu#\x00', 0x0, 0x2000) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x54, 0x0, 0x800, 0x70bd2c, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_NETNS_FD={0x8, 0x1d, r1}, @NL802154_ATTR_NETNS_FD={0x8, 0x1d, r2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_NETNS_FD={0x8, 0x1d, r3}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x54}, 0x1, 0x0, 0x0, 0x8010}, 0x20004000) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYRES64=0x0], &(0x7f0000000180)=""/137, 0x27, 0xfe1f, 0x1}, 0x20) 18:40:43 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1, 0x0, 0x400300}, 0x10}}, 0x0) 18:40:43 executing program 2: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/ipc\x00') ioctl$NS_GET_PARENT(r1, 0xb701, 0x0) 18:40:43 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xee01, 0x0, 0x0, &(0x7f0000000040)) 18:40:43 executing program 5: r0 = ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_SET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x1407, 0x1, 0x70bd2b, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r0}]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x4040006) r1 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') ioctl$NS_GET_PARENT(r1, 0xb705, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) r3 = getpgid(0x0) getpgid(r3) syz_open_procfs$namespace(r3, &(0x7f0000000240)='ns/time_for_children\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000001600)={@private1, 0x0}, &(0x7f0000001640)=0x14) syz_genetlink_get_family_id$gtp(&(0x7f00000001c0)='gtp\x00', r2) sendmsg$nl_route(r2, &(0x7f0000001840)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1130008}, 0xc, &(0x7f0000001800)={&(0x7f0000000340)=@can_delroute={0x264, 0x19, 0x20, 0x70bd2c, 0x25dfdbfb, {0x1d, 0x1, 0x3}, [@CGW_CS_CRC8={0x11e, 0x6, {0x1b, 0x71, 0x65, 0xde, 0x8, "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", 0x1, "099f19ec41ea9272ec919b46b3c7e0dfa7e5ca16"}}, @CGW_LIM_HOPS={0x5, 0xd, 0x6}, @CGW_DST_IF={0x8, 0xa, r4}, @CGW_CS_CRC8={0x11e, 0x6, {0x15, 0x32, 0x30, 0x12, 0x2b, "74b2214b8b2b03cdc9dfe92b94971f23c2b74d2333b78df00f006ba6452b12226353972b6a41786202c7276ce15498c19ad2823332bf09b605f84c42132227b8e3a0e98ded7012c71d0be72b41ecfbd604f211caa1464663969a9665e88bf7abeff15d25c06e7b94fe517328f9c4f325e3f8ffc2fe98fe44e0a5a4fdd568bd3654ed6e38f53bc85235e288fc29dbfc4c7e26f24ce9cc4cf1ea9caf91437dee0940124b514a26547e183201c5bfea483810956848723ef992509ee1834f8ba776bf08b4eef5e386a9f2134db09a4531b81ddc98305adc65339a47a3b4b67cd3894c7a7a7e219916313c8354eeaa9cca87bf2c25729c5cf6ea6207823737bfdd9e", 0x1, "605334de52a7dcbfa3c06a656064e41af78f2b29"}}]}, 0x264}, 0x1, 0x0, 0x0, 0x6000001}, 0x20000800) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00', r2) 18:40:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c00, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) 18:40:43 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1, 0x0, 0xf0ffff}, 0x10}}, 0x0) 18:40:43 executing program 2: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r1 = getpgid(0x0) r2 = getpgid(0x0) getpgid(r2) sched_rr_get_interval(r2, &(0x7f0000000240)) getpgid(r1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000140)) getpgid(r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) r4 = syz_open_procfs$namespace(r3, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r4, 0xb701, 0x0) setns(r4, 0x2c000080) r5 = getpgid(r0) sched_rr_get_interval(r5, &(0x7f00000001c0)) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f00000002c0)={'wlan1\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, 0x0, 0x400, 0x70bd27, 0x25dfdbfe, {{}, {@void, @void, @void}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r6}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x0, 0x4c}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x6e}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r7}]}, 0x40}, 0x1, 0x0, 0x0, 0x4001}, 0x20048004) r8 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r8, &(0x7f0000000300)={0x18}, 0x18) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r8, 0xc0182101, &(0x7f0000000200)={0x0, 0x7, 0x7}) 18:40:43 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xef00, 0x0, 0x0, &(0x7f0000000040)) 18:40:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x6800, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:43 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180), 0x106, 0x4}}, 0x20) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r2, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r3, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xc3000480}, 0xc, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0008299e7000fcdbdf259400af7f719e0600010000008300002160603b000300000008a2e07c0245298bfcd76a872020d8f9c24ab5568b70e36d87ac0a80d2510f399e305ff74204241daa67285d5676270eacfceea268d816624b30db804ffbafd71a506880915f4ac9cdfa7e3ed7b0343456fde6f2c49c953365c1e0b3b6b760d7cbd7d0500afea29262035052b94e792e99f6e45ac25bae202e211b0ba0016e779466736f3c00000000", @ANYRES32=0x0, @ANYBLOB="03a45e8c5bcc01f8b90e70867eb24cac10cb2ccf0626c43e5f98580b7d4ced195d87b23df52c61523e3ac9e1ef54b801d9ed97697dd4303ce65ea344d9e245afaa2837ced3af6487279a80d45a48062baca76124ee3078089174e2ddb498e8714987336081101319335682823ab0e5b763742703d5f20ef367a1b3f3b8026f9e7269d400c30a41436116b0c02eb1d96c132cf456d230509a929ed3339cca6eba00adcb"], 0x30}, 0x1, 0x0, 0x0, 0x4000840}, 0x8800) 18:40:43 executing program 0: socketpair(0x2, 0x3, 0x7fffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$gtp(&(0x7f00000000c0)='gtp\x00', 0xffffffffffffffff) r3 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000300)='mptcp_pm\x00', r0) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r3, 0x20, 0x70bd25, 0x25dfdbfd, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x3}]}, 0x1c}}, 0x10) sendmsg$GTP_CMD_NEWPDP(r1, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x540ac}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x34, r2, 0x4, 0x70bd28, 0x25dfdbfd, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_FLOW={0x6, 0x6, 0x3}, @GTPA_NET_NS_FD={0x8}, @GTPA_VERSION={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x4000040) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:40:44 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1, 0x0, 0x1000000}, 0x10}}, 0x0) 18:40:44 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') syz_mount_image$sysv(0x0, 0x0, 0x0, 0x1, &(0x7f0000002140)=[{&(0x7f0000000080)="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", 0xf81}], 0x0, 0x0) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:40:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c00, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:44 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xef01, 0x0, 0x0, &(0x7f0000000040)) 18:40:44 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1, 0x0, 0x2000000}, 0x10}}, 0x0) 18:40:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x7400, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000003000000010000000000009600000000005f00"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) write$P9_RATTACH(r0, &(0x7f0000000000)={0x14, 0x69, 0x2, {0x8, 0x2}}, 0x14) 18:40:44 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) timerfd_gettime(r1, &(0x7f0000000000)) 18:40:44 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x3ff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x9}, r1}}, 0x30) r2 = ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) r3 = syz_open_dev$vcsu(&(0x7f0000000040)='/dev/vcsu#\x00', 0x80000000, 0x4000) read$char_usb(r3, &(0x7f0000000080)=""/43, 0x2b) ioctl$NS_GET_PARENT(r2, 0xb702, 0x0) 18:40:44 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1, 0x0, 0xf000000}, 0x10}}, 0x0) 18:40:44 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xf000, 0x0, 0x0, &(0x7f0000000040)) 18:40:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a00, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb010018000000000000007800000078000000050000000500000000000007000000000e00000000000009050000000e00000000000008040000000e00000006000084000000000700000005000000010001000700000000bfa08eec706123cc00000002000000090000000700000005000000fdffffff000000000100000002000000070000000100000001000000002e000000"], &(0x7f0000000340)=""/134, 0x95, 0x86, 0x1}, 0x20) 18:40:44 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x64, 0x0, 0x20, 0x70bd26, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_ENABLED={0x5}, @NL802154_ATTR_SEC_FRAME_COUNTER={0x8, 0x21, 0x4}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r1}, @NL802154_ATTR_SEC_ENABLED={0x5}]}, 0x64}, 0x1, 0x0, 0x0, 0x1}, 0x0) r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="010000000000000000000b00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00060003000000030000000c00060003000000000000000c000600000000000000000006000a00a1aa000006000a00000000000c000600030000000000000006000a00a1aa00000c000600020000000000000008000300", @ANYRES32=r6], 0x78}}, 0x0) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r7, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="78bf6d00", @ANYRES16=r9, @ANYBLOB="010000000000000000000b00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00060003000000030000000c00060003000000000000000c000600000000000000000006000a00a1aa000006000a00000000000c000600030000000000000006000a00a1aa00000c000600020000000000000008000300", @ANYRES32=r10], 0x78}}, 0x0) sendmsg$NL802154_CMD_GET_SEC_LEVEL(r0, &(0x7f0000000200)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000300)={0x14, r5, 0xd2d42a268405acc, 0x70bd2d, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x20048000}, 0x24040004) ioctl$NS_GET_PARENT(r2, 0xb705, 0x0) 18:40:44 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1, 0x0, 0x215b0000}, 0x10}}, 0x0) 18:40:44 executing program 2: syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) timerfd_create(0x1, 0x80000) 18:40:44 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xf001, 0x0, 0x0, &(0x7f0000000040)) 18:40:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x8800, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYRESOCT=0x0], &(0x7f00000001c0)=""/137, 0x49, 0x89}, 0x20) 18:40:44 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/time\x00') r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18, 0x71, 0x0, {{0x40, 0x0, 0x6}, 0x1977}}, 0x18) setns(r1, 0x20000000) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r4, &(0x7f0000000300)={0x18}, 0x18) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r4, 0xc00c642e, &(0x7f0000000000)={0x0, 0x0, r2}) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18}, 0x18) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) 18:40:44 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1, 0x0, 0x9effffff}, 0x10}}, 0x0) 18:40:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xffffff, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:44 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xf100, 0x0, 0x0, &(0x7f0000000040)) 18:40:44 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0xffff, 0x8, '9P2000.L'}, 0x15) 18:40:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x1000000, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:44 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1, 0x0, 0xf0ffffff}, 0x10}}, 0x0) 18:40:44 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xf101, 0x0, 0x0, &(0x7f0000000040)) 18:40:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000880)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)=""/137, 0x33, 0x89, 0x1}, 0x20) 18:40:44 executing program 5: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/ipc\x00') r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000040)={0x18, 0x71, 0x1, {{0x0, 0x1}, 0x5}}, 0x18) ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) 18:40:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x2000000, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:44 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1, 0x0, 0xfffff000}, 0x10}}, 0x0) 18:40:44 executing program 2: r0 = getpgid(0x0) sched_rr_get_interval(r0, &(0x7f0000000040)) getpgid(r0) syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/user\x00') syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) ioctl$NS_GET_PARENT(r1, 0xb701, 0x0) socket$alg(0x26, 0x5, 0x0) socket$alg(0x26, 0x5, 0x0) 18:40:44 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xf200, 0x0, 0x0, &(0x7f0000000040)) 18:40:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01011c000000000000bba019b9000c0006ab3502d8f12d9088b685b2f518f5000c0004000300000001", @ANYRES32], &(0x7f00000001c0)=""/121, 0x27, 0x79, 0x1}, 0x20) 18:40:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x3000000, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:44 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') write$P9_RLCREATE(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0xf, 0x1, {{0x4, 0x0, 0x7}, 0x6}}, 0x18) ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) 18:40:44 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1, 0x0, 0xffffff7f}, 0x10}}, 0x0) 18:40:44 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, &(0x7f0000000000)) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/ipc\x00') ioctl$NS_GET_PARENT(r1, 0xb701, 0x0) 18:40:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:40:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000000, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:45 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xf201, 0x0, 0x0, &(0x7f0000000040)) 18:40:45 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) 18:40:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x3, [@struct={0x1, 0x0, 0x0, 0x4, 0x0, 0xffffffff}, @restrict={0x2, 0x0, 0x0, 0xb, 0x5}, @union={0xb, 0x5, 0x0, 0x5, 0x0, 0x80000000, [{0xa, 0x2, 0x19a}, {0x1, 0x4, 0x5}, {0x9, 0x1, 0x3}, {0x6, 0x0, 0x90a2}, {0xb, 0x4, 0x10000}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x3}}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x93, 0x89, 0x1}, 0x20) 18:40:45 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') r1 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f0000000080)={0x148, 0x14, 0x10, 0x70bd26, 0x25dfdbfc, {0x27, 0x7}, [@INET_DIAG_REQ_BYTECODE={0x3b, 0x1, "3a817cb8fad46aaf842f3c436303a1287b9093c6e6e309ab170336f367709f883241c1343f61a4377646d14688e18be5e7b465aa943032"}, @INET_DIAG_REQ_BYTECODE={0x3a, 0x1, "cd2b5d09026d4853145b67aa957722cdffc3da44ceeda5b02985d6c47fac303a954269430d71126fb63f7d9f330ac523660f67509d02"}, @INET_DIAG_REQ_BYTECODE={0x32, 0x1, "00c0df7b9440e8709d09a94b088c9bfdf289c620ff816fafb667684316b035e3285cdd1553a7a7d4cd15f5f561c2"}, @INET_DIAG_REQ_BYTECODE={0x1e, 0x1, "16ef16a0f90f97a5f617d10fcc3897cf2cf4bd79e184727b8489"}, @INET_DIAG_REQ_BYTECODE={0x67, 0x1, "edcf21a3d75ca15dcb0ab12def4a914ac212595cb311b99d084452ba452e672bfc8ae3042032b6ca3282f0f59eb181d138478a0776e7e8ffd88115e9d8439e3e1da19ec6574080a8578d69100b5cc4414dc63c598cd1b5fcb027d1c8cd51deb34dc5dc"}]}, 0x148}, 0x1, 0x0, 0x0, 0x8000}, 0x0) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:40:45 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1, 0x0, 0xffffff9e}, 0x10}}, 0x0) 18:40:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x5000000, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:45 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xf300, 0x0, 0x0, &(0x7f0000000040)) 18:40:45 executing program 5: r0 = getpgid(0x0) r1 = getpgid(r0) r2 = syz_open_procfs$namespace(r1, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r2, 0xb705, 0x0) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140)='nl802154\x00', 0xffffffffffffffff) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="010000000000000000000b00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00060003000000030000000c00060003000000000000000c000600000000000000000006000a00a1aa000006000a00000000000c000600030000000000000006000a00a1aa00000c000600020000000000000008000300", @ANYRES32=r7], 0x78}}, 0x0) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x34, r3, 0x4, 0x70bd2c, 0x25dfdbfb, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r7}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_PID={0x8, 0x1c, r0}]}, 0x34}, 0x1, 0x0, 0x0, 0x40}, 0x81) wait4(r1, 0x0, 0x20000000, &(0x7f0000000040)) 18:40:45 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, 0x1407, 0x200, 0x70bd2c, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz0\x00'}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz1\x00'}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000004}, 0x0) 18:40:45 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) shmget(0x2, 0x3000, 0x0, &(0x7f0000ff9000/0x3000)=nil) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYRESOCT=0x0, @ANYRESDEC=r2, @ANYRESDEC=r1, @ANYRESDEC, @ANYRES64=r0, @ANYRES32=r0], &(0x7f0000000080)=""/142, 0x27, 0x8e, 0x1}, 0x20) 18:40:45 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1, 0x0, 0xfffffff0}, 0x10}}, 0x0) 18:40:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x6000000, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:45 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xf301, 0x0, 0x0, &(0x7f0000000040)) 18:40:45 executing program 5: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_RWSTAT(r0, &(0x7f0000000000)={0x7, 0x7f, 0x2}, 0x7) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) ioctl$NS_GET_PARENT(r1, 0xb705, 0x0) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) 18:40:45 executing program 2: ioctl$RAW_CHAR_CTRL_GETBIND(0xffffffffffffffff, 0xac01, &(0x7f0000000040)={0x1, 0x7, 0x0}) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:40:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb0100180000000000001d7da4001000000010000000030000000c0000000000000e0300000000000000005f00c88d7c5e5bc6f8b371529b707ccde98a7dbc24f2dbe684fdd74b7c5a30f6aebe368739a4b239baa313f2d7ed025337e9f52eb1acd53852e32283d641acc8af57e0ce6f3332a64a65308899ff22820c61d43117a3408d6140bc7ac126e1cc0821cad13a566b56fe91301dcee8370196dd5dcb598c"], &(0x7f00000001c0)=""/137, 0x14, 0x89, 0x1}, 0x20) 18:40:45 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1, 0x0, 0xffffffff}, 0x10}}, 0x0) 18:40:45 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) setns(r1, 0x20000) r2 = ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) setns(r2, 0x2000000) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, @ax25={0x3, @default, 0x2}, @ipx={0x4, 0x1ff, 0x1, "ed7fcb6824b0", 0x4}, @vsock={0x28, 0x0, 0x2711}, 0x8, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000000)='veth0_to_bridge\x00', 0x1, 0x9, 0x1}) ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) 18:40:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x7000000, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:45 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xf400, 0x0, 0x0, &(0x7f0000000040)) 18:40:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x31, 0x31, 0x3, [@datasec={0x1, 0x3, 0x0, 0xf, 0x25, [{0x1, 0x4, 0x7}, {0x1, 0x3ff}, {0x40000001, 0x9, 0x7}], "b4"}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x4f, 0x89, 0x1}, 0x20) 18:40:45 executing program 2: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18}, 0x18) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="010000000000000000000b00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00060003000000030000000c00060003000000000000000c000600000000000000000006000a00a1aa000006000a00000000000c000600030000000000000006000a00a1aa00000c000600020000000000000008000300", @ANYRES32=r7], 0x78}}, 0x0) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, r2, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@NL802154_ATTR_PID={0x8, 0x1c, 0xffffffffffffffff}, @NL802154_ATTR_NETNS_FD={0x8, 0x1d, r3}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r7}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x38}, 0x1, 0x0, 0x0, 0x810}, 0x10) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:40:45 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x7}}, 0x0) 18:40:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xa000000, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:45 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xf401, 0x0, 0x0, &(0x7f0000000040)) 18:40:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010000000000000000000000000000000000030069d0a63d415304bd13dcc4eaf898db3e9c5870d3fda5eb118ba461998b65f6bcff87f5532f5b5ef8ef0f68ff6c4c0e945ed262ee20c3e7edbc81ba05fc55945d3f06d70b8507f54b6c1db6e94e3a31e612edab4b6eb9a6efeb1c5ab8b5981d89a963ba8c728d"], &(0x7f0000000280)=""/118, 0x1b, 0x76, 0x1}, 0x20) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10f, 0x10f, 0x9, [@typedef={0x1}, @enum={0x1, 0x3, 0x0, 0x6, 0x4, [{0xf, 0xb9f}, {0x10, 0x5}, {0x3, 0x773}]}, @volatile={0x6, 0x0, 0x0, 0x9, 0x3}, @datasec={0xc, 0x4, 0x0, 0xf, 0x2, [{0x1, 0x1, 0x8c4}, {0x2, 0x0, 0xb42}, {0x1, 0x2, 0x6}, {0x3, 0xfff, 0x22ec}], "85b3"}, @datasec={0x1, 0x1, 0x0, 0xf, 0x1, [{0x5, 0x33, 0x800}], 'j'}, @struct={0x3, 0x6, 0x0, 0x4, 0x0, 0x3, [{0x4, 0x5, 0x401}, {0xc, 0x2, 0x20}, {0xa, 0x1, 0x8}, {0xc, 0x2, 0x7fffffff}, {0xe, 0x0, 0x3}, {0x10, 0x2, 0x100}]}, @volatile={0x2, 0x0, 0x0, 0x9, 0x1}, @restrict={0xe, 0x0, 0x0, 0xb, 0x5}, @int={0x10, 0x0, 0x0, 0x1, 0x0, 0x36, 0x0, 0x7f, 0x4}]}, {0x0, [0x30, 0x2e, 0x61, 0x30, 0x0, 0x30, 0x2e]}}, &(0x7f0000000440)=""/4096, 0x131, 0x1000, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000001c0)={r0, 0x10, &(0x7f0000000180)={&(0x7f0000001440)=""/4096, 0x1000}}, 0x10) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000080)=0x3) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) 18:40:45 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040)='gtp\x00', 0xffffffffffffffff) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x800, 0x70bd2a, 0x25dfdbff, {}, [@GTPA_VERSION={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x400c000) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x6c}, @void, @val={0xc}}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x0, 0xf}}]}, 0x3c}}, 0x0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r4, &(0x7f0000000300)={0x18}, 0x18) r5 = getpgid(0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, r3, 0x10, 0x70bd26, 0x25dfdbfc, {{}, {@val={0x8, 0x1, 0x1a}, @void, @void}}, [@NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_PID={0x8, 0x52, r5}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r0}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r0}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000041) r6 = ioctl$NS_GET_PARENT(r2, 0xb702, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r4, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000440)={0x44, 0x1407, 0x100, 0x70bd2b, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r6}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x44}, 0x1, 0x0, 0x0, 0x48800}, 0x20040000) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r7, &(0x7f0000000300)={0x18}, 0x18) write$P9_RREADDIR(r7, &(0x7f0000000540)={0xb, 0x29, 0x2, {0x2}}, 0xb) ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r8, 0x8933, &(0x7f0000000740)={'wpan4\x00'}) sendmsg$NL802154_CMD_GET_INTERFACE(r8, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0x68, 0x0, 0x800, 0x70bd29, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x68}, 0x1, 0x0, 0x0, 0x20000000}, 0x44055) 18:40:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xc000000, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:45 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0xf}}, 0x0) 18:40:45 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000080)='gtp\x00', 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r1, 0x100, 0x70bd27, 0x25dfdbff, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @multicast2}, @GTPA_FLOW={0x6, 0x6, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x20048810}, 0x14) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:40:45 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xf500, 0x0, 0x0, &(0x7f0000000040)) 18:40:45 executing program 0: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) ioctl$NS_GET_NSTYPE(r0, 0xb703, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_TX_POWER(r1, &(0x7f0000000980)={0x0, 0x0, 0x0}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000b00000000c0000000c000000030000001a0000000000000000000000005f00"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) syz_mount_image$sysv(&(0x7f0000000040)='sysv\x00', &(0x7f00000000c0)='./file0\x00', 0x8001, 0x3, &(0x7f0000001300)=[{&(0x7f0000000100)="0c0fb257c76250134b49", 0xa, 0x5}, {&(0x7f0000000280)="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", 0x1000, 0x4000000000000000}, {&(0x7f0000001280)="795b55ea3b884ce789e4af7cd3c81ec895b5e17847c45a23521e449155682da5fbbeb41c8fdeb5b607617b86aa082e85f8d0fb732e4e9c797f632924983b4e93121e4dc890d1ca7ed0d2df09b6dcb0bfcb4a73d86f954a9d91aff536920dc1b2f53e30d7434a53279c3d", 0x6a, 0x1}], 0x2044040, &(0x7f0000001380)={[{'/proc/sys/net/ipv4/vs/sync_persist_mode\x00'}], [{@euid_lt={'euid<', 0xee00}}, {@measure='measure'}, {@fsmagic={'fsmagic', 0x3d, 0x100000001}}]}) 18:40:45 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0xc0}}, 0x0) 18:40:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xe000000, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:45 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/time\x00') r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/mnt\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:40:45 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xf501, 0x0, 0x0, &(0x7f0000000040)) 18:40:45 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wlan0\x00'}) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) sendmsg$RDMA_NLDEV_CMD_SYS_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="4c000000071400022d020073797a320000000008004400"/32, @ANYRES32=r1, @ANYBLOB="05005400000000000900020073797a31000000000900020073797a32000000000800010001000000"], 0x4c}, 0x1, 0x0, 0x0, 0x840}, 0x20000800) socket$bt_cmtp(0x1f, 0x3, 0x5) 18:40:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x10000000, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:45 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0xec0}}, 0x0) 18:40:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd8, 0xd8, 0x8, [@func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{0x0, 0x2}, {0x5, 0x1}, {0x1, 0x3}, {}, {0x4, 0x3}, {0xf, 0x3}]}, @const={0x0, 0x0, 0x0, 0xa, 0x4}, @const={0x0, 0x0, 0x0, 0xa, 0x4}, @volatile={0xb, 0x0, 0x0, 0x9, 0x3}, @volatile={0x1, 0x0, 0x0, 0x9, 0x3}, @struct={0x5, 0x2, 0x0, 0x4, 0x1, 0x3, [{0x10, 0x4, 0xfffffff7}, {0xb, 0x5, 0x5}]}, @enum={0xd, 0x6, 0x0, 0x6, 0x4, [{0x1, 0xeb6}, {0x5, 0xe90}, {0xe, 0x10000}, {0x8, 0x7f}, {0x0, 0x5}, {0x9, 0x6d}]}, @func={0xc, 0x0, 0x0, 0xc, 0x2}]}, {0x0, [0x2e, 0x2e, 0x10, 0x7, 0x61, 0x30]}}, &(0x7f0000000380)=""/150, 0xf8, 0x96, 0x1}, 0x20) 18:40:45 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:40:46 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000002080)={@mcast1, 0x0}, &(0x7f00000020c0)=0x14) sendmsg$GTP_CMD_DELPDP(r1, &(0x7f00000021c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000002180)={&(0x7f0000002100)={0x6c, 0x0, 0xd0a, 0x70bd25, 0x25dfdbff, {}, [@GTPA_FLOW={0x6, 0x6, 0x4}, @GTPA_LINK={0x8, 0x1, r2}, @GTPA_TID={0xc, 0x3, 0x4}, @GTPA_I_TEI={0x8, 0x8, 0x4}, @GTPA_PEER_ADDRESS={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0xb}}, @GTPA_LINK={0x8}, @GTPA_I_TEI={0x8, 0x8, 0x1}, @GTPA_TID={0xc, 0x3, 0x1}, @GTPA_MS_ADDRESS={0x8, 0x5, @local}, @GTPA_O_TEI={0x8, 0x9, 0x2}]}, 0x6c}, 0x1, 0x0, 0x0, 0x40090}, 0x40000) ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) 18:40:46 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xf600, 0x0, 0x0, &(0x7f0000000040)) 18:40:46 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x33fe0}}, 0x0) 18:40:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="200000000714020029bd7000fcdbdf25050054000100000008004400", @ANYRES32, @ANYBLOB="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"], 0x20}}, 0x1) 18:40:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x48000000, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:46 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/ipc\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x40c042, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r1, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x18, 0x1407, 0x8, 0x70bd2d, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_DIM={0x5}]}, 0x18}}, 0x24000000) 18:40:46 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xf601, 0x0, 0x0, &(0x7f0000000040)) 18:40:46 executing program 5: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/time\x00') setns(r1, 0x10000000) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18}, 0x18) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb705, 0x0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) ioctl$IMADDTIMER(r4, 0x80044940, &(0x7f0000000080)=0x20baab1d8d419115) write$P9_RLINK(r4, &(0x7f0000000000)={0x7, 0x47, 0x1}, 0x7) 18:40:46 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x20001390}}, 0x0) 18:40:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) 18:40:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c000000, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:46 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xf700, 0x0, 0x0, &(0x7f0000000040)) 18:40:46 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, r1, 0x400, 0x70bd25, 0x25dfdbff, {}, [@NL802154_ATTR_SEC_DEVKEY={0x18, 0x24, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0x80}, @NL802154_DEVKEY_ATTR_ID={0xc, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0xff}]}]}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x38}, 0x1, 0x0, 0x0, 0xa040}, 0x4) syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/cgroup\x00') r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) ioctl$TCGETS2(r2, 0x802c542a, &(0x7f0000000100)) syz_open_dev$vcsu(&(0x7f0000000140)='/dev/vcsu#\x00', 0x3, 0x191600) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18}, 0x18) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000340)='nl802154\x00', r0) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x20, r5, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}]}, 0x20}, 0x1, 0x0, 0x0, 0x4084}, 0x20000000) write$P9_ROPEN(r4, &(0x7f0000000300)={0x18}, 0x18) ioctl$NS_GET_PARENT(r4, 0xb701, 0x0) r6 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x26040, 0x0) ioctl$NS_GET_PARENT(r6, 0xb702, 0x0) 18:40:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x68000000, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) 18:40:46 executing program 5: r0 = getpgid(0x0) getpgid(r0) r1 = syz_open_procfs$namespace(r0, &(0x7f0000000140)='ns/pid_for_children\x00') ioctl$NS_GET_PARENT(r1, 0xb705, 0x0) 18:40:46 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x20001410}}, 0x0) 18:40:46 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xf701, 0x0, 0x0, &(0x7f0000000040)) 18:40:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c000000, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:46 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/time_for_children\x00') ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:40:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) syz_genetlink_get_family_id$gtp(&(0x7f0000000000)='gtp\x00', r0) 18:40:46 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xf800, 0x0, 0x0, &(0x7f0000000040)) 18:40:46 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x7ffff000}}, 0x0) 18:40:46 executing program 5: r0 = getpgid(0x0) getpgid(r0) r1 = getpgid(r0) r2 = syz_open_procfs$namespace(r1, &(0x7f0000000140)='ns/uts\x00') ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)) r3 = syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0x3, 0x109880) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000380)={0x0, 0x0}) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000400)={[], 0x2, 0x4, 0x40, 0xd6c, 0x4000000000000000, r4}) ioctl$NS_GET_PARENT(r2, 0xb705, 0x0) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={0xffffffffffffffff}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r5, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0xd2, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x3, 0x5}, 0x0, 0x0, &(0x7f0000000180)={0x2, 0x9, 0x10001}, &(0x7f00000001c0)=0x2bd6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0xfffffffffffffffe}}, 0x10) 18:40:46 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xf801, 0x0, 0x0, &(0x7f0000000040)) 18:40:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x74000000, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:40:46 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f0000000080)=@ipv6_delrule={0x70, 0x21, 0x400, 0x70bd2a, 0x25dfdbfb, {0xa, 0x0, 0x20, 0x7f, 0xed, 0x0, 0x0, 0x1, 0x10000}, [@FIB_RULE_POLICY=@FRA_DPORT_RANGE={0x8, 0x18, {0x4e20, 0x4e22}}, @FIB_RULE_POLICY=@FRA_OIFNAME={0x14, 0x11, 'sit0\x00'}, @FIB_RULE_POLICY=@FRA_TABLE={0x8, 0xf, 0x9}, @FIB_RULE_POLICY=@FRA_PRIORITY={0x8, 0x6, 0xdf}, @FRA_SRC={0x14, 0x2, @private1={0xfc, 0x1, [], 0x1}}, @FRA_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}}]}, 0x70}, 0x1, 0x0, 0x0, 0x20008000}, 0x4) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:40:46 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0xfffffdef}}, 0x0) 18:40:46 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000000)) ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) [ 2051.071950] blktrace: Concurrent blktraces are not allowed on loop3 18:40:46 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xf900, 0x0, 0x0, &(0x7f0000000040)) 18:40:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a000000, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x1}]}, {0x0, [0x5f, 0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_RLINK(r0, &(0x7f0000000040)={0x7, 0x47, 0x11}, 0x7) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) inotify_rm_watch(r1, 0x0) ioctl$IOCTL_STATUS_ACCEL_DEV(r0, 0x40046103, &(0x7f0000000000)={0x1, 0x5, 0x401, 0x7, 0x4, 0x3, 0xff, 0x66, 0x1, 0x26, 0x80, "0f8fd8930e8f8bd3d02706fbf1446b5a16e4170f36744783f69a10f575101d25"}) 18:40:46 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ocfs2_control\x00', 0x88800, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000280)='mptcp_pm\x00', r1) r2 = ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) sendmsg$nl_route(r1, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0xef0e51d43ed8372d}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=@RTM_NEWNSID={0x2c, 0x58, 0x400, 0x70bd28, 0x25dfdbff, {}, [@NETNSA_NSID={0x8, 0x1, 0x4}, @NETNSA_FD={0x8, 0x3, r1}, @NETNSA_FD={0x8, 0x3, r2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000010}, 0x4000) sendmsg$GTP_CMD_GETPDP(r1, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x2c, 0x0, 0x20, 0x70bd26, 0x25dfdbfe, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_LINK={0x8}, @GTPA_I_TEI={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x840) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000000c0)={0x0, 0xfffffffffffffe81, 0xfa00, {0x4, &(0x7f0000000080), 0x17, 0xa}}, 0x20) r4 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') ioctl$NS_GET_PARENT(r4, 0xb701, 0x0) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r5, &(0x7f0000000300)={0x18}, 0x18) sendmsg$802154_raw(r5, &(0x7f0000000240)={&(0x7f0000000100)={0x24, @long={0x3, 0x1, {0xaaaaaaaaaaaa0302}}}, 0x14, &(0x7f0000000140)={&(0x7f00000001c0)="97e711509f66c589dbbd0e07560441510526d780809a8ce2b6132ec1c2a9e8e02453351950474dce3867321644df537e773d80c83420b852405b190c9cb87b1d10bcd773cb4902d4b13bd61abf391bdc0c8af4a83e83", 0x56}, 0x1, 0x0, 0x0, 0x44800}, 0x80) 18:40:46 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x7}, 0x0) 18:40:46 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xf901, 0x0, 0x0, &(0x7f0000000040)) 18:40:46 executing program 5: getpgid(0x0) r0 = getpgid(0x0) getpgid(r0) r1 = syz_open_procfs$namespace(r0, &(0x7f00000000c0)='ns/pid_for_children\x00') r2 = shmget(0x3, 0x4000, 0x20, &(0x7f0000ff9000/0x4000)=nil) r3 = getgid() r4 = getpgid(0x0) getpgid(r4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)={0x0, 0x0}) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000180)={{0x0, 0x0, 0xee01, 0x0, r3, 0x0, 0x80}, 0x6, 0x7699ef10, 0xc3d5, 0x6, r4, r5, 0xc1}) ioctl$NS_GET_PARENT(r1, 0xb705, 0x0) r6 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x5, 0x2) ioctl$sock_bt_cmtp_CMTPCONNADD(r6, 0x400443c8, &(0x7f0000000040)={0xffffffffffffffff, 0x800f7a2}) 18:40:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x88000000, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:46 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x8}, 0x0) 18:40:46 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xfa00, 0x0, 0x0, &(0x7f0000000040)) 18:40:46 executing program 0: sendmsg$NL802154_CMD_GET_INTERFACE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x44, 0x0, 0x800, 0x70bd28, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000002}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0xb96d77dd5424e089}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000880}, 0x4000000) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000000c00000003000040010000000000000400000000005f00"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:40:46 executing program 2: ioctl$sock_bt_cmtp_CMTPGETCONNLIST(0xffffffffffffffff, 0x800443d2, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{}, {}]}) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[], 0x44}, 0x1, 0x0, 0x0, 0x800}, 0x4) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000040)=0x4) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:40:47 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/pid_for_children\x00') ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) 18:40:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0xffffff00, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:47 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)=""/137, 0x27, 0x89, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={r0, 0x10, &(0x7f00000000c0)={&(0x7f0000000000)=""/117, 0x75, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000180)=r1, 0x4) 18:40:47 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0xffffff1f}, 0x0) 18:40:47 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xfa01, 0x0, 0x0, &(0x7f0000000040)) 18:40:47 executing program 2: write$P9_RLINK(0xffffffffffffffff, &(0x7f0000000040)={0x7, 0x47, 0x2}, 0x7) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:40:47 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x6c, 0x0, 0x2, 0x70bd2a, 0x25dfdbfc, {{}, {@val={0x8, 0x1, 0xb}, @void, @val={0xc, 0x99, {0x0, 0xf}}}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r1}, @NL80211_ATTR_PID={0x8, 0x52, 0xffffffffffffffff}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x80000000, 0x78}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x48}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r2}, @NL80211_ATTR_PID={0x8, 0x52, 0xffffffffffffffff}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r0}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x61}]}, 0x6c}, 0x1, 0x0, 0x0, 0x40000}, 0x20008020) ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) 18:40:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:47 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x7}, {0x0, [0x0, 0x30, 0x5f, 0x0, 0x5f]}}, &(0x7f00000001c0)=""/137, 0x1f, 0x89, 0x1}, 0x20) 18:40:47 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xfb00, 0x0, 0x0, &(0x7f0000000040)) 18:40:47 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x2}, 0x0) 18:40:47 executing program 2: ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb701, 0x0) 18:40:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:47 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/mnt\x00') ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) 18:40:47 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1, 0x0, 0x0, 0x4, 0x0, 0xffffffff}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x800001}, 0x20) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x40000, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ocfs2_control\x00', 0x84002, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb3, 0xb3, 0x8, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x4, 0x6}}, @volatile={0x10, 0x0, 0x0, 0x9, 0x4}, @const={0x4, 0x0, 0x0, 0xa, 0x5}, @ptr={0x0, 0x0, 0x0, 0x2, 0x5}, @ptr={0x8, 0x0, 0x0, 0x2, 0x2}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x5f, 0x0, 0x43, 0x2}, @ptr={0xe, 0x0, 0x0, 0x2, 0x1}, @var={0x10, 0x0, 0x0, 0xe, 0x3}, @datasec={0xb, 0x1, 0x0, 0xf, 0x3, [{0x3, 0x0, 0x1}], "8f2248"}, @func_proto={0x0, 0x3, 0x0, 0xd, 0x0, [{0x7, 0x5}, {0x10, 0x3}, {0xd, 0x2}]}]}, {0x0, [0x5f, 0x2e, 0x5f, 0x2e, 0x30, 0x0]}}, &(0x7f0000000380)=""/231, 0xd4, 0xe7}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r0, 0x10, &(0x7f0000000040)={&(0x7f0000000480)=""/241, 0xf1}}, 0x10) 18:40:47 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0xf}, 0x0) 18:40:47 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xfb01, 0x0, 0x0, &(0x7f0000000040)) 18:40:47 executing program 2: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) r1 = syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/time_for_children\x00') ioctl$NS_GET_PARENT(r1, 0xb701, 0x0) 18:40:47 executing program 5: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') r0 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x9, 0x40002) ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) 18:40:47 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x6, 0x0, 0x0, 0xe, 0x1, 0x1}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x2b, 0x89, 0x1}, 0x20) 18:40:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:47 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0xf0}, 0x0) 18:40:47 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xfc00, 0x0, 0x0, &(0x7f0000000040)) 18:40:47 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) write$P9_RLERRORu(r1, &(0x7f0000000040)={0x13, 0x7, 0x1, {{0x6, '{{\xdc+-*'}, 0x4}}, 0x13) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_getaddr={0x28, 0x16, 0x400, 0x70bd2a, 0x25dfdbfb, {0x2, 0x78, 0x44, 0x2}, [@IFA_FLAGS={0x8, 0x8, 0x180}, @IFA_BROADCAST={0x8, 0x4, @loopback}]}, 0x28}, 0x1, 0x0, 0x0, 0x4040010}, 0x0) 18:40:47 executing program 0: r0 = shmget(0x1, 0x1000, 0x2, &(0x7f0000fff000/0x1000)=nil) fanotify_mark(0xffffffffffffffff, 0x8, 0x102b, 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') r1 = getpgid(0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000180)={[], 0x3, 0x0, 0x1f, 0x9, 0x3, r1}) getpgid(r1) shmctl$SHM_INFO(r0, 0xe, &(0x7f0000000080)=""/23) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18}, 0x18) write$USERIO_CMD_REGISTER(r3, &(0x7f0000000100)={0x0, 0xfb}, 0x2) shmctl$IPC_SET(r0, 0x1, &(0x7f0000000000)={{0x2, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff, 0x0, 0x20, 0x7}, 0x6, 0x1, 0x1, 0xfffffffffffffc00, 0x0, r1, 0x3}) shmget(0x1, 0x2000, 0x800, &(0x7f0000ffe000/0x2000)=nil) 18:40:47 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x7) ioctl$sock_SIOCADDRT(r0, 0x8982, &(0x7f0000000080)={0x0, @ipx={0x4, 0x0, 0x0, "0e681850972f"}, @l2={0x1f, 0x0, @none}, @qipcrtr}) r1 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') ioctl$NS_GET_PARENT(r1, 0xb705, 0x0) 18:40:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:47 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0xf00}, 0x0) 18:40:47 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xfc01, 0x0, 0x0, &(0x7f0000000040)) 18:40:47 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mISDNtimer\x00', 0x200, 0x0) 18:40:47 executing program 0: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, r0, 0x200, 0x70bd28, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x20}, 0x1, 0x0, 0x0, 0x100}, 0x4000) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000000)={0x15, 0x65, 0xffff, 0x5, 0x8, '9P2000.L'}, 0x15) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="9fd4eb01001800000000000000b38cbbdd0c0000000c000000030000000100000059c52e80000000da28fa0333e509c11d8f09a479fc6366e35dd0c6832e664d0dbe7f9fdf8570429b2f6ff27a03f9f787cc7da64d2fe32cb163c45bb73d6817e7f3"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:40:47 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x215b}, 0x0) 18:40:47 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xfd00, 0x0, 0x0, &(0x7f0000000040)) 18:40:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x63, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:47 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x5c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfc, {}, [@GTPA_FLOW={0x6, 0x6, 0x4}, @GTPA_TID={0xc, 0x3, 0x4}, @GTPA_I_TEI={0x8, 0x8, 0x3}, @GTPA_TID={0xc, 0x3, 0x3}, @GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_O_TEI={0x8, 0x9, 0x2}, @GTPA_NET_NS_FD={0x8, 0x7, r1}, @GTPA_NET_NS_FD={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x800}, 0x40030) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') ioctl$NS_GET_PARENT(r2, 0xb701, 0x0) 18:40:47 executing program 5: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, &(0x7f0000000000), 0x2) 18:40:47 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:40:47 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x5b21}, 0x0) 18:40:47 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) syz_open_dev$vcsu(&(0x7f0000000140)='/dev/vcsu#\x00', 0x2, 0x32083) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) r2 = ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x1407, 0x800, 0x70bd28, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r2}]}, 0x28}, 0x1, 0x0, 0x0, 0x41}, 0x40) 18:40:47 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xfd01, 0x0, 0x0, &(0x7f0000000040)) 18:40:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3fe, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:47 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x400, 0x0) ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x5, 0xff, 0x2}, {0x9, 0x8, 0x6, 0x1}]}) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) 18:40:47 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000001440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x3, [@struct={0x4}, @ptr={0xf, 0x0, 0x0, 0x2, 0x4}, @typedef={0x1, 0x0, 0x0, 0x8, 0x2}, @volatile={0x20000002, 0x0, 0x0, 0x9, 0x2}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x4b, 0x89, 0x1}, 0x20) modify_ldt$read_default(0x2, &(0x7f0000000440)=""/4096, 0x1000) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe4, 0xe4, 0x4, [@fwd={0x1}, @struct={0xd, 0x6, 0x0, 0x4, 0x0, 0xe, [{0x5, 0x3, 0x4}, {0x10, 0x1, 0x8001}, {0x2, 0x1, 0x5}, {0xb, 0x5, 0x7fff}, {0x3, 0x4, 0x80000001}, {0xc, 0x2, 0x2}]}, @union={0x0, 0x1, 0x0, 0x5, 0x1, 0x6, [{0xc, 0x1, 0xfffffffd}]}, @var={0x7, 0x0, 0x0, 0xe, 0x4, 0x1}, @var={0xc, 0x0, 0x0, 0xe, 0x1, 0x1}, @union={0x2, 0x3, 0x0, 0x5, 0x0, 0x3, [{0x6, 0x3, 0x800}, {0x0, 0x4, 0x1}, {0x4, 0x0, 0x3}]}, @func={0x2, 0x0, 0x0, 0xc, 0x5}, @int={0xc, 0x0, 0x0, 0x1, 0x0, 0x40, 0x0, 0x7d, 0x3}]}, {0x0, [0x61, 0x2e]}}, &(0x7f0000000000)=""/13, 0x100, 0xd}, 0x20) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000280)={'wlan0\x00'}) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r0, 0x800443d2, &(0x7f0000000180)={0x4, &(0x7f00000000c0)=[{}, {@none}, {@fixed}, {}]}) 18:40:47 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0xf000}, 0x0) 18:40:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x5f5e0ff, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:48 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xfe00, 0x0, 0x0, &(0x7f0000000040)) 18:40:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000f000000010000000000000400000000005f00b207af92efa17a7155854f00633742dd42e817abff80cc211ef2e50c1a127b8d91acb7494e83a262c1317a4a13e0d7f1bb8cb2b772523680064e9215d04747d18d370430326dc7911031a683616140e72dcd1c035e6b31742e343b1ad30a8776a56f1f16c19af294dafe499d949655248b81bee635"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18, 0x71, 0x0, {{0x1}}}, 0x18) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18, 0x71, 0x0, {{0x0, 0x2, 0xfffffffffffffffc}}}, 0x18) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x10, &(0x7f0000000000)={&(0x7f0000000280)=""/138, 0x8a}}, 0x10) 18:40:48 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040)='gtp\x00', 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r2, 0x1}, 0x14}}, 0x0) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x54, r2, 0x400, 0x70bd28, 0x25dfdbff, {}, [@GTPA_FLOW={0x6, 0x6, 0x2}, @GTPA_O_TEI={0x8, 0x9, 0x4}, @GTPA_MS_ADDRESS={0x8, 0x5, @private=0xa010102}, @GTPA_VERSION={0x8}, @GTPA_MS_ADDRESS={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @GTPA_LINK={0x8}, @GTPA_FLOW={0x6, 0x6, 0x4}, @GTPA_I_TEI={0x8, 0x8, 0x3}]}, 0x54}, 0x1, 0x0, 0x0, 0x4048000}, 0x44000) 18:40:48 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r1, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x28, 0x1407, 0x200, 0x70bd25, 0x25dfdbfd, "", [@RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r2}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x84}, 0x20000000) 18:40:48 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x34000}, 0x0) 18:40:48 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xfe01, 0x0, 0x0, &(0x7f0000000040)) 18:40:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000003000000010000000000000409000000005f00"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) syz_open_dev$tty1(0xc, 0x4, 0x2) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000480)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x3, [@ptr={0x10, 0x0, 0x0, 0x2, 0x1}, @const={0x40, 0x0, 0x0, 0xa, 0x5}, @const={0x8}, @union={0x10, 0x5, 0x0, 0x5, 0x1, 0xc0a, [{0xa, 0x2, 0x1000}, {0x4, 0x2, 0x8e9}, {0x6, 0x4, 0x80}, {0xf, 0x0, 0x81}, {0xb, 0x3}]}]}, {0x0, [0x0]}}, &(0x7f0000000540)=""/194, 0x87, 0xc2}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x30]}}, &(0x7f0000000640)=""/259, 0x1b, 0x103}, 0x20) 18:40:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x200001da, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:48 executing program 5: r0 = getpgid(0x0) getpgid(r0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/net\x00') sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x100, 0x70bd25, 0x25dfdbff, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x10) ioctl$NS_GET_PARENT(r1, 0xb705, 0x0) 18:40:48 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x400300}, 0x0) 18:40:48 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xff00, 0x0, 0x0, &(0x7f0000000040)) 18:40:48 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040)='gtp\x00', 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r2, 0x1}, 0x14}}, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000100)={0x0, @can={0x1d, 0x0}, @xdp={0x2c, 0x2, 0x0, 0x1d}, @nfc={0x27, 0x1, 0x0, 0x1}, 0xfffe, 0x0, 0x0, 0x0, 0x4, &(0x7f00000000c0)='wlan1\x00', 0xfffffffffffffffe, 0x7, 0x56c}) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x50, r2, 0x200, 0x70bd28, 0x25dfdbfd, {}, [@GTPA_MS_ADDRESS={0x8, 0x5, @multicast1}, @GTPA_I_TEI={0x8, 0x8, 0x4}, @GTPA_FLOW={0x6, 0x6, 0x3}, @GTPA_FLOW={0x6}, @GTPA_PEER_ADDRESS={0x8, 0x4, @multicast2}, @GTPA_TID={0xc, 0x3, 0x3}, @GTPA_LINK={0x8, 0x1, r3}]}, 0x50}, 0x1, 0x0, 0x0, 0x48844}, 0x0) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:40:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="640000006f010007000001000000070000000000000000000400000000000000100300000000000004000000000000008003000000010000000000000080030000000500000000000000"], 0x64) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ocfs2_control\x00', 0x80000, 0x0) read$char_usb(r0, &(0x7f0000000280)=""/104, 0x68) 18:40:48 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/time_for_children\x00') r1 = ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040)='gtp\x00', 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000008ceb581b41e43d24c5de4446876ef37e314915df57d15241261103eccad220ace7e3d71e0dcbd784e3222a93c0d9ee54d122b1db82f4", @ANYRES16=r4, @ANYBLOB="0100000000000000000001000000"], 0x14}}, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000340)={0x0, @l2={0x1f, 0x9, @any, 0x2}, @xdp={0x2c, 0x4, 0x0, 0xe}, @xdp={0x2c, 0x2, 0x0, 0xe}, 0xec5, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000300)='netdevsim0\x00', 0x8, 0x8, 0x3f}) sendmsg$GTP_CMD_GETPDP(r2, &(0x7f0000000440)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x3c, r4, 0x200, 0x70bd2c, 0x25dfdbfb, {}, [@GTPA_LINK={0x8, 0x1, r5}, @GTPA_I_TEI={0x8, 0x8, 0x2}, @GTPA_PEER_ADDRESS={0x8, 0x4, @multicast2}, @GTPA_O_TEI={0x8, 0x9, 0x1}, @GTPA_NET_NS_FD={0x8, 0x7, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4001}, 0x44005) 18:40:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x200001e5, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:48 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0xf0ffff}, 0x0) 18:40:48 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xff01, 0x0, 0x0, &(0x7f0000000040)) 18:40:48 executing program 2: r0 = shmget(0x3, 0x4000, 0x10, &(0x7f0000ffa000/0x4000)=nil) shmctl$SHM_LOCK(r0, 0xb) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') ioctl$NS_GET_PARENT(r1, 0xb701, 0x0) 18:40:48 executing program 0: socketpair(0x18, 0x800, 0xfffffff9, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000280), &(0x7f00000002c0)=0xc) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[], &(0x7f00000001c0)=""/137, 0x27, 0x89}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0x3, [@fwd={0xc}, @int={0xc, 0x0, 0x0, 0x1, 0x0, 0x4b, 0x0, 0x53, 0x4}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x2, 0x3}}, @const={0xf}]}, {0x0, [0x0]}}, &(0x7f00000000c0)=""/68, 0x5b, 0x44, 0x1}, 0x20) 18:40:48 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x1000000}, 0x0) 18:40:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20000221, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:48 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x8, 0x80) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) r2 = ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) ioctl$NS_GET_PARENT(r2, 0xb702, 0x0) 18:40:48 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x20000, 0x0, 0x0, &(0x7f0000000040)) 18:40:48 executing program 2: ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, &(0x7f0000000040)) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:40:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) 18:40:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x9, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:48 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x2000000}, 0x0) 18:40:48 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x200000, 0x0, 0x0, &(0x7f0000000040)) 18:40:48 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/pid_for_children\x00') ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) 18:40:48 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0xf000000}, 0x0) 18:40:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xa, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:48 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:40:48 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x1000000, 0x0, 0x0, &(0x7f0000000040)) 18:40:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) read$alg(r0, &(0x7f0000000000)=""/44, 0x2c) 18:40:48 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x215b0000}, 0x0) 18:40:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xb, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:48 executing program 5: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') r0 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000040)={0x0, 0x0, r1}) 18:40:48 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x1010000, 0x0, 0x0, &(0x7f0000000040)) 18:40:48 executing program 2: r0 = getpgid(0x0) r1 = syz_open_procfs$namespace(r0, &(0x7f0000000040)='ns/time_for_children\x00') ioctl$NS_GET_PARENT(r1, 0xb701, 0x0) 18:40:48 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x9effffff}, 0x0) 18:40:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x0, 0x0) r1 = inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x100) inotify_rm_watch(r0, r1) read$char_usb(r0, &(0x7f00000000c0)=""/72, 0x48) 18:40:49 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x2000000, 0x0, 0x0, &(0x7f0000000040)) 18:40:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xe, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:49 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18}, 0x18) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240)='nl80211\x00', r3) r4 = syz_genetlink_get_family_id$gtp(&(0x7f0000000200)='gtp\x00', r1) sendmsg$GTP_CMD_DELPDP(r2, &(0x7f0000000180)={0x0, 0x4a, &(0x7f00000001c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="14000000", @ANYRES16=r4, @ANYBLOB="0004000000000000000001000000aeff493499827798372c1fca5d2b23559f2ae638d3d031ad3eaf6c86e5dc2b"], 0x14}}, 0x4000000) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r5, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x2c, 0x0, 0x400, 0x70bd29, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}]}, 0x2c}}, 0x4040880) socket$nl_route(0x10, 0x3, 0x0) r6 = ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) sendmsg$GTP_CMD_DELPDP(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="afebae98096503ffd196feaa4dd05c72ba72fe91ef24a642503e41621f2634798f8853a9664d06bf8266fab77d62df8769de06489a4f0a762ce140d54f00f69a1ccdef3eb2db0ce2db5b0911d2ba70d10818f27118cfcf906ebdc4cfc6695886cf14c3bea02345f99a612e5598bfc4d7f44f537c297227a69e606e0800000000000000b0a2b8b9adff6298822dc970c7ed58d1ea25c1ad686937da6b64b08f45ceb74b5fcc73055978683d40dab03580d90809", @ANYRES16=r4, @ANYBLOB="000128bd7000ffdbdf250100000008000500ac1414aa08000700", @ANYRES32=r6, @ANYBLOB], 0x24}}, 0x20000000) r7 = syz_open_dev$vcsu(&(0x7f00000003c0)='/dev/vcsu#\x00', 0x4, 0x200) ioctl$BLKTRACESTART(r7, 0x1274, 0x0) r8 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={r7, 0xc0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=0xffffffff7fffffff, 0x0, 0x0, 0x0, &(0x7f0000000540)={0xa, 0x2}, 0x0, 0x0, &(0x7f0000000580)={0x4, 0x7, 0x1000, 0x10000}, &(0x7f00000005c0)=0x800, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=0xfffffffffffffffc}}, 0x10) write$P9_ROPEN(r8, &(0x7f0000000300)={0x18}, 0x18) bind$802154_raw(r8, &(0x7f0000000040)={0x24, @long={0x3, 0x1, {0xaaaaaaaaaaaa0202}}}, 0x14) ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) 18:40:49 executing program 2: ioctl$sock_bt_cmtp_CMTPCONNADD(0xffffffffffffffff, 0x400443c8, &(0x7f0000000040)={0xffffffffffffffff, 0xe4}) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:40:49 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x2010000, 0x0, 0x0, &(0x7f0000000040)) 18:40:49 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0xf0ffffff}, 0x0) 18:40:49 executing program 0: ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:40:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x63, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:49 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080)='nl802154\x00', 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000740)={'wpan4\x00'}) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(r2, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)={0x28, r3, 0x20, 0x70bd25, 0x25dfdbfe, {}, [@NL802154_ATTR_ACKREQ_DEFAULT={0x5, 0x1a, 0x1}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x28}}, 0x24000801) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) socketpair(0x5, 0x6, 0x9, &(0x7f0000000280)={0xffffffffffffffff}) r6 = syz_genetlink_get_family_id$gtp(&(0x7f0000000400)='gtp\x00', r4) sendmsg$GTP_CMD_DELPDP(r5, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x2c, r6, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@GTPA_MS_ADDRESS={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0xf}}, @GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_MS_ADDRESS={0x8, 0x5, @remote}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4004}, 0x1) write$P9_ROPEN(r4, &(0x7f0000000300)={0x18}, 0x18) ioctl$sock_SIOCADDRT(r4, 0x890b, &(0x7f0000000180)={0x0, @llc={0x1a, 0x21a, 0x4, 0x1, 0x4, 0x3f, @local}, @l2={0x1f, 0x4, @fixed={[], 0x12}, 0x2, 0x2}, @ax25={0x3, @bcast, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0xffffffff, 0x20}) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r1, 0x20, 0x70bd29, 0x25dfdbfd, {}, [@NL802154_ATTR_NETNS_FD={0x8, 0x1d, r0}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_PID={0x8, 0x1c, 0xffffffffffffffff}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x24004040) 18:40:49 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs$namespace(r0, &(0x7f0000000140)='ns/pid\x00') ioctl$NS_GET_PARENT(r1, 0xb705, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="240000001800000325bd7000fddbdf251c001406fc02fe0b0009000005001a0000000000"], 0x24}, 0x1, 0x0, 0x0, 0x200440c0}, 0x20) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000100)={0x25, 0x37, 0x2, {0x2, 0x10001, 0x80000000, r0, 0x7, 'ns/pid\x00'}}, 0x25) 18:40:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) 18:40:49 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x3000000, 0x0, 0x0, &(0x7f0000000040)) 18:40:49 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0xfffff000}, 0x0) 18:40:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x3fe, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:49 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f00000000c0)={@mcast2}, &(0x7f0000000100)=0x14) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) syz_open_procfs$namespace(r1, &(0x7f0000000080)='ns/net\x00') ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) 18:40:49 executing program 0: write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0), 0x111, 0x6}}, 0x20) ioctl$IOCTL_CONFIG_SYS_RESOURCE_PARAMETERS(0xffffffffffffffff, 0x40096100, &(0x7f0000000240)={{&(0x7f0000000540)={'Accelerator0\x00', {}, {&(0x7f00000004c0)={'Accelerator1\x00', {&(0x7f0000000400)=@adf_hex={@format={'Cy', '1', 'NumConcurrentAsymRequests\x00'}, {0x6}, {&(0x7f0000000180)=@adf_str={@normal='NumberDcInstances\x00', {"15b2ea8fa031588a9eabea0622b95fb3a83f3a7ae2c70faf0929bb55e5f86eefbfff28e75ef58920138bfb99d10762af0783186955e4bbceddc799a0d1d3eb71"}}}}}}}}}, 0x5}) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000005c0)=ANY=[@ANYBLOB="9feb0100000000070000000100000001ea9b27c60000006b35db567ea40293ffcc54e2000000000000000000000000008000b7bb6e87187f436da99b3765ce59d19db99d9ecbac86fbe28111cf64017c469d32e8e5a02178f57e435447d800fca227215f7f048f861d1baa4854260932a88efb936adf8bf606b3704114a20ece56e6b5b9302166bb88e9a6540d5c91"], &(0x7f0000000340)=""/137, 0x3f, 0x89, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x10, &(0x7f0000000000)={&(0x7f0000000280)=""/129, 0x81}}, 0x10) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x8) 18:40:49 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0xffffff7f}, 0x0) 18:40:49 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x3010000, 0x0, 0x0, &(0x7f0000000040)) 18:40:49 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/user\x00') ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) 18:40:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x5f5e0ff, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:49 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r2, &(0x7f0000000540)={0x5, 0x10, 0xfa00, {&(0x7f0000000340), 0xffffffffffffffff, 0x2}}, 0x18) ioctl$TCGETS2(r1, 0x802c542a, &(0x7f00000001c0)) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=@newlinkprop={0x68, 0x6c, 0x1, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, [@IFLA_BROADCAST={0xa, 0x2, @multicast}, @IFLA_XDP={0x14, 0x2b, 0x0, 0x1, [@IFLA_XDP_EXPECTED_FD={0x8}, @IFLA_XDP_FD={0x8, 0x1, r1}]}, @IFLA_BROADCAST={0xa, 0x2, @broadcast}, @IFLA_LINKMODE={0x5, 0x11, 0x40}, @IFLA_IFNAME={0x14, 0x3, 'syzkaller0\x00'}]}, 0x68}, 0x1, 0x0, 0x0, 0x40840}, 0x4) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) sendmsg$can_raw(r1, &(0x7f00000002c0)={&(0x7f0000000200), 0x10, &(0x7f0000000280)={&(0x7f0000000240)=@can={{0x0, 0x1, 0x0, 0x1}, 0x3, 0x2, 0x0, 0x0, "fb5c25aad7c19645"}, 0x10}, 0x1, 0x0, 0x0, 0x40880}, 0x40080) 18:40:49 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0xffffff9e}, 0x0) 18:40:49 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040)='gtp\x00', 0xffffffffffffffff) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd25, 0x25dfdbff, {}, [@GTPA_FLOW={0x6, 0x6, 0x4}, @GTPA_FLOW={0x6}, @GTPA_MS_ADDRESS={0x8, 0x5, @remote}]}, 0x2c}, 0x1, 0x0, 0x0, 0x88000}, 0x5b93703a390cf17e) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:40:49 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x4000000, 0x0, 0x0, &(0x7f0000000040)) 18:40:49 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') r1 = ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) r3 = syz_genetlink_get_family_id$gtp(&(0x7f0000000080)='gtp\x00', 0xffffffffffffffff) sendmsg$GTP_CMD_GETPDP(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, r3, 0x8, 0x70bd2c, 0x25dfdbfc, {}, [@GTPA_NET_NS_FD={0x8, 0x7, r1}, @GTPA_PEER_ADDRESS={0x8, 0x4, @rand_addr=0x64010102}, @GTPA_LINK={0x8}, @GTPA_TID={0xc, 0x3, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x40044}, 0x20084040) 18:40:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x200001da, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:49 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0xfffffff0}, 0x0) 18:40:49 executing program 0: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_LOCK(r0, 0xb) shmctl$IPC_STAT(r0, 0x2, &(0x7f0000000280)=""/227) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010001000000000000000c0000000c00000003000000010000000000000400000000005f00"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:40:49 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x4010000, 0x0, 0x0, &(0x7f0000000040)) 18:40:49 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) r1 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) getsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f00000001c0), &(0x7f0000000200)=0xc) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) sendmsg$GTP_CMD_NEWPDP(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x400, 0x70bd29, 0xffffffff, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_FLOW={0x6, 0x6, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000004}, 0x4000014) 18:40:49 executing program 5: r0 = getpgid(0xffffffffffffffff) getpgid(r0) r1 = getpgid(0x0) getpgid(r1) syz_open_procfs$namespace(r1, &(0x7f0000000100)='ns/time\x00') ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) sendmsg$RDMA_NLDEV_CMD_SET(r2, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x1402, 0x400, 0x70bd2c, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}]}, 0x20}}, 0x4000) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) ioctl$NS_GET_PARENT(r2, 0xb705, 0x0) 18:40:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x200001e5, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:49 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x5000000, 0x0, 0x0, &(0x7f0000000040)) 18:40:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000003612a901868a1482e54c05667000000010000000000000400000000005f00a3e9d5c692a4f14fd9d8d5e68fd2c84316c08042f45d64f58560417f7d3fff0b23c6a94c38828f8b3a284292e65d1334c7cc3deda0eb790290b6a00d4eb27b6d32674a28568ffbcdb2980070ca021e9c5fc7621b06cf128324ccdd27e4d1447753e788d0cb6e5e627c31b317a42fe0ff22aaa5bb40d37edee1b4"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) ioctl$RAW_CHAR_CTRL_GETBIND(0xffffffffffffffff, 0xac01, &(0x7f0000000000)={0x0, 0x7, 0x0}) 18:40:49 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x40030000000000}, 0x0) 18:40:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x20000221, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:49 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000040)='/dev/vcsu#\x00', 0x4, 0x20000) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000240)={@private2, 0x0}, &(0x7f0000000280)=0x14) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18}, 0x18) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f00000009c0)={@initdev, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$GTP_CMD_GETPDP(r1, &(0x7f0000000b00)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x68, 0x0, 0x20, 0x70bd25, 0x25dfdbfd, {}, [@GTPA_I_TEI={0x8, 0x8, 0x3}, @GTPA_LINK={0x8, 0x1, r2}, @GTPA_TID={0xc, 0x3, 0x2}, @GTPA_NET_NS_FD={0x8, 0x7, r3}, @GTPA_MS_ADDRESS={0x8, 0x5, @rand_addr=0x64010102}, @GTPA_LINK={0x8, 0x1, r4}, @GTPA_I_TEI={0x8, 0x8, 0x3}, @GTPA_O_TEI={0x8, 0x9, 0x1}, @GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_O_TEI={0x8, 0x9, 0x3}]}, 0x68}, 0x1, 0x0, 0x0, 0x85}, 0x40) 18:40:49 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000000b00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00060003000000030000000c00060003000000000000000c000600000000000000000006000a00a1aa000006000a00000000000c000600030000000000000006000a00a1aa00000c000600020000000000000008000300", @ANYRES16], 0x78}}, 0x0) sendmsg$NL802154_CMD_GET_SEC_DEV(r0, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x24, 0x0, 0x800, 0x70bd28, 0x25dfdbfb, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x24}, 0x1, 0x0, 0x0, 0x401}, 0x4048) r4 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') socketpair(0x26, 0x4, 0x10084, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000440)='nl802154\x00', r1) r9 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_SHORT_ADDR(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="010000000000000000000b00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00060003000000030000000c00060003000000000000000c000600000000000000000006000a00a1aa000006000a00000000000c000600030000000000000006000a00a1aa00000c000600020000000000000008000300", @ANYRES32=r10], 0x78}}, 0x0) sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000640)={&(0x7f0000000680)={0x1c, 0x0, 0x400, 0x70bd26, 0x25dfdbfb, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r10}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) sendmsg$NL802154_CMD_GET_SEC_DEV(r7, &(0x7f00000005c0)={&(0x7f0000000400), 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x14, r8, 0x2, 0x70bd2c, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x4001}, 0x20008001) sendmsg$RDMA_NLDEV_CMD_SET(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, 0x1402, 0x100, 0x70bd2b, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz1\x00'}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r6}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r4}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x20008040}, 0x4) r11 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(r11, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000380)={&(0x7f0000000740)=ANY=[@ANYBLOB="34000000d50a04eb01619f2b4d9af11bdcb8c64d3d95d79e45d601eceea1996ed6bba883b4e6c72fb0e982d9dfecd34e40f093a0d7e2dbf4de3fa14e50daeade34a801d86331849d7c3ad1adf327f43a774002934a445ada89841418e72571a46e5b2b8eb760a3e0907b97c8b293252334ab6f030000007d10f82b028eb6efe34ce5c7d8749110ca02835513a7f9eec3e40e25099f5dbf21aa6b8d7a63b3dfce0f1ff1121b418fae4bc1d26b0fe14b13dec8079736d65f3733a193c38722eec15d304a8d26d3ce", @ANYRES16=r2, @ANYBLOB="000227bd7000fbdbdf25130000000c000600010000000100000008000300", @ANYRES32=r3, @ANYBLOB="0c0006000100000001000000"], 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x4008000) ioctl$NS_GET_PARENT(r4, 0xb705, 0x0) 18:40:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9f01a618000000000000000c0000000c00000003000002010000000000000400000000005f00"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:40:49 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0xf0ffffffffffff}, 0x0) 18:40:49 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x5010000, 0x0, 0x0, &(0x7f0000000040)) 18:40:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:50 executing program 2: syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r2, 0xc0182101, &(0x7f00000000c0)={0x0, 0xa8b, 0x1ff}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18}, 0x18) accept4$bt_l2cap(r3, 0x0, &(0x7f0000000100), 0x180000) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) write$P9_RSTAT(r4, &(0x7f00000001c0)={0x6a, 0x7d, 0x2, {0x0, 0x63, 0xd7, 0x2, {0x10, 0x1, 0x6}, 0x10000000, 0x1f, 0x85, 0x9, 0x7, 'ns/ipc\x00', 0x7, 'ns/ipc\x00', 0x21, '/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x1, '#'}}, 0x6a) ioctl$NS_GET_PARENT(r4, 0xb701, 0x0) ioctl$NS_GET_NSTYPE(0xffffffffffffffff, 0xb703, 0x0) write$P9_RMKDIR(r0, &(0x7f0000000140)={0x14, 0x49, 0x2, {0x0, 0x1, 0x4}}, 0x14) 18:40:50 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x100000000000000}, 0x0) 18:40:50 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x6000000, 0x0, 0x0, &(0x7f0000000040)) 18:40:50 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000740)={'wpan4\x00'}) r1 = syz_open_dev$vcsu(&(0x7f0000000040)='/dev/vcsu#\x00', 0x8001, 0x101000) r2 = getpgid(0x0) getpgid(r2) r3 = getpgid(0x0) getpgid(r3) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r4, &(0x7f0000000300)={0x18}, 0x18) r5 = getpgid(0x0) getpgid(r5) r6 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/cgroup\x00') sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)={0x5c, 0x0, 0x400, 0x70bd29, 0x25dfdbfe, {}, [@NL802154_ATTR_NETNS_FD={0x8, 0x1d, r1}, @NL802154_ATTR_PID={0x8, 0x1c, r2}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PID={0x8, 0x1c, r3}, @NL802154_ATTR_NETNS_FD={0x8, 0x1d, r4}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}, @NL802154_ATTR_PID={0x8, 0x1c, r5}, @NL802154_ATTR_PID={0x8}, @NL802154_ATTR_NETNS_FD={0x8, 0x1d, r6}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40000}, 0x20000001) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010175af08000000000000"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:40:50 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x200000000000000}, 0x0) 18:40:50 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040)='gtp\x00', 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r2, 0x1}, 0x14}}, 0x0) r3 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ocfs2_control\x00', 0x127000, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r2, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [@GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_FLOW={0x6, 0x6, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000080}, 0x10) 18:40:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3fe, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:50 executing program 2: ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x1, 0xffffffffffffffff, 0xa98}) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:40:50 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x6010000, 0x0, 0x0, &(0x7f0000000040)) 18:40:50 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0xf00000000000000}, 0x0) 18:40:50 executing program 5: getpgid(0x0) r0 = getpgid(0x0) getpgid(r0) r1 = syz_open_procfs$namespace(r0, &(0x7f0000000140)='ns/net\x00') ioctl$NS_GET_PARENT(r1, 0xb705, 0x0) 18:40:50 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040)='gtp\x00', 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="5400005751fe00", @ANYRES16=r1, @ANYBLOB="0100000000000000000001000000"], 0x14}}, 0x0) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x44, r1, 0x200, 0x70bd2a, 0x25dfdbfd, {}, [@GTPA_NET_NS_FD={0x8}, @GTPA_FLOW={0x6, 0x6, 0x3}, @GTPA_PEER_ADDRESS={0x8, 0x4, @loopback}, @GTPA_MS_ADDRESS={0x8, 0x5, @remote}, @GTPA_O_TEI={0x8}, @GTPA_PEER_ADDRESS={0x8, 0x4, @local}]}, 0x44}, 0x1, 0x0, 0x0, 0xa0}, 0x4000000) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ocfs2_control\x00', 0x8241, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(r2, 0x400443c8, &(0x7f00000002c0)={r0, 0x20}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:40:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:50 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') r1 = ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) r2 = syz_open_dev$vcsu(&(0x7f0000000040)='/dev/vcsu#\x00', 0x6, 0x2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18}, 0x18) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x54, 0x0, 0x100, 0x70bd2a, 0x25dfdbff, {{}, {@val={0x8, 0x1, 0x50}, @val={0x8}, @void}}, [@NL80211_ATTR_NETNS_FD={0x8, 0xdb, r1}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r3}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x53}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x5a}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x71}]}, 0x54}}, 0x80) 18:40:50 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x7000000, 0x0, 0x0, &(0x7f0000000040)) 18:40:50 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x215b000000000000}, 0x0) 18:40:50 executing program 0: ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x80000000) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[], &(0x7f0000000000)=""/137, 0x27, 0x89, 0xfffffffd}, 0x20) 18:40:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x2, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:50 executing program 5: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) read$alg(r1, &(0x7f0000000080)=""/110, 0x6e) socketpair(0x1e, 0x1, 0x1f, &(0x7f0000000100)) 18:40:50 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x7010000, 0x0, 0x0, &(0x7f0000000040)) 18:40:50 executing program 2: syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/ipc\x00') r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) sendmsg$nl_route(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="880000001300080026bd7000fddbdf2507000000", @ANYRES32=0x0, @ANYBLOB="680000008c0000802c0012800b00010062726964676500001c00028008001b004a00000008001a000000000005002a000100000005001000070000000a000200aaaaaaaaaaaa0000140012800a000100767863616e0000000400028008001d00070000000c002b8008000100", @ANYRES32, @ANYBLOB], 0x88}, 0x1, 0x0, 0x0, 0x5}, 0x4040) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x5) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) 18:40:50 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x9effffff00000000}, 0x0) 18:40:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018000000000000000000000000000081872d4150046501"], &(0x7f0000000000)=""/122, 0x1b, 0x7a, 0x1}, 0x20) r0 = syz_open_dev$vcsu(&(0x7f0000000100)='/dev/vcsu#\x00', 0x5, 0x474401) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00', r0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) timerfd_settime(r1, 0x0, &(0x7f0000000180)={{0x0, 0x3938700}}, &(0x7f00000001c0)) 18:40:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x3, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:50 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x8000000, 0x0, 0x0, &(0x7f0000000040)) 18:40:50 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) setns(r1, 0x2000000) ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) 18:40:50 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0xf0ffffff00000000}, 0x0) 18:40:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) r0 = inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x20000282) inotify_rm_watch(0xffffffffffffffff, r0) 18:40:50 executing program 2: syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f0000001700)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000040)="5c90955419a161312d68d47a4fb99ab52a134ea4663b57295f1210fd0124a3266caec69cb3791072ee5d5a78871b545d31fac10291594b7e2f3949f1d70fb99d3880a179787091150440263373ca3018ba93", 0x52}, {&(0x7f00000000c0)="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", 0xff}, {&(0x7f00000001c0)="cf65a316d3ca97129e84b3357489aeb91f57c5c3c61128768c856df89d70526517ea894a344f83aca9730634b7514968f9ce0bdd1d141d10ad1b201c0b2988d9469b3cdec8066131a9f1ab20a20dab70ce249905b32961ccaf01085ec1f62bc9f733d1e08c49bce2f6387ebe12e591bebeb34f831edea65c898ba404baca69425070c8df4335aa9a18c24c56fa2c2a8009c253336bd8445416fa20be8c225e438e2fcfd2ed2162cb8a495df6d8c4cfb7d46c1e40777f8833bf4262b58f8b8399767f30a6401d", 0xc6}, {&(0x7f00000002c0)="5d488622f15a03c0570736d43283a71c4814f0fa1c92b26c7f8205b6422aeab6cb16a949eea4b760c5763080b4b493c2da8454d2c755d7b3704efa", 0x3b}, {&(0x7f0000000300)="26be4bc231c9cc1641f437391e668c644c3cb2d2579cafe0d8193167c3c4eab54ee23a4c09ab1681c454744502d150a3e0dea43509c5119dc8973217fdb42ccebb492dbc9a947bba9edd86c26f5293377aeb3c56141facfdb3149772e206dadbef2e42a282432a6184f17403764af553aa896bf5a3f769891bc3b4893318", 0x7e}, {&(0x7f0000000380)="fec62a26fafe522c68ccc273f4f9ffe806029c02abf5eb8aebb5af32deb9fecfc30283ad190c3478140b3c7e1abd10c285dad94137533624b160c90c31905b57f53972f387835d2f0291350f88dd4732a30281d244d76306fa85daebfc2693f6ac7beb73a520d16337c82f5fb2310b5bb72b64081a5389956d9b9aec6e8dc037b2d0", 0x82}, {&(0x7f0000000440)="f8c7cfec45654075b4eeb67dee60475a063bf748bae82893a333d8f1034878dc4e2de2725b039b53f378de8369949929677f8884b27a593c2eab31f1b983b3f72f7cc0f245b6da28888f89e726dde84fa3428903819d96", 0x57}, {&(0x7f00000004c0)="d6fe9f71ca9ecd651c0bda5b38f32e5067749c3a3ff3958f786e7bbf37c5cda2fc1e90a0acf440d182eacf92a6483679e59d1fe2354f83d798c7a4aa8b7a562aa8dab2223e0f5766baae84ba625b4085add1cc6045a345d52cace5ebc9c7d6a006fb0499eb26c811f5d800e4e7ead8ece5e39a3e2dbdf1c5aea0ca70794433775ff5f0597cff6e576dc84db945c3417aaaf0cd3a779604635f93079b1d8014fd95a514213c", 0xa5}, {&(0x7f0000000580)="5e018cdc116cf6c0807a14", 0xb}], 0x9, &(0x7f0000000680)=[@op={0x18, 0x117, 0x3, 0x1}, @op={0x18}, @iv={0x1018, 0x117, 0x2, 0x1000, "748239b509fb4e4ff1bd5b174a502106f343956f009961f461b9dd7ede2ea99913dd87ce1fe04dfae2fa0df1c26e0c760d567b4d07303041400f90a6ae4ed4aa57a6b465e437c03d9f04239f36e288d1f60d7a7ea57f4e739e1f22a97d32a2c0a6e656745ae4edb37d908769ae81a1549965bd910969b501cc47d316f1c2135ab976b10921b51f8a14fc1fb1d016e530c742ea0d0b7a522067c13d372fb4f0744ea47004c9c7a1af5b36be1a812a71f0a79055afe4d5a96234fc50235aebab0dc0382c0f1d2e7a633e6472431b7e6291f20571ebf94322788097fec1103eac747a5484cb7d776acf85b5da90d783707e56588f030fbcbeca980da2c84eb6baec080d25510b93cf842c7383a4bca72d9698b85a9dbb0481283bede3ee0df7cc0c79996366d33862905313ebe8d9955a0da22d3111638d7ce8e75187ce29743f1fdf654e421df3759681b6c37e5d2c3c35f1b1acf05d2df1a96533a8577727e5d149d35ca76117db510ef1139b87009c3659cf4ed6fcde96680dbabf339aa03a250791953952fbae6bdcf4d0629fd9e8f142081af4932537bd204ee6c488cfb557fa650f50291655ad595bf08d9ea3502ab44139ff7d384260e721046117a0ba119c9cd12632cea43c097c33ca08f80a8d4310bc03a8e4d324efb8bb9decf53085d0025cd8a5a7c7dddadcd7846fe20a0cba1d9959f7295d56994d8c7a97d288096a7c21a1f8e7bda2b183e58eae3150f81ac5feebffac5e3ffe70a7fa04b19886129727b20a84513a6efe2e5e98fec40684109ec6c5663ffdadd328e87e7faa7b4a6e183d70641958f95448484ea389c5c1d341df816c11603cde40c7a872f1b0b72b67b6ecab7ce366c04af3a8992dd814df425d41c30b3c0beb6ff2ca319aaf14e19d6db64ad979621aab81a2a716487b82df9c69833cef7b6c9b7eb174833f97f76eff2b5462d7c244ed1ca610a1ac6475e3b4d07889f3cd7b046dc04064f6110bb694e46aecc0f06f8ab3e3b9f454775a2eda90e8d07083dd92248c1c53c404f41addb9c86ee7210e6a8bb4d126f7c7bb0f6753f7c82f9e171306385f5759b02a22632099d9b98c57680da409c32f9ac02c0577a24af29f02a7407a593f113146d51b19790f9ca471b4c37866438a8b838220f52dfcd1d16dc03f9d44733f5b08db1b3e3036c5b38864ff6beefe00d4da7227f92e2fb2669c1d96fe089091d2e7254d7350f03dd4c083fd6fd508896912c822bb6dd4b8d14aaf58ea75a6a77277451695a4535e50f6d44987243e3cdd46f301fa3232c1cbeae9d4f6e1c7f5aecac5fc90de1abea53feaf9aaeda975f144e7cb2c1dfdc80a6a9b65438be1eb80c11c44ccacc998e5e0178b6e5c77bec65fe1b2737bd2f97aafa225531ddefce60d9481d63f53ac65534032fd750d95cd1ee8ad02f0868f3607d2f25b6928205cd60c397ea8a4218b8fa5b1aa898a0b9bea2a9f9c63f9c0da91b97fae5f1b60cc6be65fd41bde546ed2ccaf3984e78221ed4a7effec9eff555f0ea0b8a9eb148de75c27c8bd0bd7ada9f12f22a8512e5df462d3449b86cf123f02fcd2f3f8697df67b6a0fb7d1e0354c2acbc84f01ab57d0d224f9d290efae7bba87af075c1a2090c4d3a60ca742b7ffa94757af7c2ab7103e0a7cd5a2013279de52c932a089abf5836465148b2c16133337787fa688c8efa94668a13f579ce506936b9c9d61a158fbd377a9006488555d44fe7164f6cac31e5e08d7e9d48354d2e1bc090c8ca063cd98fd4cf53514263145cc69665a7ec5aafd04132ece1801d2f1a781b5a58c3c1d130265c748d423247902fc168d96408bddb1089c729d8ffd65f20f7f9b16517f0f0a8823ea3064449c39a2b493bafb467747a58c623101f659cc8c49ec773bcb03476ed4c00dbfebc372dfa0b2d09c4faf1f91ecaaefc1b02a8f790102587f58826c1e5513277a4da70596239329aafcf20d5aa970e2dd8da425076032f12debec9e096e3560623e33edf392e79ea2b1b901a3de79b0773f468ccbeed733932b7d3bb39a558996794a41c73374631d1d7d9395c6f2c833aa314009107970ed3c1d9759df13171fe2766974250673697bb6414b61d1ae38ae47b9a418d76d0fd9b3025b3639cb579e5a05fb46ead29464c8cb300ec020fdfa2726935e152444c13adc1ed1d40d03fb7dde51f7a7ea74084a31ff2dd2b270896705e4e7964fb28557897ba08152b41b6bc26ace45faf704f28add829e9ad38997ba179f9aa04e7c1db69a51f2b67134f4cfd921170a5fe9cdf3cdfe0ac7e0b1472d9bfffd89ddd6cd57c4b3783994725ab319849cec831ff4e665df2fa4e1fafb0720f6f0ff1009d00eebae1843af8dc6290d89821f3babebd93d08c3946f03f7dcd9071fcffaca7a760c7a8c22a1a761eeddf94bcc95667018c182ac958c934c3e3930b06bdf882d346476fc3ef3ff728142b46849431236ef28488d8fd1a7927ec58e4597383d22c3e98d18d1577f05f635cfd0e7ac1a5589a45d69b3a9aa688da585f1df56f8cadc575c24d3533573a6cd1c2704ce8a2adc1c756eb91497671a7cb29800e5487ff33164b6270fb488d969dab2596d118d2f725024d62596d875cff66ea9c790013f7f1396c4cb18560021721e604a4c8031e5696af48963db76847fae542873eb33bb15d22eeb5ab3444329963d15ba88d5f436510736fa646a33b49bee6c922a7d0a500f93e97d339ebbb4b1eb458751759b4edf193a08595273f900beea3ef25aadfd1683803275d67d8cd8bc1fa9ea0b63b76a4dd2cc36dbf0df52cb2418d28f6dd5aa27e23498e262cc595b67d19587ded559d9cc982479e274a595352fb13f5e5da8efce05948511ad2de848f13ec5a2623d90109e0bd1e50c03631329550923fae7ff2cf4eb2fc01ae80ffdd38b5fa24925587e85767cb7468c1541eb2283bc2f8d8e9c8b00db3f8326027b9c89ca550312eed5576e2df14048c1322113e966ac1b7c75809bd4bbb9c9030e905b314d403393bff33eea5e3696622285299f03b9776eef07412c6e2c69235c73a4eb608dc843b7535f982bda7848c36c43047675880623a2bdce3878af92f25e1c07ffa8eae21d80384b3d56540067633eecc78d05514d2fd733748b0460a7b832c059b7c5f634c75f11d67a15b593ed01aebfdbf0fec02d80505f8dccd5eb19fe386e9d7a8b21de3bb9d852cb696537e08135f619086692c232036494e1412009ee4722f217f2c5e16d8c317d27b3c3684b402f85df37728de9ca30d898ca8442178bd08f7493783325607186c7982a07f0d59e881857f007b8301f90d02778db4acb49bf5e352e0ac66a851a5f3f9e5f73586ed46a6ddb4ea3fcc228f4dc88aab846cf5fc526dd0d4159ac991ffcd86cb28e721486c832990c06863b65ed4c62451572738c055621bedf072c4e6bdc66d64f17b4d7f73f2cc873de33e65a509cb6549a4cae9cfc178cc5a7227723f49e9c1a956db6fa748059bd5bb69f4ce894235632818fb429a55cb223df2cd492ecedd52ce6b051e80ba33a6cb82a701cc3f5e410e327f92597b304fa7b3867159609897d316309557cf66d893e11f1b6ad7bd014105310bfe5362b04227f20347bb6eb5ea57249689c5ff965ee9cd19dcecc02aa7d58ac6e4d7ec81dfcfdb19d13b0ec36f772a82b5a95f2bacced992db1e6c62e7754b17c6ae92dd6b5c500d9b739a873398d63cab41b74976d63507e6301d596fee50979ac33b0ff263b1e3291ceb32dcf8cba110dce5c42bc96f287380efbb3cb920c3eaf5152939b7d500fcf1e75a2001018053261410609a8eaf5a7bcd962058a2f666c1e09bb9f66086d3902627016c12f38d0d3458faa30077e25ecdc4e292ca9395edf9054bed925768898ddcda07197f65613881c463ca0797d4d7a9d6f9d04b080377db3b57b97b320396b6d1707cab6f4d02cb48d6e97841d95b1735f4ee341a0ba4dc289a5752fa27509d5655e82e8f35ac12f65ca3853f4d46eb054d93aa97973da0f1a818ad34b8ea8f3a93d852cbfad0b94f2e716b0d5814d66c11850e3e533e8be2431247aafe6dddf37dee773ae6e4ec2b7f6e609c7ff5c9a8b2c534538404cf1bf2126b9caa4315b763657966277648998f0bf60491d9e42a16205ed376e3fe20a54c0fa780ead84cb228213f7df71e363c3f52b5a9b683401363e22cb9ce65c6549464a68002aadcd73657e0a69e031b07ceeb32680d1c2363c9e3d7a2a80dfaea6097330b35ef1d4f15f43456465cbb9ab2588bc9d0a505aa5c8b8b4361ab56bb218064fcd642f7567dd3179f315b1990fcc336a75d3b71cb303e242b9774e2bb0623521382a1f2a5ac2649b5e160462d68e0a53f9a78a651a872844a57ea15c3a5c2540c9005461a6c2464db4e0923a8a9d4dc8309e8c1ba2621ddfc4a887cd5afcacb95ffe7ecacb6ecdda52bd26d015e8d2f57ffbed32479dcda9d9737142d82a61c0b35d010dd494efa432a63a8e91bff586cc4eaeb322a5a5142b946186498dd310365395b44a8d608229280ccfa38272e03e3d25d97c9fedfc24b526a8639cac65020fa1c16501f23d403454bfb6c8aa4c3e962892d6ed11b2bb69076dceae7f81d9aea04ff04eab0bd76c3c75a02e41822c662a83e1300e9598f800480abbf5a631400b6072aafa1af53c245e55a7c0c2292f6ab9a5cd4a5082afb518a27d0535cde5e9784becd4b58848227f322f8721fd86534cd49320442bb2d4dd874d16a230c647fcfc10de3bcdc2c4defcb3da72bb676ff26656427dca68960ed13ebe86339db693e55957ed0c7836f564df1a426bd35ecdae0d0e87281547cb45458b47fe55614bb53090286b09d83b7a2b1f362e64b2db477e0e637e42c0bc18640a832ec0f8eb384f645320c086489df963545d9d15ae052e72936ae84d3ef41e3259bd1e7403c0f04d5b4be66d1d8f6d63abc19d9ace15aa3a338a31f475e670924e7d990d5eea6d4f88164402f72d2ff79d1f1c4f0254de85194bb97791369ba7502fb0324c06f428ee067b5bc33d3615900f6641429f9576970051a26ea5a010c0ecd7fdde1e23d7b331b45f320655a38607901c25178866fe3567f7c988a6603b7fee5b45ab18d985a9f66c7f030f09b4ac8021edc4b4c41456832d77f70303a7d6ebddd6cf98cf36937c02a5db05a93359eab96997c89b11655aa4e7579900526d8afdb99012a86d9d2c771e5a4f9884ee89ba7bd2dd7536a60d661298a06ce83683c6589d8dcbc343117c4b5a662d3b22bbdb9b4e562e28fca78de14549b3c253dc67e01cd209c55090b86326c613b154ab51bca08e9a27cfbc294648f12d1708c3aa6f63044f6cdac5c08634dbf65f9d2b4d300490817b1c78cb4c85003f2df0b5d19a90b460af4257891a14a97ce58d5489afecf3f04ca32d24bf60e99b18a0b028a74392d2b7cc5411583650ec4f57156ad3cb30d5921d38212ee086d67d34a7df0c74c2933d6b72dd98f8ca288ca2aa723c76baad717daa3f763af8b63bf4b7e19498bfceba517be2831eb7c62cd741a482a419e852e64994a423e03b7619436304566b7d245a88d9d717dfbafed8c1d6d14cb156d41f7209ff6b70f1c94b3686b68bb01943f86beb63c672122850a6762caee00b962bd9204e8a18ec61d8d84ec1f4a5433aa1329cf2c05f8c1e95b2a915ed2b5a31da975cfda8b20e1206b5f606ec31b60631a7f8a47267275c7bba9ef2ee7168ceae9a82d9ea3f5e251f9617867f68e3a13ba3c06846e8549dcb0664d6c80247cb978f957e"}], 0x1048, 0x60000010}, 0x20000000) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:40:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x4, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:50 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x8010000, 0x0, 0x0, &(0x7f0000000040)) 18:40:50 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0xffffff7f00000000}, 0x0) 18:40:50 executing program 5: r0 = getpgid(0x0) getpgid(r0) r1 = syz_open_procfs$namespace(r0, &(0x7f0000000140)='ns/pid_for_children\x00') ioctl$NS_GET_PARENT(r1, 0xb705, 0x0) 18:40:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9f00a20000005f100000000088c800"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:40:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x5, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:50 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') r1 = getpgid(0x0) getpgid(r1) syz_open_procfs$namespace(r1, &(0x7f0000000040)='ns/time_for_children\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:40:50 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x9000000, 0x0, 0x0, &(0x7f0000000040)) 18:40:51 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x0, 0x400, 0x70bd2a, 0x25dfdbff, {{}, {@void, @val={0x8}, @void}}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x1, 0x30}}]}, 0x28}, 0x1, 0x0, 0x0, 0x4008800}, 0x2000010) ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) 18:40:51 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0xfffffffffffff000}, 0x0) 18:40:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x6, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) socket$vsock_stream(0x28, 0x1, 0x0) 18:40:51 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x9010000, 0x0, 0x0, &(0x7f0000000040)) 18:40:51 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') r1 = syz_open_dev$vcsu(&(0x7f0000000040)='/dev/vcsu#\x00', 0x2286, 0x18300) sendmsg$GTP_CMD_GETPDP(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x1, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_VERSION={0x8}, @GTPA_I_TEI={0x8, 0x8, 0x3}, @GTPA_MS_ADDRESS={0x8, 0x5, @private=0xa010102}]}, 0x2c}}, 0x8000) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:40:51 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x2}, 0x0) 18:40:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x7, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000340)=""/142, 0x1a, 0x8e, 0x1}, 0x20) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x800c0, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) r1 = socket$bt_cmtp(0x1f, 0x3, 0x5) accept(r1, 0x0, &(0x7f00000000c0)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x123, 0x123, 0x6, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xc, 0x2}, {0x2, 0x2}]}, @restrict={0x8, 0x0, 0x0, 0xb, 0x4}, @typedef={0xe, 0x0, 0x0, 0x8, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x3, 0x3}}, @fwd={0xa}, @enum={0xd, 0x3, 0x0, 0x6, 0x4, [{0xd}, {0x4, 0x2}, {0x10, 0x2}]}, @datasec={0xa, 0x8, 0x0, 0xf, 0x3, [{0x4, 0x100, 0xffff}, {0x3, 0x3, 0x7}, {0x3, 0x6}, {0x5, 0x5, 0x10000}, {0x1, 0xb912, 0x4}, {0x1, 0x7, 0x7f}, {0x3, 0x3, 0x1}, {0x5, 0x6, 0x8}], "658f44"}, @volatile={0x3, 0x0, 0x0, 0x9, 0x1}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0xc, 0x4}, {0xe, 0x2}, {0x6, 0x3}, {0x3, 0x1}]}]}, {0x0, [0x2e, 0x30, 0x5f, 0x0]}}, &(0x7f00000001c0)=""/211, 0x142, 0xd3, 0x1}, 0x20) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000000)) 18:40:51 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/time\x00') ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x20000000) 18:40:51 executing program 2: r0 = getpgid(0x0) r1 = syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/ipc\x00') ioctl$NS_GET_PARENT(r1, 0xb702, 0x0) r2 = getpgid(0x0) getpgid(r2) getpgid(r2) ioctl$NS_GET_PARENT(r1, 0xb701, 0x0) 18:40:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xa, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:51 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0xf}, 0x0) 18:40:51 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xa000000, 0x0, 0x0, &(0x7f0000000040)) 18:40:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="00eb010018000000000000000c000000dc00020000998600000000000000000400000000006800"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x10, &(0x7f00000000c0)={&(0x7f0000000480)=""/206, 0xffffffffffffff42}}, 0xffffffffffffffaa) 18:40:51 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/pid_for_children\x00') ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) 18:40:51 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') r1 = ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) sendmsg$RDMA_NLDEV_CMD_SET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, 0x1402, 0x2, 0x70bd28, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r1}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r0}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r0}]}, 0x3c}, 0x1, 0x0, 0x0, 0x5}, 0x0) r2 = ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) ioctl$NS_GET_PARENT(r2, 0xb701, 0x0) socketpair(0x0, 0x80000, 0x9, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r3, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, 0x1407, 0x10, 0x70bd2b, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz1\x00'}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz0\x00'}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x3c}}, 0x0) 18:40:51 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0xf0}, 0x0) 18:40:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xc, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:51 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xa010000, 0x0, 0x0, &(0x7f0000000040)) 18:40:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="c6eb01760000fd00000000000000b89a49036bf6185b10bfadf327c05cb8e110da1ed3ab140936"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0xffff96ce, @host}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040), 0x4) 18:40:51 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0xf00}, 0x0) 18:40:51 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xb000000, 0x0, 0x0, &(0x7f0000000040)) 18:40:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xe, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:51 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) 18:40:51 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') r1 = getpgid(0xffffffffffffffff) syz_open_procfs$namespace(r1, &(0x7f0000000040)='ns/mnt\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:40:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb010018080000000000000c0000e21c55803dbb35296db32fa58c0457ce000c00000066ffffff010000000000000400000000005f00"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x82000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000040)={0x0, 0x19ca, 0x6}) 18:40:51 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x215b}, 0x0) 18:40:51 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xb010000, 0x0, 0x0, &(0x7f0000000040)) 18:40:51 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) write$tcp_mem(r1, &(0x7f0000000000)={0x1, 0x20, 0xffffffffffffff00, 0x20, 0x8}, 0x48) ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) 18:40:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x10, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:51 executing program 2: r0 = getpgid(0x0) r1 = syz_open_procfs$namespace(r0, &(0x7f0000000040)='ns/time\x00') ioctl$NS_GET_PARENT(r1, 0xb701, 0x0) 18:40:51 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xc000000, 0x0, 0x0, &(0x7f0000000040)) 18:40:51 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x5b21}, 0x0) 18:40:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x15, 0x0, 0x3, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x2}}, @restrict={0xd, 0x0, 0x0, 0xb, 0x2}, @typedef={0x7, 0x0, 0x0, 0x8, 0x4}, @enum={0x5, 0x0, 0x0, 0x6, 0x4, [{0x1, 0x40}, {0xc, 0xfffffffa}, {0x4, 0x2}, {0x1, 0xc0cb}, {0x4, 0x7e}, {0x8, 0x6}, {0x7, 0x4}, {0xc, 0x80}, {0xa, 0x3}, {0x3, 0xffe00000}]}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x1b, 0x89, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)=""/113, 0x1c4, 0x71}, 0x20) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000300)={0x18}, 0x18) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x34, 0x0, 0x4, 0x70bd29, 0x25dfdbfe, {}, [@GTPA_NET_NS_FD={0x8}, @GTPA_NET_NS_FD={0x8}, @GTPA_VERSION={0x8}, @GTPA_LINK={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x4048004}, 0x20000000) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000740)={'wpan4\x00'}) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SHORT_ADDR(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wpan3\x00', 0x0}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000740)={'wpan4\x00'}) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(r4, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x20, 0x0, 0xa09, 0x70bd27, 0x25dfdbfd, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000001}, 0x844) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="010000000000000000000b00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00060003000000030000000c00060003000000000000000c000600000000000000000006000a00a1aa000006000a00000000000c000600030000000000000006000a00a1aa00000c000600020000000000000008000300", @ANYRES32=r7], 0x78}}, 0x0) r8 = ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f00000005c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000540)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="00042cbd7000fcdbdf251400000008000300", @ANYRES32=r2, @ANYBLOB="08000100ca72c11708000300", @ANYRES32=r7, @ANYBLOB="08001c00", @ANYRES32=0x0, @ANYBLOB="08b4cb6dd5", @ANYRES32=0x0, @ANYBLOB="0c00060001000000010000000800010001000000080001000300000008001d00", @ANYRES32=r8, @ANYBLOB], 0x68}, 0x1, 0x0, 0x0, 0x20000040}, 0x4010) 18:40:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x48, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:51 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/ipc\x00') ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) 18:40:51 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="6f25da8b0fa34f6d3adeb21f5fd29af798cb02d145d8070ea86571fd447d84b103505992", 0x24}], 0x1, 0x0, 0x0, 0x4000080}, 0x44004) 18:40:51 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xc010000, 0x0, 0x0, &(0x7f0000000040)) 18:40:51 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0xf000}, 0x0) 18:40:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x4c, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:52 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xd000000, 0x0, 0x0, &(0x7f0000000040)) 18:40:52 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) setns(0xffffffffffffffff, 0x8000000) 18:40:52 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:40:52 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x34000}, 0x0) 18:40:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x68, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:52 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x2, [@restrict={0xa}, @struct={0x1, 0x8, 0x0, 0x4, 0x0, 0x7fffffff, [{0xd, 0x2, 0x14000000}, {0x8, 0x5, 0x5}, {0xe, 0x5, 0x800}, {0xc, 0x3, 0x9}, {0xb, 0x5, 0x40}, {0xf, 0x1, 0x1}, {0xa, 0x0, 0x1ff}, {0x0, 0x0, 0x7}]}]}}, &(0x7f0000000080)=""/125, 0x92, 0x7d, 0x1}, 0x20) getgid() 18:40:52 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xd010000, 0x0, 0x0, &(0x7f0000000040)) 18:40:52 executing program 2: syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:40:52 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x400300}, 0x0) 18:40:52 executing program 5: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs$namespace(r0, &(0x7f0000000040)='ns/pid\x00') r2 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000080)={[], 0x2, 0x3ea4, 0x80, 0x1000, 0x2}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) ioctl$NS_GET_PARENT(r1, 0xb705, 0x0) 18:40:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x6c, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:52 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xe000000, 0x0, 0x0, &(0x7f0000000040)) 18:40:52 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000)='nl802154\x00', r0) 18:40:52 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) r1 = ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) ioctl$NS_GET_NSTYPE(r1, 0xb703, 0x0) 18:40:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x74, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:52 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0xf0ffff}, 0x0) [ 2056.739490] blktrace: Concurrent blktraces are not allowed on nullb0 18:40:52 executing program 2: syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) write$P9_RWALK(r1, &(0x7f0000000200)={0x64, 0x6f, 0x2, {0x7, [{0x1, 0x0, 0x8}, {0x1, 0x2}, {0x8, 0x2, 0x8}, {0x8, 0x2, 0x1}, {0x1, 0x2, 0x5}, {0x1, 0x4, 0x8}, {0x6, 0x4, 0x3}]}}, 0x64) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000001c0)={r2, 0x10, &(0x7f0000000140)={&(0x7f0000000080)=""/152, 0x98}}, 0x10) 18:40:52 executing program 5: write$P9_RLCREATE(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0xf, 0x1, {{0x4, 0x1, 0x6}, 0x5}}, 0x18) r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) sendmsg$RDMA_NLDEV_CMD_SET(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x1402, 0x2, 0x70bd29, 0x25dfdbff, "", [@RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r0}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000085}, 0x40000) [ 2056.785709] blktrace: Concurrent blktraces are not allowed on nullb0 18:40:52 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xe010000, 0x0, 0x0, &(0x7f0000000040)) 18:40:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x7a, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:52 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x1000000}, 0x0) 18:40:52 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="9feb0100180000000000fc000c0000000c0000000300000001000000000000040000da4196ca2c32c52f0000005f00"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000280)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r1, 0x40082102, &(0x7f0000000080)=r2) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) getsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000000)={@initdev}, &(0x7f0000000040)=0x14) 18:40:52 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xf000000, 0x0, 0x0, &(0x7f0000000040)) 18:40:52 executing program 2: syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/user\x00') r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040)='gtp\x00', 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r2, 0x1}, 0x14}}, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18}, 0x18) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x48, r2, 0x800, 0x70bd25, 0x25dfdbfd, {}, [@GTPA_NET_NS_FD={0x8, 0x7, r3}, @GTPA_FLOW={0x6, 0x6, 0x4}, @GTPA_LINK={0x8}, @GTPA_I_TEI={0x8, 0x8, 0x3}, @GTPA_MS_ADDRESS={0x8, 0x5, @private=0xa010102}, @GTPA_TID={0xc, 0x3, 0x3}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x4) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:40:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x88, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:52 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/pid\x00') r1 = getpgid(0xffffffffffffffff) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18}, 0x18) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="000000006aac64490f0bc6fdd5810fcb352b2410e23accdf5720a71458e81c821df0bf2ee05eb637df140adceb9d0a5ad7993cfdb42391ab5823aef7c0ca7f848b0a3ed0c8778e55394f44b3299c775c0e647a11dab7d03d88c2d6b6134b67", @ANYRES16=0x0, @ANYBLOB="02002dbd7000fedbdf251400000008001c00", @ANYRES32=r1, @ANYBLOB="08001d00", @ANYRES32=r2, @ANYBLOB="080001000200000008001d00", @ANYRES32=r3, @ANYBLOB="08001d00", @ANYRES32=r0, @ANYBLOB], 0x3c}, 0x1, 0x0, 0x0, 0x8801}, 0x4000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280)='nl80211\x00', r2) ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) r5 = syz_open_dev$dri(&(0x7f00000002c0)='/dev/dri/card#\x00', 0x6, 0x101a02) socket$vsock_stream(0x28, 0x1, 0x0) write$P9_ROPEN(r4, &(0x7f0000000300)={0x18}, 0x18) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r6, &(0x7f0000000300)={0x18}, 0x18) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r7, &(0x7f0000000300)={0x18}, 0x18) r8 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r8, &(0x7f0000000300)={0x18}, 0x18) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="14000000", @ANYRES16=r4, @ANYBLOB="020000007000e272f10568dbdf25995b424c1ff6b92ae0c84aabaaf446db7e08be59dfc5cd74546912efcf21194dc979269695d4c24e8551d0df7b8a0ec9f52b42a10d3a1ee5668f94e2007057d53834fe6c9be914adad66ea9f48fd9199bb40b24d48d0a01a51a4ccedabc5f7", @ANYRESHEX=r5, @ANYRES64, @ANYRESDEC=r3, @ANYRES32=r5], 0x14}, 0x1, 0x0, 0x0, 0x800}, 0x44080) 18:40:52 executing program 0: syz_mount_image$sysv(&(0x7f0000000000)='sysv\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x1001, &(0x7f0000000840)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:40:52 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x2000000}, 0x0) 18:40:52 executing program 2: ioctl$RAW_CHAR_CTRL_GETBIND(0xffffffffffffffff, 0xac01, &(0x7f0000000000)={0x0, 0x7, 0x0}) ioctl$RAW_CHAR_CTRL_GETBIND(0xffffffffffffffff, 0xac01, &(0x7f0000000080)={0x1, 0x7, 0x0}) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/time_for_children\x00') r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:40:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x300, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:52 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xf010000, 0x0, 0x0, &(0x7f0000000040)) 18:40:52 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000003d80)={@rand_addr, 0x0}, &(0x7f0000003dc0)=0x14) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_SHORT_ADDR(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000000000000000b00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00060003000000030000000c00060003000000000000000c000600000000000000000006000a00a1aa000006000a00000000000c000600030000000000000006000a00a1aa00000c000600020000000000000008000300", @ANYRES32=r4], 0x78}}, 0x0) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r5, &(0x7f0000000300)={0x18}, 0x18) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r6, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="010000000000000000000b00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00060003000000030000000c00060003000000000000000c000600000000000000000006000a00a1aa000006000a00000000000c000600030000000000000006000a00a1aa00000c000600020000000000000008000300", @ANYRES32=r9], 0x78}}, 0x0) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x3c, 0x0, 0x8, 0x70bd29, 0x25dfdbfc, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_NETNS_FD={0x8, 0x1d, r5}, @NL802154_ATTR_PID={0x8, 0x1c, 0xffffffffffffffff}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r9}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x3c}}, 0x4008001) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timerfd_settime(r2, 0x0, &(0x7f00000000c0)={{0x0, 0x3938700}, {r10, r11+10000000}}, &(0x7f0000000100)) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000004140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000040)={&(0x7f0000000180)={0x2d0, 0x13, 0x1, 0x70bd25, 0x25dfdbfb, {0x25, 0x4, 0x3, 0x81, {0x4e23, 0x4e25, [0x762, 0x20000001, 0x9, 0xff], [0xc9, 0x2, 0x0, 0x8001], r1, [0x200008, 0x81]}, 0x7, 0xff}, [@INET_DIAG_REQ_BYTECODE={0x4c, 0x1, "dc3e140ce017e873f3c2de13038f87a5fbafd23ded65cf27b78090f29a22513df7c7e759f5fd65d1f41dc6ba16a09f393162482517052a9db36f018cd2204aebd0cd16a75d42c88d"}, @INET_DIAG_REQ_BYTECODE={0xb9, 0x1, "dbb5783360d62b9d1fe6692487b510565caae9066fe61cce0191a820c4aaa9535e641902444cd6b0c77af21879247c2f101e9394df80a9ff742869c073e0ef2141af03bbb9ceb5f2a4aa9ab2886e4c2eab925e31eda7b691a96403e44cacb476ec14d2b2beae6382db28002ca34315017da3cb59a30ac9302be9453107d13fddabd3d944380b8d8cbca1c672e2f9703a0bc8428f3dd06ab580a5aecefff3ca9768a20c803551dfca27af486564fb96eae37717561b"}, @INET_DIAG_REQ_BYTECODE={0x43, 0x1, "b1673dfc36c6489b118075312eea013b5c141dc4b54c5706f6522c35237fd818da9f7b63e74324c660894d27d090513c7cade35398ab824b1d56824d1b7dc9"}, @INET_DIAG_REQ_BYTECODE={0x46, 0x1, "1e655e1227c8f47945f2b8fb8f2387e1fef5f47e71572b01211a69414218dc738c22f8b45da024be935312db1b6de91d8093b07df9f2c60e0ec98438165d6b7e3b1a"}, @INET_DIAG_REQ_BYTECODE={0xee, 0x1, "4b79549f14da4fee066c2e7f04616e9b88db2043bb1108a0f9e24f8473b87752da8cdbda6b859cc228f7aec8e60030790f5665338e5b691f77d4fb9f475ee328ea181bc38e9ddf66a90d9278038e6711edf64362dbee3b6aa400a5475bb8e8845caec6ab390e4f18571308ff0d5d466aac21fbc34a6b11639ed157f8b62bb0fb54c4c9c9523cd34e0922876bfef3976ac17d25679d64a206f10f4088dc28c0af76d008e041ce5835de4b1b3225ac7e0d93e3a5e127c88d29a34c47df35251ff0637f9e00ae2a4bb98bfba3721f08dfdced39b4960f93b30f86faa4c6bb5ebcfa29d89af933dd3a2db183"}]}, 0x2d0}, 0x1, 0x0, 0x0, 0x8}, 0x10) 18:40:52 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0xf000000}, 0x0) 18:40:52 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) pipe2$9p(&(0x7f0000000140), 0x84800) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x0, 0x400, 0x70bd28, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000800}, 0x0) 18:40:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x500, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:52 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x1b, 0x89, 0x1}, 0x20) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x79, 0x1}, 0x7) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000040)={0x7, 0x7f, 0x2}, 0x7) 18:40:52 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x10000000, 0x0, 0x0, &(0x7f0000000040)) 18:40:52 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x215b0000}, 0x0) 18:40:52 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, @l2={0x1f, 0x8d, @fixed={[], 0x11}, 0xba8e, 0x1}, @tipc=@name={0x1e, 0x2, 0x3, {{0x2, 0x2}, 0x3}}, @xdp={0x2c, 0x0, 0x0, 0x18}, 0x7, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2, 0x3, 0x1}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) ioctl$RAW_CHAR_CTRL_SETBIND(r2, 0xac00, &(0x7f0000000100)={0x0, 0x7, 0x0}) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000240)={0x0, @xdp={0x2c, 0x0, r1, 0x2}, @nfc={0x27, 0x1, 0x2, 0x7}, @tipc=@name={0x1e, 0x2, 0x1, {{0x40, 0x4}, 0x3}}, 0x1, 0x0, 0x0, 0x0, 0x100, 0x0, 0x8, 0x0, 0x7}) r3 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ocfs2_control\x00', 0x300, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r3, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[@ANYBLOB="200000000714000428bd7000ffdbdf2508004400775c3a4c2212428bd89a7b2f8e76a9fb3407c90d15399d256443bdd193f1618551aa62466dc54cdf192369f747f55a71b8f60a01aee04638d0dbdc8faab21a0c283c95", @ANYRES32=r0, @ANYBLOB="0500540001000000"], 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0xc000800) timerfd_settime(r3, 0x1, &(0x7f00000001c0), &(0x7f0000000480)) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0), 0x10, &(0x7f0000000340)={&(0x7f0000000300)=@can={{0x3, 0x1}, 0x6, 0x2, 0x0, 0x0, "92dd85fc9e10d953"}, 0x10}, 0x1, 0x0, 0x0, 0x4080}, 0x20000000) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) 18:40:52 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x10010000, 0x0, 0x0, &(0x7f0000000040)) 18:40:53 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x9effffff}, 0x0) 18:40:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x600, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:53 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000740)={'wpan4\x00', 0x0}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_SHORT_ADDR(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[], 0x78}, 0x1, 0x0, 0x0, 0x880}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000740)={'wpan4\x00'}) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000280)='nl802154\x00', r2) sendmsg$NL802154_CMD_DEL_SEC_DEV(r4, &(0x7f0000000380)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)=ANY=[@ANYRES64=r4, @ANYRES16=r5, @ANYRESHEX], 0x40}, 0x1, 0x0, 0x0, 0x20000040}, 0x20008001) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x0, 0x100, 0x70bd2c, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}]}, 0x28}, 0x1, 0x0, 0x0, 0x803}, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000400)='nl802154\x00', 0xffffffffffffffff) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r7, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="010000000000000000000b00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00060003000000030000000c00060003000000000000000c000600000000000000000006000a00a1aa000006000a00000000000c000600030000000000000006000a00a1aa00000c000600020000000000000008000300", @ANYRES32=r10], 0x78}}, 0x0) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB=',\b\x00\x00', @ANYRES16=r6, @ANYBLOB="08002bbd7000fedbdf251300000008000300", @ANYRES32=r1, @ANYBLOB="05001a000000000008000300", @ANYRES32=r10, @ANYBLOB], 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0x880) 18:40:53 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') r1 = getpgid(0x0) getpgid(r1) syz_open_procfs$namespace(r1, &(0x7f0000000000)='ns/net\x00') ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) 18:40:53 executing program 2: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)={0x0, 0x0}) r1 = getpgid(r0) getpgid(r1) r2 = syz_open_procfs$namespace(r1, &(0x7f0000000040)='ns/user\x00') ioctl$NS_GET_PARENT(r2, 0xb701, 0x0) 18:40:53 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x11000000, 0x0, 0x0, &(0x7f0000000040)) 18:40:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x700, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:53 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x40, 0x0, 0x100, 0x70bd2d, 0x25dfdbfd, {}, [@GTPA_O_TEI={0x8, 0x9, 0x2}, @GTPA_TID={0xc}, @GTPA_FLOW={0x6, 0x6, 0x4}, @GTPA_LINK={0x8}, @GTPA_PEER_ADDRESS={0x8, 0x4, @remote}]}, 0x40}, 0x1, 0x0, 0x0, 0x20024084}, 0x1) 18:40:53 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0xf0ffffff}, 0x0) 18:40:53 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) ioctl$NS_GET_PARENT(r2, 0xb701, 0x0) 18:40:53 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x11010000, 0x0, 0x0, &(0x7f0000000040)) 18:40:53 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') r1 = syz_open_dev$vcsu(&(0x7f00000000c0)='/dev/vcsu#\x00', 0x7, 0x78000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040)='gtp\x00', 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r3, 0x1}, 0x14}}, 0x0) sendmsg$GTP_CMD_GETPDP(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r3, 0x8, 0x70bd27, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0xc814}, 0x40084) accept(0xffffffffffffffff, &(0x7f0000000000)=@pppoe, &(0x7f0000000080)=0xffffffffffffff6a) ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) 18:40:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xa00, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:53 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0xfffff000}, 0x0) 18:40:53 executing program 2: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/user\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:40:53 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x12000000, 0x0, 0x0, &(0x7f0000000040)) 18:40:53 executing program 0: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000000000000000b00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00060003000000030000000c00060003000000000000000c000600000000000000000006000a00a1aa000006000a00000000000c000600030000000000000006000a00a1aa00000c000600020000000000000008000300", @ANYRES32=r4], 0x78}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="010000000000000000000b00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00060003000000030000000c00060003000000000000000c000600000000000000000006000a00a1aa000006000a00000000000c000600030000000000000006000a00a1aa00000c000600020000000000000008000300", @ANYRES32=r8], 0x78}}, 0x0) r9 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r9, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r10, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r11, @ANYBLOB="010000000000000000000b00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00060003000000030000000c00060003000000000000000c000600000000000000000006000a00a1aa000006000a00000000000c000600030000000000000006000a00a1aa00000c000600020000000000000008000300", @ANYRES32=r12], 0x78}}, 0x0) sendmsg$NL802154_CMD_SET_TX_POWER(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x64, r0, 0x400, 0x70bd28, 0x25dfdbff, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_TX_POWER={0x8, 0xb, 0x1000}, @NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r8}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_TX_POWER={0x8, 0xb, 0x9}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r12}]}, 0x64}, 0x1, 0x0, 0x0, 0x20000080}, 0x4008010) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) sendmsg$NL802154_CMD_SET_LBT_MODE(r1, &(0x7f00000003c0)={&(0x7f0000000300), 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x28, r7, 0x200, 0x70bd25, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_LBT_MODE={0x5}]}, 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x10) 18:40:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xc00, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:53 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0xffffff7f}, 0x0) 18:40:53 executing program 5: syz_mount_image$sysv(&(0x7f0000000000)='sysv\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000005c0), 0x1001, &(0x7f0000000840)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:40:53 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x10, 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00') 18:40:53 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0xffffff9e}, 0x0) 18:40:53 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x12010000, 0x0, 0x0, &(0x7f0000000040)) 18:40:53 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000840)={@remote, 0x0}, &(0x7f0000000040)=0xfffffffffffffd29) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000b80)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800002}, 0xc, &(0x7f0000000b40)={&(0x7f0000000280)=@bridge_setlink={0x274, 0x13, 0x20, 0x70bd28, 0x25dfdbfd, {0x7, 0x0, 0x0, r0, 0x309, 0xc940}, [@IFLA_VFINFO_LIST={0xec, 0x16, 0x0, 0x1, [{0x9c, 0x1, 0x0, 0x1, [@IFLA_VF_MAC={0x28, 0x1, {0x7, @random="62b83fb13497"}}, @IFLA_VF_TRUST={0xc, 0x9, {0x0, 0x401}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x9, 0x5}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x8, 0xffff0001}}, @IFLA_VF_VLAN_LIST={0x0, 0xc, 0x0, 0x1, [{0x0, 0x1, {0x7, 0x9f, 0x9, 0x8100}}]}, @IFLA_VF_VLAN={0x10, 0x2, {0xfffffc00, 0x6bb, 0x6}}, @IFLA_VF_TRUST={0xc, 0x9, {0x8}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x8, 0x9}}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x3, 0x9}}]}, {0x30, 0x1, 0x0, 0x1, [@IFLA_VF_IB_PORT_GUID={0xfffffffffffffed6, 0xb, {0x4, 0x8}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x59f4, 0xfffffffd}}, @IFLA_VF_TX_RATE={0xc, 0x3, {0x1f, 0x10000}}]}, {0x1c, 0x1, 0x0, 0x1, [@IFLA_VF_SPOOFCHK={0xc, 0x4, {0x81}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x6, 0x3}}]}]}, @IFLA_VF_PORTS={0x160, 0x18, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}]}, {0x6c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0x7}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "18787eb870f2e137f9fffd2a6564bdde"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xbe}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "ea647178f05fd0db38ae7e6b782fe60c"}, @IFLA_PORT_VF={0x8, 0x1, 0x3b}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "9a6fcf58bd05e7ae3a96a43d1129e349"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "e4ba6a22f42ba926cf219b98db513f89"}]}, {0x4c, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0x134}, @IFLA_PORT_PROFILE={0x7, 0x2, '#%\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "6b53ddb45531f723b50454f4da0f0e9c"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "4f3a0b4b18fdab64460f8c3b83ffff82"}, @IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x3f}]}, {0x20, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0x8, 0x2, ':\\#\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "59a4277d306680daead613e4f5fa17a1"}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}, @IFLA_PORT_PROFILE={0xc, 0x2, '):%]\xb6-[\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "0c5d804d1a48d08dfbc73b075870033b"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "a982a4399ea230e5eaf3b141e29cd88b"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x80}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x95}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "ca9eae914aa4baae1a4a85ad6b5b5a66"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "9f5770d74780fe2a26599d97a1d1c8f3"}]}]}, @IFLA_TXQLEN={0x8, 0xd, 0x3}]}, 0x274}, 0x1, 0x0, 0x0, 0x8000}, 0x48c4) r1 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) accept(r1, &(0x7f00000000c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000180)=0x80) 18:40:53 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000080)='gtp\x00', 0xffffffffffffffff) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) sendmsg$GTP_CMD_GETPDP(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="edffc6a148772c95e7c6274193e5", @ANYRES16=r1, @ANYBLOB="080028bd7000fcdbdf2502000000080008000300000008000500e0000002080005000000000008000700", @ANYRES32, @ANYBLOB="08000800010000000600060000000000080004000a01010008000400df1414aa"], 0x54}, 0x1, 0x0, 0x0, 0x880}, 0x40000) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') ioctl$NS_GET_PARENT(r3, 0xb701, 0x0) 18:40:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xe00, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:53 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0xfffffff0}, 0x0) 18:40:53 executing program 5: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0xffffff9e}, 0x0) 18:40:53 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x13000000, 0x0, 0x0, &(0x7f0000000040)) 18:40:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x4800, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:53 executing program 2: syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') r0 = ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x8000, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000080), 0x4) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:40:53 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x2, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x7}, {0x9}, {0x8, 0x1}, {0x4}]}]}}, &(0x7f00000001c0)=""/137, 0x46, 0x89, 0x1}, 0x20) 18:40:53 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x10, 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00') 18:40:53 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x40030000000000}, 0x0) 18:40:53 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x13010000, 0x0, 0x0, &(0x7f0000000040)) 18:40:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x4c00, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:53 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/time_for_children\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:40:53 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f00000001c0)='ns/user\x00') r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040)='gtp\x00', 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r2, 0x1}, 0x14}}, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18}, 0x18) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x48, r2, 0x800, 0x70bd25, 0x25dfdbfd, {}, [@GTPA_NET_NS_FD={0x8, 0x7, r3}, @GTPA_FLOW={0x6, 0x6, 0x4}, @GTPA_LINK={0x8}, @GTPA_I_TEI={0x8, 0x8, 0x3}, @GTPA_MS_ADDRESS={0x8, 0x5, @private=0xa010102}, @GTPA_TID={0xc, 0x3, 0x3}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000000}, 0x4) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:40:53 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x50, 0x50, 0x5, [@restrict={0x1, 0x0, 0x0, 0xb, 0x1}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x4, 0x2}, {0x8}, {0xd, 0x1}, {0x5, 0x5}]}, @restrict={0x8, 0x0, 0x0, 0xb, 0x5}, @typedef={0xc, 0x0, 0x0, 0x8, 0x2}]}, {0x0, [0x2e, 0x0, 0x30]}}, &(0x7f0000000280)=""/231, 0x6d, 0xe7, 0x1}, 0x20) 18:40:53 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0xf0ffffffffffff}, 0x0) 18:40:54 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x14000000, 0x0, 0x0, &(0x7f0000000040)) 18:40:54 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4200000}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)=@bridge_setlink={0x78, 0x13, 0x1, 0x70bd29, 0x25dfdbff, {0x7, 0x0, 0x0, 0x0, 0x8000, 0x200}, [@IFLA_MAP={0x24, 0xe, {0x65, 0x7, 0x10000, 0xffff, 0x80, 0x3}}, @IFLA_GSO_MAX_SEGS={0x8, 0x28, 0xba9d}, @IFLA_PROMISCUITY={0x8, 0x1e, 0xd32}, @IFLA_IFALIAS={0x14, 0x14, 'vxcan1\x00'}, @IFLA_CARRIER_CHANGES={0x8}, @IFLA_WEIGHT={0x8, 0xf, 0x3}]}, 0x78}, 0x1, 0x0, 0x0, 0x4}, 0x40008c0) r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ocfs2_control\x00', 0x101001, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000340)={&(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x40000880) 18:40:54 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f0000000040)={{r1, r2+60000000}}, &(0x7f0000000080)) 18:40:54 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x100000000000000}, 0x0) 18:40:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x6800, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000)='nl802154\x00', r0) 18:40:54 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x14010000, 0x0, 0x0, &(0x7f0000000040)) 18:40:54 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, @ipx={0x4, 0x2, 0x8, "001000", 0x1}, @nl=@proc={0x10, 0x0, 0x25dfdbfb, 0x80000}, @ipx={0x4, 0x201, 0x80000001, "3d5ef4a9d3c4"}, 0x7ff, 0x0, 0x0, 0x0, 0xe28, &(0x7f0000000040)='batadv_slave_1\x00', 0x7, 0x2, 0x7}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) syz_open_dev$ptys(0xc, 0x3, 0x0) write$P9_RWSTAT(r1, &(0x7f0000000140)={0x7, 0x7f, 0x2}, 0x7) 18:40:54 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:40:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x6c00, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:54 executing program 2: syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x0, 0x200, 0x70bd25, 0x25dfdbfe, {{}, {@void, @val={0x8, 0x3, r0}, @void}}, [@NL80211_ATTR_NETNS_FD={0x8, 0xdb, r1}]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x4040040) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18}, 0x18) ioctl$NS_GET_PARENT(r3, 0xb701, 0x0) 18:40:54 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x200000000000000}, 0x0) 18:40:54 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x15000000, 0x0, 0x0, &(0x7f0000000040)) 18:40:54 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000003000000010000000000000400200000005f002b4e1f19aefbdf6fdf9896a6df9eeb9456e05b14ef090ea11350f0a12ce7e94cd7732225f3a86c06df7382fc5ece0dfff48cae81df137b044510e4b37c5e250f4127719670b3b8b747d59b73d975baa2bfd50274abde0c138d639b139252abd5ec8b7ddbe6aebdfc8a23343b3411829e142e7eda9a6cbb3f5e1abe7630a3dc30a40c49380f78d30439fb722f760ae5bd862554ba8b6f530ae5783a92ef055085506a181ee10886b4d0e4feb65b1c9e63dc3c"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:40:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x7400, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:54 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:40:54 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000000000000000b00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00060003000000030000000c00060003000000000000000c000600000000000000000006000a00a1aa000006000a00000000000c000600030000000000000006000a00a1aa00000c000600020000000000000008000300", @ANYRES32=r4], 0x78}}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000140)={0x0, 0x0}) r6 = ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f00000005c0)={&(0x7f0000000500), 0xc, &(0x7f0000000580)={&(0x7f0000000080)={0x40, 0x0, 0x0, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x2}, @NL802154_ATTR_PID={0x8, 0x1c, r5}, @NL802154_ATTR_NETNS_FD={0x8, 0x1d, r6}]}, 0x40}}, 0x0) r7 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') ioctl$NS_GET_PARENT(r7, 0xb701, 0x0) 18:40:54 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0xf00000000000000}, 0x0) 18:40:54 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x15010000, 0x0, 0x0, &(0x7f0000000040)) 18:40:54 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x3, [@const={0x9, 0x0, 0x0, 0xa, 0x5}, @enum={0x6, 0x2, 0x0, 0x6, 0x4, [{0x2, 0x9}, {0xc, 0x7}]}]}, {0x0, [0x2e]}}, &(0x7f00000000c0)=""/69, 0x43, 0x45, 0x1}, 0x20) 18:40:54 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:40:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x7a00, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:54 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000040)={0x7, 0x79, 0x2}, 0x7) 18:40:54 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x215b000000000000}, 0x0) 18:40:54 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x16000000, 0x0, 0x0, &(0x7f0000000040)) 18:40:54 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xef, 0xef, 0x2, [@datasec={0x6, 0x6, 0x0, 0xf, 0x3, [{0x1, 0x0, 0xed0f}, {0x5, 0x2, 0x48}, {0x4, 0x3, 0x4}, {0x3, 0x3, 0x80000001}, {0x4, 0x6, 0x20}, {0x1, 0x0, 0x9}], "6bb216"}, @restrict={0x2, 0x0, 0x0, 0xb, 0x3}, @func={0x3, 0x0, 0x0, 0xc, 0x1}, @enum={0x1, 0xa, 0x0, 0x6, 0x4, [{0x1, 0x1000}, {0x5, 0x10001}, {0x8, 0x20}, {0xc, 0x6}, {0xd, 0x3}, {0x3, 0x6}, {0xe, 0x3}, {0x3}, {0xd, 0xadfc}, {0x2, 0x1000}]}, @int={0xb, 0x0, 0x0, 0x1, 0x0, 0x21, 0x0, 0x14, 0x5}, @enum={0x1, 0x1, 0x0, 0x6, 0x4, [{0x8, 0x2}]}]}}, &(0x7f00000000c0)=""/137, 0x10a, 0x89, 0x1}, 0x20) 18:40:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x8800, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:54 executing program 5: ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb701, 0x0) 18:40:54 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x9effffff00000000}, 0x0) 18:40:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xffffff, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:54 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000040)='/dev/vcsu#\x00', 0xa1, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000080)={0x0, 0x80000, 0xffffffffffffffff}) r3 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x8, 0x2000) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000740)={'wpan4\x00'}) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000180)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r4, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r5, 0x300, 0x70bd25, 0x25dfdbfc, {}, [@NL802154_ATTR_PAGE={0x5, 0x7, 0x1c}]}, 0x1c}}, 0x4040004) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f0000000100)={0x0, 0x0, r3}) ioctl$NS_GET_NSTYPE(r1, 0xb703, 0x0) 18:40:54 executing program 5: ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb701, 0x0) 18:40:54 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x16010000, 0x0, 0x0, &(0x7f0000000040)) 18:40:54 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1001}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:40:54 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0xf0ffffff00000000}, 0x0) 18:40:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x1000000, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:54 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x17000000, 0x0, 0x0, &(0x7f0000000040)) 18:40:54 executing program 5: ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb701, 0x0) 18:40:54 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[], &(0x7f0000000000)=""/137, 0x27, 0x89, 0x1}, 0x20) r0 = syz_open_dev$ptys(0xc, 0x3, 0x1) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f00000000c0)) 18:40:54 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0xffffff7f00000000}, 0x0) 18:40:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x2000000, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:54 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x17010000, 0x0, 0x0, &(0x7f0000000040)) 18:40:55 executing program 2: pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$P9_RCLUNK(r0, &(0x7f0000000200)={0x7, 0x79, 0x2}, 0x7) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') ioctl$NS_GET_PARENT(r1, 0xb701, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18}, 0x18) ioctl$BLKTRACESTART(r3, 0x1274, 0x0) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0}) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r5, &(0x7f0000000300)={0x18}, 0x18) write$P9_RSTAT(r5, &(0x7f0000000100)={0x6c, 0x7d, 0x2, {0x0, 0x65, 0x800, 0x10000, {0x8, 0x0, 0x1}, 0x4000000, 0x3, 0x8001, 0x0, 0x5, '@--#]', 0x26, '/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, '\\)', 0x5, '$/)!-'}}, 0x6c) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f00000000c0)={r4, 0x0, r1, 0xffffffff, 0x80000}) 18:40:55 executing program 5: r0 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:40:55 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@const={0xc, 0x0, 0x0, 0xa, 0x5}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:40:55 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x18000000, 0x0, 0x0, &(0x7f0000000040)) 18:40:55 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0xfffffffffffff000}, 0x0) 18:40:55 executing program 5: r0 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:40:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x3000000, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:55 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc8, 0xc8, 0x4, [@struct={0xa, 0x7, 0x0, 0x4, 0x0, 0x6, [{0xe, 0x1, 0xda58}, {0x0, 0x0, 0x5}, {0xa, 0x4, 0xfff}, {0x3, 0x4, 0x200}, {0xc, 0x3, 0x9}, {0x1, 0x0, 0x101}, {0x3, 0x0, 0x8}]}, @restrict={0x10, 0x0, 0x0, 0xb, 0x2}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x7, 0x2}]}, @func={0x7, 0x0, 0x0, 0xc, 0x5}, @volatile={0x8}, @struct={0xc, 0x3, 0x0, 0x4, 0x0, 0x2, [{0xf, 0x5, 0x200}, {0x3, 0x1, 0x9}, {0x3, 0x4, 0x7}]}]}, {0x0, [0x30, 0x0]}}, &(0x7f0000000000)=""/16, 0xe4, 0x10, 0x1}, 0x20) 18:40:55 executing program 2: shmget$private(0x0, 0x3000, 0x10, &(0x7f0000ffc000/0x3000)=nil) syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/time_for_children\x00') 18:40:55 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x18010000, 0x0, 0x0, &(0x7f0000000040)) 18:40:55 executing program 5: r0 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:40:55 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0x0) 18:40:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x4000000, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:55 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x61]}}, &(0x7f0000000280)=""/137, 0x1b, 0x89, 0x1}, 0x20) 18:40:55 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x19000000, 0x0, 0x0, &(0x7f0000000040)) 18:40:55 executing program 2: setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000040)={0x1000, 0x8000, 0x1, 0x3, 0x7, 0x3f, 0x8}, 0xc) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0x4, 0x0) r1 = syz_open_dev$vcsu(&(0x7f00000000c0)='/dev/vcsu#\x00', 0x8000, 0x82800) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000100)) 18:40:55 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb701, 0x0) 18:40:55 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x0, 0x2}, 0x0) 18:40:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x5000000, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:55 executing program 0: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) write$P9_RATTACH(r0, &(0x7f0000000140)={0x14}, 0x14) write$P9_RWALK(r0, &(0x7f0000000100)={0x9}, 0x9) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1, 0x0, 0x0, 0x4, 0x0, 0xffffffff}]}, {0x0, [0x71]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:40:55 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') r1 = ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) ioctl$NS_GET_PARENT(r1, 0xb702, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = getpgid(0xffffffffffffffff) r5 = getpgid(0x0) getpgid(r5) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r6, &(0x7f0000000300)={0x18}, 0x18) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x78, 0x0, 0x4, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_NETNS_FD={0x8, 0xdb, r1}, @NL80211_ATTR_PID={0x8, 0x52, r4}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x6b}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r2}, @NL80211_ATTR_PID={0x8, 0x52, r5}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x59}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x8, 0x46}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x2, 0x64}}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r6}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x5, 0x79}}]}, 0x78}, 0x1, 0x0, 0x0, 0x2000e041}, 0x20000090) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x38, 0x0, 0x8, 0x70bd26, 0x25dfdbfc, {{}, {@val={0x8, 0x1, 0x5e}, @void, @void}}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x80, 0x6}}, @NL80211_ATTR_PID={0x8, 0x52, 0xffffffffffffffff}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r2}]}, 0x38}, 0x1, 0x0, 0x0, 0x24000040}, 0x40010) 18:40:55 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x0, 0xf}, 0x0) 18:40:55 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x19010000, 0x0, 0x0, &(0x7f0000000040)) 18:40:55 executing program 2: write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000040)={0x43, 0x9, 0x1, {0x0, 0x3, 0x6, 0x1, 0x2, 0x100000001, 0x5}}, 0x43) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) ioctl$NS_GET_PARENT(r1, 0xb702, 0x0) 18:40:55 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb701, 0x0) 18:40:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x6000000, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:55 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x1a000000, 0x0, 0x0, &(0x7f0000000040)) 18:40:55 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x0, 0xf0}, 0x0) 18:40:55 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x400001, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f00000000c0)={0x1, 0x80}, 0x2) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYRES64=r0], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) write$P9_RLCREATE(r2, &(0x7f0000000040)={0x18, 0xf, 0x2, {{0x10, 0x1, 0x6}, 0xfff}}, 0x18) 18:40:55 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb701, 0x0) 18:40:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x7000000, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:55 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x1a010000, 0x0, 0x0, &(0x7f0000000040)) 18:40:55 executing program 2: shmctl$IPC_INFO(0xffffffffffffffff, 0x3, &(0x7f0000000040)=""/94) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') shmget$private(0x0, 0x6000, 0x4, &(0x7f0000ffa000/0x6000)=nil) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:40:55 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x8, [@fwd={0x9}, @typedef={0x2, 0x0, 0x0, 0x8, 0x2}, @union={0x3, 0x2, 0x0, 0x5, 0x1, 0x4, [{0xf, 0x1, 0x200}, {0x10, 0x3, 0x8}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x4, 0x41d8}}, @ptr={0xc, 0x0, 0x0, 0x2, 0x4}]}, {0x0, [0x61, 0x0, 0x2e, 0x5f, 0x71, 0x2e]}}, &(0x7f00000000c0)=""/69, 0x80, 0x45}, 0x20) 18:40:55 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x0, 0xf00}, 0x0) 18:40:55 executing program 5: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x0, 0xf0}, 0x0) 18:40:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xa000000, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:55 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x1b000000, 0x0, 0x0, &(0x7f0000000040)) 18:40:55 executing program 2: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/time_for_children\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) r1 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f0000000240)={0x0, @generic={0x22, "95513b5f2de17a5abc1bbe26afe1"}, @l2tp={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2a}, 0x2}, @tipc=@name={0x1e, 0x2, 0x1, {{0x42, 0x4}, 0x1}}, 0xff, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000200)='hsr0\x00', 0xe87, 0x5, 0x3ff}) r2 = syz_genetlink_get_family_id$gtp(&(0x7f00000000c0)='gtp\x00', 0xffffffffffffffff) socketpair(0xa, 0x1, 0x7f, &(0x7f00000001c0)={0xffffffffffffffff}) sendmsg$GTP_CMD_DELPDP(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20202002}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r2, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@GTPA_FLOW={0x0, 0x6, 0x3}, @GTPA_MS_ADDRESS={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x2e}}, @GTPA_TID={0xc, 0x3, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x400c040}, 0x2000c895) 18:40:55 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x800001, 0x0, 0x0, 0x4, 0x0, 0x101}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:40:55 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x0, 0x215b}, 0x0) 18:40:55 executing program 5: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xc010000, 0x0, 0x0, &(0x7f0000000040)) 18:40:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xc000000, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:55 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x1b010000, 0x0, 0x0, &(0x7f0000000040)) 18:40:55 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c00deff0b00000002000000010000000000000400000000de0000"], &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:56 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x0, 0x5b21}, 0x0) 18:40:56 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000340)=""/142, 0x1a, 0x8e, 0x1}, 0x20) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x800c0, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) r1 = socket$bt_cmtp(0x1f, 0x3, 0x5) accept(r1, 0x0, &(0x7f00000000c0)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x123, 0x123, 0x6, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xc, 0x2}, {0x2, 0x2}]}, @restrict={0x8, 0x0, 0x0, 0xb, 0x4}, @typedef={0xe, 0x0, 0x0, 0x8, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x3, 0x3}}, @fwd={0xa}, @enum={0xd, 0x3, 0x0, 0x6, 0x4, [{0xd}, {0x4, 0x2}, {0x10, 0x2}]}, @datasec={0xa, 0x8, 0x0, 0xf, 0x3, [{0x4, 0x100, 0xffff}, {0x3, 0x3, 0x7}, {0x3, 0x6}, {0x5, 0x5, 0x10000}, {0x1, 0xb912, 0x4}, {0x1, 0x7, 0x7f}, {0x3, 0x3, 0x1}, {0x5, 0x6, 0x8}], "658f44"}, @volatile={0x3, 0x0, 0x0, 0x9, 0x1}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0xc, 0x4}, {0xe, 0x2}, {0x6, 0x3}, {0x3, 0x1}]}]}, {0x0, [0x2e, 0x30, 0x5f, 0x0]}}, &(0x7f00000001c0)=""/211, 0x142, 0xd3, 0x1}, 0x20) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000000)) 18:40:56 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) setns(r1, 0x20000000) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r2 = syz_open_dev$vcsu(&(0x7f0000000040)='/dev/vcsu#\x00', 0x1, 0x60000) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/user\x00') r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f0000000740)={'wpan4\x00'}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wpan3\x00', 0x0}) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x3c, 0x0, 0x404, 0x70bd2c, 0x25dfdbfc, {}, [@NL802154_ATTR_NETNS_FD={0x8, 0x1d, r2}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_NETNS_FD={0x8, 0x1d, r3}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x2}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) ioctl$NS_GET_PARENT(r3, 0xb701, 0x0) 18:40:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/149, 0x27, 0x95, 0x1}, 0x20) 18:40:56 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x1c000000, 0x0, 0x0, &(0x7f0000000040)) 18:40:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xe000000, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:56 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x0, 0xf000}, 0x0) 18:40:56 executing program 5: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) read$alg(r1, &(0x7f0000000080)=""/110, 0x6e) socketpair(0x1e, 0x1, 0x1f, &(0x7f0000000100)) 18:40:56 executing program 0: ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9febbfcad273d27e010018000000000000000c0000ec0b0000000300000001ef91ad4460000000000000040000"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={r0, 0x10, &(0x7f0000000180)={&(0x7f00000000c0)=""/65, 0x41}}, 0x10) ioctl$IMADDTIMER(0xffffffffffffffff, 0x80044940, &(0x7f0000000040)=0xffffffffffffffff) ioctl$IMADDTIMER(0xffffffffffffffff, 0x80044940, &(0x7f0000000080)) 18:40:56 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x1c010000, 0x0, 0x0, &(0x7f0000000040)) 18:40:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x10000000, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:56 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x0, 0x34000}, 0x0) 18:40:56 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) setns(r1, 0x4000000) 18:40:56 executing program 5: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) read$alg(r1, &(0x7f0000000080)=""/110, 0x6e) socketpair(0x1e, 0x1, 0x1f, &(0x7f0000000100)) 18:40:56 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x1d000000, 0x0, 0x0, &(0x7f0000000040)) 18:40:56 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/121, 0x27, 0x79, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x10, &(0x7f0000000000)={&(0x7f0000000280)=""/172, 0xac}}, 0x10) pipe2$9p(&(0x7f00000000c0), 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) write$P9_RSTATFS(r1, &(0x7f0000000340)={0x43, 0x9, 0x1, {0x0, 0xffffffff, 0x99, 0x0, 0x2, 0x3f, 0x0, 0x0, 0x8c5f}}, 0x43) 18:40:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x48000000, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:56 executing program 5: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) read$alg(r1, &(0x7f0000000080)=""/110, 0x6e) socketpair(0x1e, 0x1, 0x1f, &(0x7f0000000100)) 18:40:56 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x0, 0x400300}, 0x0) 18:40:56 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:40:56 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x1d010000, 0x0, 0x0, &(0x7f0000000040)) 18:40:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x6c}, @void, @val={0xc}}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0xfffffffe, 0xf}}]}, 0x3c}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x38, r1, 0x4, 0x70bd28, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x11}, @void, @val={0xc, 0x99, {0x9, 0x10}}}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x70}]}, 0x38}, 0x1, 0x0, 0x0, 0x20084001}, 0x94) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) sendmsg$NL802154_CMD_SET_MAX_FRAME_RETRIES(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x1c, 0x0, 0x4, 0x70bd25, 0x25dfdbfc, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x4054) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) ioctl$NS_GET_PARENT(r2, 0xb702, 0x0) 18:40:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x4c000000, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:56 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x0, 0xf0ffff}, 0x0) 18:40:56 executing program 5: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) read$alg(r1, &(0x7f0000000080)=""/110, 0x6e) 18:40:56 executing program 2: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x0, 0xf000}, 0x0) 18:40:56 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x1e000000, 0x0, 0x0, &(0x7f0000000040)) 18:40:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x68000000, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r2, &(0x7f0000000040)={0x1, 0x3}, 0x2) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000280)) 18:40:56 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x0, 0x1000000}, 0x0) 18:40:56 executing program 5: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000080)=""/110, 0x6e) 18:40:56 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x6c}, @void, @val={0xc}}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0xfffffffe, 0xf}}]}, 0x3c}}, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x38, r1, 0x4, 0x70bd28, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x11}, @void, @val={0xc, 0x99, {0x9, 0x10}}}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x70}]}, 0x38}, 0x1, 0x0, 0x0, 0x20084001}, 0x94) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) sendmsg$NL802154_CMD_SET_MAX_FRAME_RETRIES(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x1c, 0x0, 0x4, 0x70bd25, 0x25dfdbfc, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x4054) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) ioctl$NS_GET_PARENT(r2, 0xb702, 0x0) 18:40:56 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x1e010000, 0x0, 0x0, &(0x7f0000000040)) 18:40:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x6c000000, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:56 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) 18:40:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:56 executing program 5: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000080)=""/110, 0x6e) 18:40:56 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x1f000000, 0x0, 0x0, &(0x7f0000000040)) 18:40:56 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x0, 0xf000000}, 0x0) 18:40:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x74000000, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:56 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/149, 0x27, 0x95, 0x1}, 0x20) 18:40:57 executing program 0: read$alg(0xffffffffffffffff, &(0x7f0000000000), 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) socketpair(0x1d, 0x80005, 0x7, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000007440)={@local, 0x0}, &(0x7f0000007480)=0x14) sendmsg$nl_route(r2, &(0x7f0000007800)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000077c0)={&(0x7f00000074c0)=@bridge_getneigh={0x2cc, 0x1e, 0x200, 0x70bd2d, 0x25dfdbfb, {0x7, 0x0, 0x0, r3, 0x4, 0x1080}, [@IFLA_MTU={0x8, 0x4, 0x9}, @IFLA_PORT_SELF={0x20, 0x19, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "b350d3f147aaeba378c51a1318d84bed"}, @IFLA_PORT_PROFILE={0x7, 0x2, '.\\\x00'}]}, @IFLA_VF_PORTS={0x274, 0x18, 0x0, 0x1, [{0x38, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x9}, @IFLA_PORT_PROFILE={0xc, 0x2, '+\'-^}{$\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x85}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x5}]}, {0x60, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xf6}, @IFLA_PORT_PROFILE={0xc, 0x2, '\\.{^},(\x00'}, @IFLA_PORT_PROFILE={0xd, 0x2, '!\\}-/^&.\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b7dce2144e359ea586ed01b5a2641943"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4433cfff652463349b347c769304695b"}, @IFLA_PORT_VF={0x8, 0x1, 0xe3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xb5}]}, {0x28, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xe, 0x2, '.\'*\\%{$!&\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "491d89fd634ffc9b1a317889aa818704"}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "9618952e2678a68642684fa6570b1bd0"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "c46d87a6f0a36eaeeccac99badee7b01"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "f4763c1fd51b94ecebba082902ef224c"}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "baf1a4808cc9a12190da88f7b1f8ece5"}, @IFLA_PORT_VF={0x8, 0x1, 0xfffffff9}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "9fb2ae031ca785ceb597a581afd0b7af"}]}, {0x58, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_PROFILE={0x14, 0x2, '}}$\\l}\'^/]!\\%)&\x00'}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3f090b15e3f2b6aefdf5ad265723ea59"}, @IFLA_PORT_VF={0x8, 0x1, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "66412b94fbd06fdc274bfd20b2f8f0dd"}]}, {0x8c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a2782b5d5078acca62a8ccafda29e5d7"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x81}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "0011b011006b0bb6868737b7633844d4"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d102a0238b5764f65356b6d755cdba29"}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "f2550dae1c10ba0308982ebfe9a57ed1"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "446a8cdffc2d8521da2ad471a3307626"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "46fef49a3e12c711b96db6ff32400708"}]}, {0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "37067f992cfce69e5b3f7a8467e62c96"}, @IFLA_PORT_VF={0x8, 0x1, 0x7}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x4}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}]}, {0x14, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8}]}]}, @IFLA_LINK={0x8}, @IFLA_TXQLEN={0x8, 0xd, 0x400}]}, 0x2cc}, 0x1, 0x0, 0x0, 0x40810}, 0x20004000) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000073c0)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_SET_LBT_MODE(0xffffffffffffffff, &(0x7f0000007880)={&(0x7f0000006f00), 0xc, &(0x7f0000007840)={&(0x7f0000007400)={0x24, 0x0, 0x2, 0x70bd2c, 0x25dfdbfc, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}]}, 0x24}, 0x1, 0x0, 0x0, 0x40011}, 0x20000000) sendmmsg$alg(r1, &(0x7f0000007200)=[{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000280)="e7e6a675707dd299d2fff6dbe370032ba8568ac10eb59c1991ac27dd379bc33e4243b0d141026f7fa8e132a6638bcc01af3a21cb3fc16c287e42ccc0c084782e338435f989675d2a977b94bfec950d1e02bbf7510ced36db9dd92ac7685c2b5120d01c5813b00de6256b3c3623054b830f6b9a7fce938e4a214a69ddde4b6e29284525220001220a895c05897e8317", 0x8f}, {&(0x7f00000000c0)="5acc6c85cebd82119c2a8ad73f1be398e402c1fd3bc2d11c8f8fa5ba619895dabc9027cfb94873bf8e999f11edd857c6daa97d8072cf8167f24998cbb48122a1c5a15a86b5f6cac7e24575ea9ecdf940704c370d5b", 0x55}], 0x2, &(0x7f0000000340)=[@iv={0x28, 0x117, 0x2, 0x10, "7b2626b4dc6ab6ac67e1a7b1cebd3de0"}, @iv={0xd0, 0x117, 0x2, 0xb9, "45aa48aa3340541fedab7cc0c2e5ee927cd72a2f3ca9dd30011e4ea641a0fbb47332c8b2e7f0c5fc6bfe469b975bf0a01bf52b591f6fe2952330e3ec1838856ba64e6499be74971dcd6772f9cca321d0155d944d8b45e7a40a39e6faebadf6736d33dabad97d15e4fc09bfe2529209bea857dfae105592211d0751e7029b3cf3de99d7a69564bd3d7871545eec54ddfe3a8dd52434217545e986711d1fb0179ccda361a19420ff48362db7966588513b5dd778e9e0231084f4"}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18}], 0x128, 0x200000c0}, {0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000180)}, {&(0x7f0000000480)="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", 0x1000}, {&(0x7f0000001480)="f3463e370f3f6c8c5b9f9077e72dc550a17a2be124f4d5d70eb138fa5068dfb4f8c597a0e0275f7c255a9518855eebe4646b97750a02b191ba3175a9c83e978aeb4ece9b4186a7f8e04f5947741753cf6310015935f83dc14959b1cf5d30b48dc56250c0aaba370c266952aacf729dadc766d7b8f5478070a93511752f933dabbf61f74560a2e207e119a7a21217120c41bfc6345fe41f965f49d0", 0x9b}, {&(0x7f0000001540)="00f1e0eaf9de472e52a9e79103a7941dbae4981a", 0x14}, {&(0x7f0000001580)="c8359ab9996c93cbbf3fb0fd72afae34293ed6d21807a0c783e87578f77c79c17bbcd7419cca261a79f58b64a496be8b2e30b8918a19ec3b9c5af556c3b938a3785f4cd76f8c641fd5eab594331456c4e552651ce9ac7f336742965f310b4d20af6315ee7c46bf484e07ac83a89d9ddde07a329acf7440ce672321bed82bab7fb60efc7a0572b5473334f19af3246de82ffc8655e498f1c9d61070f4d18b60fd64c7566bbac90178e306f8385ed87e82c851c42a4d12b4eef77f1aedaaca4ffc836dad5e5bcc9cbcc5d882d64b4ad1028681819c749f973dea49e9776e788c78f57b11feb6a5fff2", 0xe8}, {&(0x7f0000001680)="f164fb7b20aca794ca7becf267a91922fc1d542596a08611968f261e8dfaa7a935500cb6b03d926a0715c0e3fc671f2250de03821c752e0483244657035da9c2ff5c882d144b24f5c52f0686f5892168854790d1137c4d5b0a0405e886136fc2e484f84867670017c9d0ecc7262c879c9bc583939ed79ea4cef6fe8e27cbaeaaeb9d1395af43aa321b3c707fd166b467168ac54387d31f5057450a7284855a10dc5fb1ae3851e1ee6b8943b99f23d307c7ddb63e0a042ebf6d4f29e4f5607204b633099b9f69f123f5fb32b12e3d33a8", 0xd0}, {&(0x7f0000001780)="fd73579f5f756248631dceab78e0854aab765c009308f37352fba7aa3ced6ec054d3b3173bb2121e67d6d5753538450aba131fee5b6157fe1a164683e3e1f3be", 0x40}], 0x7}, {0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f0000001840)="221c36df844cdeffe0ceacad7be839f6912aa86e100c0801fd31ae3ba0198bf0773a12de8447246424fe7d101d2bc7586f156aeb82c591e81234e1843f965d369af57a01537f25d700", 0x49}, {&(0x7f00000018c0)="ec0dab990540f807dda9bee1109c02bab03563b78765dc840e4a73b7bddcad70bcd696c612104026a26817d4106b1aeccfe6628b", 0x34}, {&(0x7f0000001900)="180bac495072b78bb1da7032460edf7bb0d396975527979eb85df7ee628f89d8683adc347a245c6a4ba91acf5c4b38f7d135c2812a4a027fdf9f3bbb7bff36eab75010001edded8a392feaa216ca40f06a500b30ca6284597a987aa8bb852f98443012dba883cf396d204b03e83de6456907c4a6071eda7559162b5876fd1d3fbb41b97140f8c521983f01313940a23624894e9cdb824d7c0a084785f6bc6aad7eba5add0b887eb34bb03fb0c8dbc124894cfcd49c59a0107bc7c32aba0ceee65c507d41b195b9c9abff2c88c4dfb417761ea8a4bc788678bdc4132c3994ade92e57e95f6f1fa3070acf7118601fa7872c", 0xf1}, {&(0x7f0000001a00)="8f2dece13195022d9a24bcd23f822a952b203561e01bd66c58141a2f775f9b7e5ccdbf1395b5e059b85a7ea15f35ccdefebd27af67894abf148f1626742dbe6fd252c2013941a8a8f627f9e3e36e4857306df5359a1b10ba8ce2b39d0141155388f1fd3ee27e395d279c2450ccc901b9691c4373c404dc3348de59366022e750e5adb28fa7bc492ff849b0eafb9c105f45710ffe6a5549dd87b431c5b21f82b6e598982596fa87644e08ec1b17aad4fa123883e084fd7c99809d66a79aed7bafb1bf9fba665dcfa6869d50f65c", 0xcd}, {&(0x7f0000001b00)="e7bc48fc71d2c5dd41008fd1c74f0eaeb60e03aab7284a75abe016949bc3fda7848a2433f3a5fd09bd633c1cfa3a60eb5da0cddfa7235a618f9a31850c748776f18eabfcff5d5c5b9caf8fa754051313a76001baa077780c074d8e1b83f684737fc2f3f400a2617a5ff853867e09f3adef9bc0e2609cec0247796c9b34bfa1762dafff33bd0fd86ebb07681f854b861d689b88e104817e9cb352d3cca9ae8b66c5407cae1852b0806b0617d524626157e101bafcd1bcf2", 0xb7}, {&(0x7f0000001bc0)="b7c1713c5661754218fd39c18ba57a31408120be1d3aaa48f0ee9da510c5dcbe9fe816c220a094d222d154819c9e2f8ff8566b22da9f5c9791fe79ffa6381faf36abd8adc9243281f80ddab161b7e46de2b9fe20755ed6c132a2139d2b3bda5f404b1381c14fa77c309be9b85984b64e173a1dea5fd82ad2062f3c3a2bf4c62810bbd654186b73dc541990e7d4233c51bebbd2094823d0929e26c4c28716688b96ebf8d247c4a86129adbaccff3decbc6505392b9b40eb053ab0b813ce9a0e0ce281de686963cc93a2cab1d1b54c21ee0198", 0xd2}], 0x6, &(0x7f0000001d40)=[@assoc={0x18, 0x117, 0x4, 0x8}, @iv={0x58, 0x117, 0x2, 0x3d, "729377d9a8a1b0e1b23d9dfc69fddbedd6b0cd814a2c442ce73385531164f9ab68daeaa7770bf041601409b021851b7c06cfd9f82bee30ac28b3374352"}], 0x70, 0x4040894}, {0x0, 0x0, &(0x7f0000001f00)=[{&(0x7f0000001dc0)="15a991911104508edec33a54dfc5206ddc44bb9f0a56025532ef1678e697cdbffdafd1e410a0ca23e15a01", 0x2b}, {&(0x7f0000001e00)="560e80bbcfe5bf9cf85d7ab2ef0c25f26a9638a6e73fa1c695711ca88da3692ee4f2e47211adb28b2db9d4ab912cd0aba85103ca2a1396ba76608d5bc08c471a8b28c02fe0198f10f989a0c917f75c5d3b0680fdd3ab0ce1d50442ab1e025001c937d31fcb10392d56b61d8cfe4b28dcbc3e53c6039a734aee0b3244e753740d0c85bd7ebf4f16908e261cda22221f2daeb4c389123e589ce076e7f5243fe80441b0b8abaa277954b3c5730b612e702680fe9e30fbd4eb10be711ec4803b742dea90a7d9d8b36b0161175024893593996f76867de93081820c884a14ef7a", 0xde}], 0x2, &(0x7f0000001f40)=[@assoc={0x18, 0x117, 0x4, 0x2}, @iv={0x70, 0x117, 0x2, 0x57, "000e4aca522a042881c5be45769bdc13f595f5c1cd3a58d3242173f1eae24a6156c95c8b4216789c74492a04bfd45d42082257708ff43bb48b36cc790a10f648320f4c3785fad551bf91410aa2ab2c8ad4f1f45ac8d7a8"}], 0x88, 0x2400c006}, {0x0, 0x0, &(0x7f0000003540)=[{&(0x7f0000002000)="fc5627790346f6992e89f9fa353d6eeb2910fef2d13f766881aae4b50f06ff30d4aac6a257b30331c32e6f95a50e461654a98e105e75da53163c8465b80e17fff5796cea3cec1269e0b4d4b189452230dcf1a3b1e5d83268815f821743af4f8eea616bc49e9f9ce273be3fb381d3727476c14bf268e435c29f89e39c63de354a5128c31be59a7e5efa5ffae171c588497b9dc5603d1fa4230369e93471c935f569e1d9c7f69720f790fb64cfb9f92889804dd5ab353c212bcbd996d09f6606e1b2c2f2c9824adf0ba3a5cae7cc2f1e67ca34c85d8a0f618526f649a0174b", 0xde}, {&(0x7f0000002100)="044de015f8ae82bdc3086c415fa5685620471b5cc3eb944d32190721829d54bbbc567cb1afb30028d6b5874d4aad", 0x2e}, {&(0x7f0000002140)="3d671bcadb67b6d7169c63642260d09b21aca55d6d2f3d2d3c1085baae50349ed5d939112a63bf1eeffbddc0996fd78489a7a06e6e63f3df547cc215491e80f24c17f71dc116ac8bd2d7018a0e5a04fcbdb3eb132ee9860e5ecd401f6b8de1b0650637e88da814b8a692278fe0f832f5809b08f9735bde79ac06bb908ce90dda3b0273827af546ef833aca760739012747ecda91d369960ecb17a5974a34949addaeb2", 0xa3}, {&(0x7f0000002200)="15547b9f44e7e3b93059258816369e387bef63cc6339d67d672fac234a05566856b7944544d17ed4f9a61dd69db467619370c09bca1b739c08ec4ac37cf10ca317b384d6a69933c989c91232fda624415da9be5b1d9a1f119ee6c115510ef2bc237f47447b89ff383ce31c487812120e76020e9c9639b6e2f212a6c358d1e74121318704e82e1320c66aeaf9faa97d037b31", 0x92}, {&(0x7f00000022c0)="23fc9af66e759c63421d93286e08acbe32f44674a86c505dedb7f0a0a58608156f76376a02ee8ff3617cb0936ac36dd33f504038a853bdba3b1a50d7844e4ba16da5", 0x42}, {&(0x7f0000002340)="05de11e24c899863df6415d29081637ac577ef85ec5aa91aa10c7feda6e42ba5d82dc40df955c919260ec7f4253496ff5e7b4d4ee9c8515507fd73b75b5a7a7c4c8d6d4bf93ec25f8cc6ab988327a62b4b91bdc96351c75199060bcd1bf971be075bf642d76bcb7da43165ff10dc7ee1b3405b9de99c9f7c823ecfcf22b3165e75476f1ed2ef1af4795ec2247cd1d490b04360301a9561ed6713739af0c96c0541a758d9973804c0a325e7b17ce4e640f2bbbc0653a404299dc9648e976a410d85", 0xc1}, {&(0x7f0000002440)="3eca3695380a16df77b7574cea264b17434569def556f66c380beab10f871a39556ec7b642e96d37d047d38bae94ec6090b9ddd07a4928828f85df0d828ccfe49ed96fc77f2b0c3add7dba2b68a64d80463f68ecdfa17a5ff01074b091bc95b09c98e67bf2a2978e47abe1e858c440f3f67f6327e6662e338207e5fc059564dbf7fe81f7e82f8c54af8d4ffa175487e1a7d8b76e66475637829101e12ebf1438bea9404a8b647c12061c21b9abe2ecc9ab6e7996954ac9af34a4775b906548b02ffff01a1bc725b288530d3be78b7e0d574edf7dc1dd9798a1e40180b3fa48b798704df632", 0xe5}, {&(0x7f0000002540)="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", 0x1000}], 0x8, &(0x7f00000035c0)=[@assoc={0x18, 0x117, 0x4, 0x3}, @assoc={0x18, 0x117, 0x4, 0x4}, @op={0x18}, @iv={0xc0, 0x117, 0x2, 0xac, "f74ccd9a4cd00c9a7a837d548719df4884257320065302e32f43ea73e66f0b6582da8c0a135f9510081376487a0d433f672e1d69196dcfd3381a1f4818798fb7a2d70a0fd3886ed33b0a1027806bb4741ee66676556262823ae39cf27005fa65dccc5e7002c7f3b48c570abc488fb2ad6785ecdcd3cf447591425c54fba54eeaa216350a821e567678a5bf2bb903154db278f98e723f09975a76048ca3ac8d1e6d1396924ff7d1c5bb14b9c6"}, @op={0x18}], 0x120, 0x20000800}, {0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000003700)="3154b08e7d49bf6ee7e1e5a347e94eb2ad5f952a3e737c8bb6e5aaa70a6d21ed1c88d6238202728c5d1f4dd42f2cdc4f7e5658a1ac70e3f03941713d2c797789543cff8738cc2a7ae6dc522e89a54036f6621169942be7f9d3f6a2481469a0c7a2fc628cec1ef58e841d3d7b00de4e6103916e43eb33598e8e79bcd3dabde30a4b1dc0ef785fda0cafc2b83c2cb0fd53392b4e6c44c33d9bbcd20e77bb6f7079d5d4293e508b55a8b6eb51cc60a8e4b7bd748c3b30cd06dccf6b5607f3fdb24fc03c21154b70c64d26565826c5f7227adb1f43b6b02cdda50a0ff2a2ba06df2bc2e71bbdf4b058834b332c3de47606df114c91eac2a577201c9d326ad9d2a18d8f69b1bc882a3e8b27d56ef47cb95bfa42fe5d4ab3874048e1394a65ad2771827c3886b6b55d603e0aeeede09d15c27abea1af6586bf3ad2a4cc9b440cba0cb8760d55a70732bb290acaeed406b7dc070015c27997bbeb47a079407d86d329789e00ea7046f0a79a6474c05b306ccc37755fb1c23ef0a5a0aee4af56568b6f9ea865ead6eb1236b5ab670aa2d8986c35329e83b7689168b2cb44effd4f082aaa4b86f9e9b814cfd7163f5063fed54eb8fefa474a45a38e39d8fad5c5b3d0b44a399801964f8f6316e4e3e29e810141f1b7ef598b2eb83f9a854076a13e3f87d91cb22a538a389bb0e115201a2225bb5449a94e91125612dabd2fd01eade9716cbcddaa02ed89982cac73a7eeb369854ff414558d8f586fb41c6a32c3f02207469c583467cdd1ddb6c186f9751fb13cbf34f5321429f566f79980f27a8349a3e1e7d13841b47e91008db8856203d1991ab60a78ca683db78d7a10a43c9dd20d0d5cb0a440c3562ad328861d8766d486d7d7342a29e3c37c5e7f0f1ccbc85259e8c04c8334c5b17c02bffbb9de8332daedf400069647cf0270f61ca4361b4f21c1713126bc83930b4f8f1d7279a28f3e200c5cef8d149f0ea3ceb88764cc9f9cf0b5608633693a3113561575d6a30231b7dba7dbecc9a81ef190a1b6bd5b650b8d0f77ded2eb09c5ef5d3e7da3523c93c1046b1e6e16c7d45783ef8cdb89929e902873e79e1d68ffc9c60ffc30c792a02fe04818dacff3666898027b9bec65b9468b152aa1fd56a6950b7590f8ba129ce265e00fe594aa77e7c5b328b37bfedcffa74fb226c48179b22bc6bed7f08929b42d78bcfbe62b9eae9ec0235f35a45e288367c601f5a7c8df63e80521f5f8cc4f0cb9fa57c7039f0b0c72eccaaed85703105eebdf864402874c6cefb9e18bcc188a6fb109f3ff8320ce5b3fc5998fea51fb4aa70ec902f80d3ae5f1abedf75721d633abbe776fdaabc9cf9af94dcc07dd20f7cd367ebb3972188f13b8d198d712506623c5240edae0f7056ccb6112a0da1cc67ec7ff005dc9589a438e55c89a3e2b922f476353bb90334c3cccab7ce6df48fd54d783e69fea97d4528bb0d84b9d8a70be2c41aba1d7c39cd4af017bdcdac8e2de6769330a4b4b7aa0fc9c2e577035e4a0595a3df02cd68116cf3842ebb9958f33991e305b58fce6ce4bd9375326a8f5e1c57dd75b37e2fbe56cc062f5e591d87aa9847f584a2145afd6c9baf3533cd9f5565a645be54996abf543fc3e69a84121c729a4b9609206e80b7beb978bf8427214d5ed3c9b083fe67303846db3e9c3b16587850011d953be429732aaa15b7315104b8190731ede218f7dfa05b3d17a736e14a1420232e65601ced4a3df124a20b1fafb19b881345adb0b2b81975ed39be876a1109adbb1e4effe3c0095da235dc696017154e6fdd15fde77890b70524fb3da6ea34aada6c6df5cea9cf33c378b6876918a6ea21f381f2a4dc900fd11a4276773bef7ed387277b13333b882a4cfa80f88259aed0137fc62a8bb66e814b78b621f2c4d6b5425690bcc03f025b4fd4a61f288df4889c157de78c77b9a8f93fe2d7da02146de2cacfe6191d62eaab34a9cebe7f04c9ce19b3c83007f68677bf2ac00fa675ad98e6607dfdfa44ab726b672a08c7e14bbb9640a58ea3fdbab6837964ea06761c616d7fd2d389b2ba6be989025339ed1fcb3f3e7f55a2e0821750ab81360f45c230017874a4a116dccd23b72b4ad4f751eb104d925d7b33dfd2aa7f6fc82662471ee3b67d7430b070fdc8ee8f9c2dff51a777d7ee98dfbe0823126c98f0fab39d8a8be573598603f1c10c622b5196c1a479f13ac64c8bdea0a6e0a24af03a2fdb5d80ab70160196720d6c8364153b6fd5904d48a520d507e006bcea86d517d3531908dc4fce7e6f9185b1adf1eb0609aa721d0e5f1ab4bee798b803000dc20b39b14722f291551eb58bcd5aace5564bd1a8d2e28da3b5ab90c111d7da737336aed997ec993f4356409c0d6309d2cd0e971a9c6a9f39874337d5045e7cdf98965e206939b5d7e9334bd71e60ff28682634632d639f312ca73a6504317e87055e480d27caedb489707fe78cf6e14f9a98a08184314c6b4f2528e94fbe02b153f555e2a2df071b1d0f6b012009532978aa50be4f2c0d48a2dceb9746414e80b9b33b35d0eaf298ae86ff5937da759032d8a5b6726b95ce86adab38b256865b84b5370496de74f43da080bbb68053e6885d65891e3353899bfec02084c6a47db2f67e14902118ae8e873dbc602d019c1387b07906e044e08583948cb368883695d0661877dbb81e5e88379e20112ba6f7f3fecba3fc0f92a12629080234969c6429c30923f615c92bdfe88b521a5a2422434a2e9fb2684fadd491b9522f65ceb97240edab492ace3bd2931c8b2376fad4212273ae50c62d91823c8bb9e63b014cc608ff33037cbc9407426f0ec2effd9bcf1c51c0e00af5ab1fe83f125cf687b5483196f2022f36afea97945069c6caa2afb0fc23485dbb08c7c5fe8a94f359af951bbe2e11ff96fb6d38d51058a4786dc97e6a744040a57930ae4004b91084e60508a72ef70036d5537aceefdda16b42e6a05752293bf0381d833b3b26488a48df6c594f9ba7844a0cec991f0462c26d14ade5fc8eb9e86c86ba5029091dfc5fb1123c6e7a49dae47744a0feeeba2f083a5a67433e1833fd0f2f18407b1155c6c3418f67240211291333958b6659d1fc49ca0051c926fac11be69575e8ff7207855c42faef80e6bf3f5a5357541a6bd863f45dfbfa63ef8d137b4b2f8b2149061dd27996a0f21b4c571df9e656db814d1e7eebd1c0b7325834d86436e94663243a98b44e6a2f4e5bebbbe5921c3fc3964c52cdf1814bb689e7cfabe2cd496f50f0c02a35d92046ee549ed45f79bd5b8fe4083911bd431c3e35d23d069eefa9c6a5d6a6355204da15f9183b46f5f8ab2d96869ce86b525f6c0e4cba8ce28ef560a8c943265944490f931eb3348e4fc134998dbb754cd45a51359432ea5d851c75984a7ed0ff17587f6beff22aaea950d505679497f438d0789fa006f7853a3ee43f4ee135c82255e47dbae5a8a45199b33c5c6fb2cabdae0ff943b86c2fe41cd87a6e5a216a77b571fed856b2778512f9b7fe53333fd0066a53cc0dbbdf8aa03c3e7c6c39a418b267b4b1ab6c4b22293d04d98665a6339341755f102e8ce34fbb0027a2e1f789d30230b03a8e911d68a67e693876a6b9cd12fd951e1507eae945e73a0e172c5f77991d044acf69c81d8083647e7afc06c1c91ad058ca9a7afa2188d34b4c9e79e72370a4e10ff68c7b78e30797963057bfe9fe282a884d8dbde35f2d88af07a20249f3a2ad1443ad31951194ec8b84145d10d591a94827e7ff664047abcd64d3dfc79a0ab49b8ed5f2e5f3f2cecf119480892dabf4bb3b238f55edbc968ba83b1e33e36e8fd498e08d158486911a61c86a7367b8f60bf12e9a792f859bfb6a5f07aafc8252ccdef2412176605ad8eb52d43c3c5ef15fd073d4c41be45cdd7d1ab47dbef4caec660e82ea8695cf9a51e815c186dd02168da0f8fc8e8440aa77b75cb6750aea86785eef898510896c18e24afef8d626137e0324ee02b15417f79d690c6d40fc622f63b35d4a4526088b0bdc9b145823d5f0a2ce2b52fd0b1f6d074318d714c6bf961bc8189074b50bf3d0c21c0be4ebca4659b0b611a745f1b57ea39ba5e3ca36b811140a462d1f09eace2bfa09af957a6da30e22653bdac5bbcaf2a1bfb9e112f58367d36e8969691081021599d701438b389ca8bc9a3820c3ebba799158f2eaa3e64115ec7a94f1edf7972c70adeb72639e5125dec7bcfa5ebad80d921afd844bc26333f6db0ad8dfc4a03d4f3f6cb051eb67d97bf53149f033d2302c2e79aff93148ea3ba08c41064d83542db5fc4026a4e2c22977db97ccb7cc938c6c85a67827543548ee470b6815b745fa3d671a6a853769e7df41f3e3ce6449c74f98ad98810cdcdc65e493e80df7ccd87b0cdbfccfafe1d9a67eca214d73915cbfc46f0819efc304e962a1430048b877f73343a2e5d6c8303356bc85d6d302dc36637ce7bf002f1f4a1dfcab82919130b3f8c211a166fb3454444b69625738fe546eff328b338196d3a6c6cc7d841d8208748b9defa4f0b6a9c607d2f7a482ba8ad6f7c006a18fb04430687883d5a8a1cbe1306861c9a0436529aca3f0319acf2dc23f2fa52362cacb53310eabcbbd9f3b53156c4b28a38b92986fbcbf9c4a47f3cafb8644d16bdc3ab452ee70ccffec10d9b4d388873696c22c348c247176b2bd9a9530a3ca7758ca824d60372b344c726886d5129073cad4e9a16a6fc0a3d85cfa360cabb6adda42b82d46c80a9098c8af69117d5518c1293361aeac8bb6b1936772da8fba36879940d0b2370f0a7e5ed6421ff1066e575583ea689fb6cdc3527dbba2926f5be8c9af7f9ec0c5dbd8f259e1700c9d02e07362159a148efed23d161835c50ea1305a6ccf57460d7b91222a5fa200a6968e91e313ce1f966b2248b81a97560845657bb5c9d8a503b06796452d5180bcc326f635e5e71c1f7b9c7bf2a9417c6c1fdd527f046acfea4b3a54982fe22dc7989e95911efc015d7b67804e58a8d41e972cf50ba8e0cec536114947562422fd8e06045b883e98fa6e48eefb8dab24ae63b12bc40a2c1340f224ae200e2381d9a94f05c4d0f83834bd4f39f6b4493846874ec5bdb9760a9d1fe3351d4c21748522930b9ca851190826cf1268989a6a5790b95d7a49af3200a96cade38e17cd51d3ae53311d887eca8b7704054e6964364f5c9e60ebf01fe5b0fb3a7ce840d9fc573b2abd833df31a9d2b619fe2727cd96978c5175a2381d16779ef0912e7e5b6d857bf248e0ccae75a2b6591227991d3bb7fe143261416d81e62658c6af07e2e4878cc283ba0bba7dff6db033cdc51afdc0d44f2e17878bd502f854e145aa877906411add866c208e8af9953daab15bf6e6c455c6d9c802edf73dc0bec484dc4c540f30cdea095417fb0f841175cc5a2adc2367cd40c14419c2a2a1f63ff64c4e1d8dac8680a6dbe001fe6ed4fa356e4a474a246d38cc3e5d3e8a25f62ff71dbd229e7356a790254e513ae209380f2d0516d576e7b292e18f447a8d73c212190ee62e581f67e20b8b36707332431d234aa9e20a09144a3a316fdef8ada50f9e7f124364fcb4bc0c3be1de5707983f777c699e358045b3893a355cadab16fc785aa92bc26c5f6af4882fad151d392921c3e71988fd6c50bc555b901a7a12380002b00f3cbabc5dad49b70d0113efd5fca0702283bb70c769780d240bc83396964805f7f5a8cf607779f8d45ad73d95959b7ead0d0f52e643d9a0ac9f905db51bc3df04f692a7d22fb41183bf6a33240833a30f6ccd573b455b91", 0x1000}, {&(0x7f0000004700)="2981998d9a4082c53f02b8fde181cc360e05b84a24457df2337e4b8e864b816cf7d7aef833a05b132d4da3f5d5436faf8371e0908c7259016293e38762e5b0444b68e80d665c8df9d14138c51d333267260cf95421a26ffae19b", 0x5a}, {&(0x7f0000004780)="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", 0x1000}, {&(0x7f0000005780)="4c543a092c4b52c6c2efe50984862c094eccc0ea959540cf58007608297bfb4fc16015b58c8ac81b25959f8dd56709c1856cd29d0ef3e665f4ac29e43b8dc6591f05cb67168299d318a233551eeeb34e24859418bfdf417391c0a7d3d1a452581defe62837c7477dcb35b03ef0df18e04ecedcdd5c9afd02a8e5cab02815113ede08edc62e2ec4e78be8850242ce0e1be20160e3f006541d6edf3f83bffbfab3", 0xa0}, {&(0x7f0000005840)="dad098257813b6fbfa0303f80960a8110872f68f5dca969463877ce4c3219dd792b626344d28370133b7939db61316dedea43ad13ba8a85e59", 0x39}], 0x5, 0x0, 0x0, 0x44040}, {0x0, 0x0, &(0x7f0000006900)=[{&(0x7f0000005900)="b5608dc2026c799920abd99d1d1721557091d8e862eac81854eea6a5ae4f319ff0e1931bd9eae3b43a8b3cdab30089dd8a9a080cd3bc821771de74d221e92bc3586ba3a82ac63024339ac854819f7f2b0314e6ecaa7adf12f8c9f5b04cb63512a0c9a869779bf04e147a4b227f3f760a095392b5ce4557784301185fec0bd0b097b2596fa4c1e02595a84edd5ded966c01492b60be7d6e927f87be8eaa592b3a2c7a7bcba9e1b168c609a7cf27ad08a4fb095180d6b29645819bbe245b1b9a175a1452f5f2188ea3a668a2dbbbb882f6a0c9f8d394bf0f2b5c37247a74c3e1cec65386885d03b0d558acdb0fbbe9a9cdcf2f14bed9b1e9c54e59e1ce92375e63daa663ef51d818f593e4464c85269bf63001f6530339a501d3d419cb535a4e125d1671de0c622ee900b2ee1373194623d36da7f7408f99ab64cb11131b6cb76dc6d48fa38d1f73cc298a7703bdcee86e8af7f05e7724f8535d8ea684a84c69af074fd2dbdb0edd33d491e5001846ef1fb2ed1de272a3e64314d669312c04c5a213571f53a063da97489b018e681586cc0058136e25304ba940bb3eed6a33559f2d86b6fefecc7154f87333e873e6e7f1934b7f4732c0634b3bdeabdb25459bbbf31f8ee6999692d7b9125b65f72dbfec707804381e29e0d521719d531aab979ad6ef98d5b1f05a0d2e051dee2a9cd9f20ca45c744e8c3174bde3956111fdb7b8e9b23174a2c9b83de3bd3820525133591639589cc921703d6ea79b4247892a940090aa085c7530345e9e6aad2fdad632d57fb34871c388633628e9f0472bace3d9e68386d5e5c96be60d74706cbfa89239834fdca65c01ead2f0954454519b9ece17baf2cbf0bd19ff372cc39ccaa2d941e03834c6a42731217a3794504ae6e0004608f7cd555721ce51b01c31b6e14f3c1c64f210237a4c76bc6d237893d9df37a3013d3555547f43090fc08de95e58b414736078dedf691eee24809ea8f888ba3bb5f7e2230e77c587012b1a9b50a40e85d55d2bf00ed6d9d1724771c8de569fc9e8a8f9ff4f767e704efb40b11799e4024f56521f83d995ec94c74855d6066c886f065500f4f87d64b3bc0e19a2b3c23a330827390f39d8a2e1943ced698e6d692f4ab457c416a6118356fac97fca5ef8643ec86ba18d6c8318df7110a99c865c07114c2298e00f1138a5d9f1f87b13eda55c38beab18c4c8dc06a7cb2383389c72a1b4be5195cf193d1b6af048cc9fc56abd2b70f290ed1802801debdcffefb3be4496f48d27e4108eabad966db94da83d49866601bcede064cc89e823a724ccbff21283f0a4d6eec02bf1600263d6270278612da9b10de98eb80cf69966a787f04e6f5611b4fb03ef3dc78ec8ab75d81e279ac966234e2fb92e2fdf3d63fc2ed976c006885771da60da5df794deafb2370ed845a88f31bc5eb82e955145209a004d23c3747c4dc9d407ad2f466a51eccfa2c6b94b30d7293fd801aad595d35120cc9eba10c94b3408d9c1fbdad90672a14d74942ce68744649e01926455baf6cd162f2379cf928972427b4b02b541e3d0569d7d9655c4a47349a391aae12e44624726f0fc8fd5fde92e57da243abc91383cc225fbc03d6a5b84a49584485d4acec7335ca5512e58c6325bf41db27ea3fc30071f57c350cd00d6d6597a47a0d12f132f50d1e8ca6150d18c327b5c2b74a8654e146ec3946c32147c8dfed17a9119cd691e46a8e83aad2a82afcfdb46e0bbb6f29688332f33983f87ae6fc9f17ecfeb7df2eb3574fe4cebe4112f7a7f6020ea9a3b52fe13defed86e36d6cc81b0f06c632cc4eb98407ceba28dee065993fb792c022d926a724973b0a6b701a506e3b1c5d53111b8d8555a74514fe41ba8ae4cbcad90e99bbd7c79a2a05279a2ef1a9b4cc30aaa56d640a54f192b4857094d2036b3fc0ebb2751ba9752526f3db1e92657927514ba7760816345456c1c614c89803529d431b792251cc06992a3ebdbed93873ca2d2c1c0564e235fe341c2899632d4e911d5463738420491a40e86b44852a00067d58972dac8cfd58d35452d68d2da6896b0a667f89cafb5b4f99e155d23a0aa3ddcd2879d04c45a9e97e54e453e5baf34c1ebbacb165fafbf8e052452ab7fbe6c43bede45d5f568bc722fc855527eaed816d8cbd5d407b953473f52336d8adf29ecd309f0387099adf38429519a0cded2d426f889e23cf4968d49e16acf3db6289659af100279512ddac32e7d7b2cf87f4071078439b2b54b12f51f6f53440401c4fb97d971377e022cdafdf2e1f5533c67b48f6f3ba15e4ce2585770e3ab2f4ad7902fffeadebca35b0c53b0e0a3c34d3efa50622b39db18bd3d2deb4391ff750839905421f69a700445395082c06dc4e6365fc2e9b27919da0fd8b8b9aca37c9b4789b38445b9d287dfdd52c6e9f5c40c48d3166c72b104d2978d5358ce693d9499d5bfd3c0e9724532dad8831f60e7a738562b32890db7e865ac81a1e3addd8d881d15bf34122e628a352c7103430f394494b49f503d088ea243f7a52466783a67aa57074f64e4c7efa4a047dc4e74951ee8867d3742143e0d519270e1b5c70d82517b39b2183a764800d4015770e55b2f9837bf714243aca9afab7066626c7e8c5deb96692c35ab33dfb9aba64318e0c3d40610480300b31c47601fa6e0eb7ce4a031fc29a7b8dfded28373113e99bc2104dfa5a2e062aa3ebe198611b47b269354c4b47b1ef7c16b8aea99d47b9a3284b233f4746f3d5f1ee186138d6ac49a26dcafdc15fad123272f0f6bb6ba5fa3ed022006d6b4f683710535e43cfeaf3b6cca365bb1decd651f210e8981a39bf426bff1803c538c5d201f6d5fbfc132a8688fa44f926c4e7972fcdf558bf58224c5c0601951d820b516d387cc716b1898ac1e5d8475dd724ebb0a15d20eba171fa25f4706bd045e82dd4dc840f1192a461dbced4bd8d5d9f98d538fee1f1677b2c74d67dbe871a63f9b9bac53bfc4b4a33a746e2d272eb57274ff012a1f3f7845496131f24fbc7375fe674d448ad02fece9b30d77aaf5f684dc6ee26dfe79b512746e836ef0bf3402c148a2c12939d5f26c320659f6d0ba26d9bc39467e91f4ed2d188e766ac631ede0dbdd2e9ed54096ca5e236a72769c175c11c27b66c9d179299517503b61dd297b9813bb9a0192efd2ecedffc27a1003d721e5d8a7893ca98ccff57037c99c0a920b65a088f6acd4857be0e71aac57d29770a12dcd84a869082b7856c8ab465d522ab68bf90791c9ad7944a5d323600092689971c23677606bc28bcf3579b00adb0f62e43b4b4fb1f4613308f02f49905cb5d0e8a1d9c1639d48ee77588fbe3fa60ff4739bfda3ffd0dc0c9bed17d33175c70caf96cffdf838ef13be6a2fbc57b66ba52591987ae0f0a0698157348463199eae2992ff654ed5703144b9be3404d56fdfc323c5863764f0a735862b367d03954afa310f95048ba4f1779b397c63d5852ca0a8eb0f814b18aff7a39f7265cc9a868471b6b5036ad06e6c6d7229b85fbd31685c5245b61a5b9241f7f340bbfcff0b24f934bdb3f3b2928fdf25254fc1f1a8f78d23afd0fd5083718f2e8b08947ca4391b23293187b86f5457580c75b31d842f98921ece46b7088d5199cf6e8d62966c4658aa7eccce7f1b5ac9a7d105c84dd56f7171e32aa21e3cae02decf2cea98e488d7407671e6e26f5b7d8d6aafca1590a9d4812af2429880e4a709303b85647f681d2168bf30f65d740eccea05fd947e1aaf67aa179673889cdd7e7761cb3db3e0a9b71c3f37a72785b5b762b1e2dfa043bd45820bc2bb091a93b8c257655dfed99a774d85cccb90a62d6bd118afe80abee5b3cf79f9d118a550acf163d7af4cdf213059e37c0bffb4171471cc1ade1154a1a39fb67747196163f70627412b2fe11265ba249dca83012cf601049ec0355ecf272ae5f90b885f994bfe0bfa3726888211dce98bc7ed38c01c6ce372ab430e5cb9f38fab22e2cbf37069877599ebf86a0b48645e0843ee2ec34b07a01d316ed8477d6bb9cd42956acd7ef3eba0f55fab1bfeb3201356064a0d71da918a21db34abc5f151cdfd1cb24f24db51f8e315513d8a566a98602c2b055c5bf1115e87fae7cfe204d6c981d50e5f539e6e56b4910fd36da266a8014ce85986c4b079ff2f5aac7e723f9756ce45141881ca807a0420e3cbf93a1498d9d35ed14cd8f9fc7d99482a9268b8a77a5fe199255f7fd9bbdeebbf8cb83c4861a8625d09fc41e4590220f94cfe6233397a2e0f7b447110baf0780fe7bc01d79668cc7506054ef4684acaaacbd250ae37a9f9964e98f244f3d3b2ced671a7c2dcfd2183389be01197035cf498836a8daa25e80669f71df9c45f24c4fe178f55f4accf26b8def63d3e2025a4f69f00372feabf4a12c416652b8b3b2ffd49ad67bbba8e6f9be22d180e7c184f3692a2859152a2ed7fcaa5440565337e60a62555292802425f809076332084415ef8eafafb9992bef25e57b63178b49d6120309328a61427a074ddc826753a758bdf14abe01c14431fa938503fa5cc9260e29a14e439f5de2e127454fc2f122563791ebba2090ee436cc41171ee6597820f0ddc7736464de2ea3792e4166f5813215541ac6d9092e9bbcdcea9b764258a1748318eb9c2b10ef1b872e563dfb3bcbf0d6948f58bf32d305dfe96cb5cf96765b797e1a09c1a87f5856d8f8c34cac9fef16f76ecd61f833847a0242f1e6d800973781a21bf103e57b4bbf9d64169b0c1779f34cfad31152e7c008a3f844c36e7aa12c2d31ee5d0a4822e68c5670353b85a947b3b9c689a7c26ab02aea65a41624ca62a1fd361499c2d902fef8f5dea0427218c592af78dc4a79fa817c85e249a2e719bd46a033db24cc30feaee46e6ba3b69b60a79affc895d389e325285b88e2e55fb851f7a5cd40846cfc05971d605dff4c64091447d61127c59286857dbec4a649c1fe6500f594533bffedc85e4fea71b2d6d2b8034d85580b3e14d398e7db17a1022060cedf14bc0c4547f4b49738cb525effb4addb70968c4e3908f575df89b067ee290b0bcc015c83b4df61ff2f03f3defba2e608fe3112b6e382d964db37789fd12a6af57468d40463ea33d763cb71fcd02b6c47568b06b01574fe580def105c1970da17a1dc28536da30f95bf29d8d527c73cf6fc8d16b93f2447a6e2488544d43dfe2487d402b386dffe2881b274888904a00cb6bc9d6122bdf4f6309866c595b96857d288b71aa7217b8249d916037d91b3f8f289f8bb3adee1b7190a7156ef1736e1f5aee206fc745fed2b6777b25a3f7670738589d22f83f7c486b32875664b74c766875be616c7e476a8bea2e353bd585f4d4a84b4b38b297e807d9a59eafa58782b4d7f81788a5f77fc86f7be176380771765fcb211da5597314daf8b53dee2c04fc592bc615e6c6f939b2cba76d25fd74ce31f42dd2d0051dcf6765842dad08a822d7278ac65b5eeb9f5fe52a900c527d25e044a46bb8ca75a7bb70d28e11b88cf85e143ac513fef2fa27f681b4b43dff68a48de2203196b0e3e43e196d047944cd485da06ebc436bddab752a6cc70839f8a16f39a5fdf95600354907a8de91b5775590278bec90b6f24e46199a60b4f17db2bb05e6a8ff623760747f1da9bfb1bd8164e2c6f19676060bd2b1c78bef84ba5d8cd6ba08a84b78d0875e96fd83949758382c80e243a369e78ba24df27be416109d86bf811875dc17be98387997c2c7d48339821f7cd351cde42f3e9c2ee4cb530a4aad412415d5c3f49b5", 0x1000}], 0x1, &(0x7f0000006940)=[@assoc={0x18, 0x117, 0x4, 0x1}, @op={0x18}, @iv={0xb8, 0x117, 0x2, 0x9f, "9ab5f4e815571841df1c3115dd5c2b1f77c8f32b88e20c0b3c7debc38ecc4910462755e38d6b874c444d90065af81eb277dfdae3dea44c3ffb53c472acdab6c2d5bc8b1e5bd31b4ca1c71e79df0a6d92265710e0520efdbe8403486e021c3f847dd846c65e8b695cdf4f9f6d3579897d10c1e5ec748e7adecd364361d1ff25bce7d440a75d266f767616d6fb7f80fdd173bdac2c402e98536e004f1ffb4b2f"}, @op={0x18}], 0x100, 0x1}, {0x0, 0x0, &(0x7f0000007000)=[{&(0x7f0000006a40)="681a9d46cd4e595eac6ac90c362c169279897b8ff5e7d7a640bc0454d29d640d738d37fa47f87bb1f9e77b5b6073c5f87a377f8c05243982117ad910d7a672cd592acbb89d2ebb2c1809c13da9d40f99882c2ca5468557928441f3c166bff3180413621c7c43fb6ee02655c5efb7c0b0e877d6153eaf3d969834bbfd685de7b64369bf52a3620fe411acbc4a16fe190f8232", 0x92}, {&(0x7f0000006b00)="df91b5269492851222382d95a4960c50b1173579b9105bb9a5998040f1fea3f40095ec2bbed5df3fe55a5f1955075a7339d737ce11ce08956b88238943379344", 0x40}, {&(0x7f0000006b40)="356a7590be18df2707d76fa3c588a1d2c1b56546787ae89b491553b337751e519c6dda0f8d62dde2ff56c31d6d0e0b994137a9d3d566384b5fd99e3dd0e341f3be8cff290f8bbd901f63a4d3054fe94f6409c87479b6fefdb47edd4fd672a9da1c89dd9ed168bbb7d315329a651c7366f22ae1397095d18e461823175e75fb27cda38d79cbb149f8096066761bca081fa0a87b2a60de7918f82cd2a47d861c6767f1adb2866ba0443782f3029387e3d6b78f01f01946a0dba006570b08d406b9b824ee19a65547ceccb3f3ea7ca2e1dae4624729", 0xd4}, {&(0x7f0000006c40)="d8c84a997e21a8c9591496ea253816d0b9f808e5292cd60da028a8a9986e0b2e6aa541abeae8dfc0247c1ca2d5638e893a9a691d1b72e83dfed0892fe83d99cfa1fdc4638eff99a3ed7388d4de2582e87ac2a02534064672dcd59fb64811a9a2625fd89d8a7cf877687891d717094ff0b65c21be8ab15f5d20c1f4cf61fa0fb07978f4a34b312bbf5fc57be0c3f4f9b4d071722b098f040bfc481dd8fc9a1d98cae5a4aebbccf772e6d90826911f152739a8e35ff065b7d4a89196afc4a6e243c28184f05c5df27048dba5fd4ec8c4eceda52f26199cf838154ee2", 0xdb}, {&(0x7f0000006d40)="4b641a7bb60ef927cc0af550909fd9968b14fa056bbef53ac3011ec27a6197edb5efcffbf959", 0x26}, {&(0x7f0000006d80)="34661bd823ade8f7dcdfeb2b6615c21c17a9806a5bd9dcf8c6b930ce1d24d96a6da5d5e3a512f656c272d365944e4df7c3d2d13866b8d37c9e0b6d89615dfb039d6392630e410a76c7654594d0b43f17cf1da683e38d84bf03286cc14419349c329d9bab7ff52e6b08bcb7673210c35330457947996c82917279f993b4027b7034938a36858e7ad937b751e89868d4d2fd81142bc1593edc95fee6c426637eae56a76a232c655f77ff9721a9c11bc9d790b41d83dcfbf858608613472130d3a7ab923591c0bf4f637363252658f5ab4642d551", 0xd3}, {&(0x7f0000006e80)="05c7c2a06c827efc8c46d3549f2b801f77e1023730ad5173169a32fc1f31ca106f67195a1229821d6a35ebcfc250f42d4937adf930616f740577f3d50f9703838c6210d40bbecfe39cdf837e9b2e1de1447d3cfe3c24d1b1abbd402535d7d3bf59963262792b709c2353b17cf6bf510c0e1a4b6abf61", 0x76}, {&(0x7f0000006f00)}, {&(0x7f0000006f40)="c5da8c1105e54e90afdf12f15d0970e3b390a91ca45478fb3152eb71f0413d5b464544ee005cd6aefd62521bef8478ac621c1cfcfb0ccc0de316af27eab86f041db91ec228497b347cb576970278bf7009e809e7db2657589e0bf82ca9f18a2c47206b3d0f02da5f6fbe333d14403f0945f49ae54ae80ebda7d1d1d28f31c76c87", 0x81}], 0x9, &(0x7f00000070c0)=[@iv={0xf8, 0x117, 0x2, 0xdd, "eb57c97289206ba5075131670e70b9973312978c0e0197431b7277281a3d0face8dbde691d6b89810c0546c2ea2597a1c23e7219e8d43fde7c6572149a0f8cfa2f7e20bdcc6775bfcf7b0ce5cb48784fb50332d86cdcd4f4d260e93c432da897b7b44a1ef97db5b290b6d4b16a4a6d9037ce3820ab60247274f658573fc2fee94664199be3b13542fa5ae9887509e1c53abb16f5d50e74b2f14e0e6a86146a0ea9ca4f76c4db5de7133eec573a44c3cfaa1391b19f13b35649e4c8d4ef79991839964474aa2b871c02672bfb2938efaec1c94c6ab6aed19566f4ed768d"}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x40}], 0x128, 0x20044000}], 0x8, 0x8000) 18:40:57 executing program 5: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000080)=""/110, 0x6e) 18:40:57 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x1f010000, 0x0, 0x0, &(0x7f0000000040)) 18:40:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/149, 0x27, 0x95, 0x1}, 0x20) 18:40:57 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x0, 0x215b0000}, 0x0) 18:40:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x7a000000, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:57 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0x21, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0xfffffffffffffcf3, 0x1}, 0x20) write$P9_RREMOVE(r0, &(0x7f0000000000)={0x7, 0x7b, 0x1}, 0x7) 18:40:57 executing program 5: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) read$alg(r0, &(0x7f0000000080)=""/110, 0x6e) 18:40:57 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x20000000, 0x0, 0x0, &(0x7f0000000040)) 18:40:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/149, 0x27, 0x95, 0x1}, 0x20) 18:40:57 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x0, 0x9effffff}, 0x0) 18:40:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x88000000, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:57 executing program 0: write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x7f, 0x1}, 0x7) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:40:57 executing program 5: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) read$alg(r0, &(0x7f0000000080)=""/110, 0x6e) 18:40:57 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x20010000, 0x0, 0x0, &(0x7f0000000040)) 18:40:57 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) 18:40:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0xffffff00, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 18:40:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) r0 = accept(0xffffffffffffffff, &(0x7f0000000000)=@x25={0x9, @remote}, &(0x7f00000000c0)=0x80) sendmsg$alg(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000280)="d1522aeab2c78023f7595a100be5831c8e3bd1f0c54f0b39c024e38ea74bf0094e53c45af11e758fdfccfb2ffa9077982cfb76dfc274cddb8dcc10963db6c51aa56d3e578f853e717af8f0bb3d0fa0d587a13fa88ed80794b9d5cde48cced9d80e321dd933594ee610b3ca3e851e26a32a6120fe395fa1b34bcbb75c4ab7", 0x7e}, {&(0x7f0000000300)="6f5c6935c6365f116765452b9b4021e1323a1bbd800ead46faa1d9c610c795868e3b68cb81077aa5cd02543bbf6e391a69880d17cd8e0b76e3902889eae3c5e46091ae354ccde7a2a4b328d5074b37c5c3f2b00a420db9112a5f943b8d9523d408ff2ab887e0a6be7753b8a982db60e1d7f145e77eb2258c1c29babff27321015538a221f926329380b996a0e66fc1751dfbc6079428", 0x96}], 0x2, &(0x7f0000000180)=[@assoc={0x18, 0x117, 0x4, 0xffff}], 0x18, 0x4000}, 0x20008004) 18:40:57 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) read$alg(r0, &(0x7f0000000080)=""/110, 0x6e) 18:40:57 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x21000000, 0x0, 0x0, &(0x7f0000000040)) 18:40:57 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x0, 0xfffff000}, 0x0) 18:40:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 18:40:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:57 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x21010000, 0x0, 0x0, &(0x7f0000000040)) 18:40:57 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) read$alg(r0, &(0x7f0000000080)=""/110, 0x6e) 18:40:57 executing program 0: r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x400842, 0x0) sendmsg$can_raw(r0, &(0x7f0000000180)={&(0x7f0000000040), 0x10, &(0x7f0000000100)={&(0x7f00000000c0)=@can={{0x1, 0x1, 0x1, 0x1}, 0x0, 0x2, 0x0, 0x0, "2dbad5f38a2fafae"}, 0x10}, 0x1, 0x0, 0x0, 0x4040000}, 0x800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000003000000010000000000000400000000005f00000000"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) sendmsg$802154_raw(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000280)="70857b575e586d4ae7bd0b815cbe0b2c5df3c04ff7f6cbf33880610ea6899c4f346ae82419b0eb1b68c86bcc9e6cb0bd41b072025745e1f39b9708fd9d28db8cf567bfa82ef9efdf62a57b816b3888f3664812c5c7f12fab8df97eea1b27819c1fa089a2df96c5cef2035071c330233b9e922f8b5d00a9f5cd0dba3735ce89291f10f3341af3fc053a6d34d97eadff9776cf87e2506f1092e840d39de9f2170cb72e5de1dd54700f9d276f580cefd14623245349d2ed0ba7cee4c91e08b7f029b62e03022db37717ef47e41cd83d14f9cb6b3040f5c953bc3698690fc22e61ebc41b08f387aef8dffb3d5b4f45b98d781d7b186d1d9a06e1", 0xf8}, 0x1, 0x0, 0x0, 0x800}, 0x20000800) 18:40:57 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) 18:40:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 18:40:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x2, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:57 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x22000000, 0x0, 0x0, &(0x7f0000000040)) 18:40:57 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) read$alg(r0, &(0x7f0000000080)=""/110, 0x6e) 18:40:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x1}, @volatile={0x1, 0x0, 0x0, 0x9, 0x3}]}, {0x0, [0x5cefc7fe81fbc615]}}, &(0x7f00000001c0)=""/131, 0x33, 0x83, 0x1}, 0x20) 18:40:57 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x0, 0xffffff9e}, 0x0) 18:40:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000280)=""/149, 0x0, 0x95, 0x1}, 0x20) 18:40:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x3, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:57 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x22010000, 0x0, 0x0, &(0x7f0000000040)) 18:40:57 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) read$alg(r0, &(0x7f0000000080)=""/110, 0x6e) 18:40:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) write$P9_RWSTAT(r0, &(0x7f0000000000)={0x7, 0x7f, 0x2}, 0x7) 18:40:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000280)=""/149, 0x0, 0x95, 0x1}, 0x20) 18:40:57 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) 18:40:57 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x23000000, 0x0, 0x0, &(0x7f0000000040)) 18:40:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x4, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:58 executing program 5: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000080)=""/110, 0x6e) 18:40:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018c40000000000000c0000000c00005f002000"/39], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:40:58 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f0000000280)=""/149, 0x0, 0x95, 0x1}, 0x20) 18:40:58 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x23010000, 0x0, 0x0, &(0x7f0000000040)) 18:40:58 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x0, 0xffffffff}, 0x0) 18:40:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x5, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:58 executing program 5: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000080)=""/110, 0x6e) 18:40:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000f75845fb5f000000000c0000000c00002b29000000011000000011469f890000040000"], &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x3, @dev={0xfe, 0x80, [], 0x3c}, 0x7fff}}}, 0x30) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'wpan1\x00'}) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280), 0x2}}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000380)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xde, 0xde, 0x5, [@func_proto={0x0, 0xa, 0x0, 0xd, 0x0, [{0x0, 0x2}, {0x80003}, {0x5, 0x4}, {0xc, 0x1}, {0x5, 0x2}, {0x9, 0x4}, {0x8}, {0xd, 0x5}, {0x10, 0x3}, {0x8, 0x1}]}, @int={0xa, 0x0, 0x0, 0x1, 0x0, 0x67, 0x0, 0xa, 0x5}, @const={0x2, 0x0, 0x0, 0xa, 0x2}, @datasec={0xf, 0x0, 0x0, 0xf, 0x2, [], "4a82"}, @var={0xc, 0x0, 0x0, 0xe, 0x4}, @volatile={0x7, 0x0, 0x0, 0x9, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x4, 0x2, 0xffff0001}}, @typedef={0x4}, @restrict={0x7}, @restrict={0x6}]}, {0x0, [0x2e, 0x0, 0x30]}}, &(0x7f0000000280)=""/130, 0xfd, 0x82}, 0x20) recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000080)=@alg, 0x80, &(0x7f0000000640)=[{&(0x7f0000000480)=""/78, 0x4e}, {&(0x7f0000000500)=""/180, 0xb4}, {&(0x7f00000005c0)=""/56, 0x38}, {&(0x7f0000000600)=""/6, 0x6}], 0x4}, 0x40012041) 18:40:58 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x24000000, 0x0, 0x0, &(0x7f0000000040)) 18:40:58 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/149, 0x1b, 0x95, 0x1}, 0x20) 18:40:58 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0x2) 18:40:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x6, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:58 executing program 5: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, &(0x7f0000000080)=""/110, 0x6e) 18:40:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="01010000180000000002000d0c00ebff0b00000000000004000000"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000000)) 18:40:58 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/149, 0x1b, 0x95, 0x1}, 0x20) 18:40:58 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0xf) 18:40:58 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x24010000, 0x0, 0x0, &(0x7f0000000040)) 18:40:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x7, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:58 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) read$alg(r0, 0x0, 0x0) 18:40:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/151, 0x1b, 0x97, 0x1}, 0x20) 18:40:58 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x3}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/149, 0x1b, 0x95, 0x1}, 0x20) 18:40:58 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0xf0) 18:40:58 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x25000000, 0x0, 0x0, &(0x7f0000000040)) 18:40:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000000c000000250000000b0000000100000000000004ba000000005f00"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r0, 0x10, &(0x7f0000000280)={&(0x7f0000000000)=""/111, 0x6f}}, 0x10) r1 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FILTER(r1, 0x65, 0x1, &(0x7f0000000580)=[{}, {}], &(0x7f00000005c0)=0x10) 18:40:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x2, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0xa, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:58 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0xf00) 18:40:58 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/149, 0x27, 0x95, 0x1}, 0x20) 18:40:58 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x25010000, 0x0, 0x0, &(0x7f0000000040)) 18:40:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x2, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:58 executing program 0: read$alg(0xffffffffffffffff, &(0x7f0000000000), 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) socketpair(0x1d, 0x80005, 0x7, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000007440)={@local, 0x0}, &(0x7f0000007480)=0x14) sendmsg$nl_route(r2, &(0x7f0000007800)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000077c0)={&(0x7f00000074c0)=@bridge_getneigh={0x2cc, 0x1e, 0x200, 0x70bd2d, 0x25dfdbfb, {0x7, 0x0, 0x0, r3, 0x4, 0x1080}, [@IFLA_MTU={0x8, 0x4, 0x9}, @IFLA_PORT_SELF={0x20, 0x19, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "b350d3f147aaeba378c51a1318d84bed"}, @IFLA_PORT_PROFILE={0x7, 0x2, '.\\\x00'}]}, @IFLA_VF_PORTS={0x274, 0x18, 0x0, 0x1, [{0x38, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5, 0x6, 0x81}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x9}, @IFLA_PORT_PROFILE={0xc, 0x2, '+\'-^}{$\x00'}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x85}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_VF={0x8, 0x1, 0x5}]}, {0x60, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0xf6}, @IFLA_PORT_PROFILE={0xc, 0x2, '\\.{^},(\x00'}, @IFLA_PORT_PROFILE={0xd, 0x2, '!\\}-/^&.\x00'}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "b7dce2144e359ea586ed01b5a2641943"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "4433cfff652463349b347c769304695b"}, @IFLA_PORT_VF={0x8, 0x1, 0xe3}, @IFLA_PORT_REQUEST={0x5, 0x6, 0xb5}]}, {0x28, 0x1, 0x0, 0x1, [@IFLA_PORT_PROFILE={0xe, 0x2, '.\'*\\%{$!&\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "491d89fd634ffc9b1a317889aa818704"}]}, {0x78, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "9618952e2678a68642684fa6570b1bd0"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "c46d87a6f0a36eaeeccac99badee7b01"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "f4763c1fd51b94ecebba082902ef224c"}, @IFLA_PORT_VF={0x8, 0x1, 0x6}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "baf1a4808cc9a12190da88f7b1f8ece5"}, @IFLA_PORT_VF={0x8, 0x1, 0xfffffff9}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "9fb2ae031ca785ceb597a581afd0b7af"}]}, {0x58, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_PROFILE={0x14, 0x2, '}}$\\l}\'^/]!\\%)&\x00'}, @IFLA_PORT_PROFILE={0x5, 0x2, '\x00'}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "3f090b15e3f2b6aefdf5ad265723ea59"}, @IFLA_PORT_VF={0x8, 0x1, 0x1}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "66412b94fbd06fdc274bfd20b2f8f0dd"}]}, {0x8c, 0x1, 0x0, 0x1, [@IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "a2782b5d5078acca62a8ccafda29e5d7"}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x81}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "0011b011006b0bb6868737b7633844d4"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "d102a0238b5764f65356b6d755cdba29"}, @IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "f2550dae1c10ba0308982ebfe9a57ed1"}, @IFLA_PORT_INSTANCE_UUID={0x14, 0x4, "446a8cdffc2d8521da2ad471a3307626"}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "46fef49a3e12c711b96db6ff32400708"}]}, {0x40, 0x1, 0x0, 0x1, [@IFLA_PORT_VF={0x8, 0x1, 0x8}, @IFLA_PORT_VF={0x8}, @IFLA_PORT_HOST_UUID={0x14, 0x5, "37067f992cfce69e5b3f7a8467e62c96"}, @IFLA_PORT_VF={0x8, 0x1, 0x7}, @IFLA_PORT_REQUEST={0x5, 0x6, 0x4}, @IFLA_PORT_PROFILE={0x6, 0x2, ',\x00'}]}, {0x14, 0x1, 0x0, 0x1, [@IFLA_PORT_REQUEST={0x5}, @IFLA_PORT_VF={0x8}]}]}, @IFLA_LINK={0x8}, @IFLA_TXQLEN={0x8, 0xd, 0x400}]}, 0x2cc}, 0x1, 0x0, 0x0, 0x40810}, 0x20004000) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000073c0)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_SET_LBT_MODE(0xffffffffffffffff, &(0x7f0000007880)={&(0x7f0000006f00), 0xc, &(0x7f0000007840)={&(0x7f0000007400)={0x24, 0x0, 0x2, 0x70bd2c, 0x25dfdbfc, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}]}, 0x24}, 0x1, 0x0, 0x0, 0x40011}, 0x20000000) sendmmsg$alg(r1, &(0x7f0000007200)=[{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000280)="e7e6a675707dd299d2fff6dbe370032ba8568ac10eb59c1991ac27dd379bc33e4243b0d141026f7fa8e132a6638bcc01af3a21cb3fc16c287e42ccc0c084782e338435f989675d2a977b94bfec950d1e02bbf7510ced36db9dd92ac7685c2b5120d01c5813b00de6256b3c3623054b830f6b9a7fce938e4a214a69ddde4b6e29284525220001220a895c05897e8317", 0x8f}, {&(0x7f00000000c0)="5acc6c85cebd82119c2a8ad73f1be398e402c1fd3bc2d11c8f8fa5ba619895dabc9027cfb94873bf8e999f11edd857c6daa97d8072cf8167f24998cbb48122a1c5a15a86b5f6cac7e24575ea9ecdf940704c370d5b", 0x55}], 0x2, &(0x7f0000000340)=[@iv={0x28, 0x117, 0x2, 0x10, "7b2626b4dc6ab6ac67e1a7b1cebd3de0"}, @iv={0xd0, 0x117, 0x2, 0xb9, "45aa48aa3340541fedab7cc0c2e5ee927cd72a2f3ca9dd30011e4ea641a0fbb47332c8b2e7f0c5fc6bfe469b975bf0a01bf52b591f6fe2952330e3ec1838856ba64e6499be74971dcd6772f9cca321d0155d944d8b45e7a40a39e6faebadf6736d33dabad97d15e4fc09bfe2529209bea857dfae105592211d0751e7029b3cf3de99d7a69564bd3d7871545eec54ddfe3a8dd52434217545e986711d1fb0179ccda361a19420ff48362db7966588513b5dd778e9e0231084f4"}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18}], 0x128, 0x200000c0}, {0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000180)}, {&(0x7f0000000480)="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", 0x1000}, {&(0x7f0000001480)="f3463e370f3f6c8c5b9f9077e72dc550a17a2be124f4d5d70eb138fa5068dfb4f8c597a0e0275f7c255a9518855eebe4646b97750a02b191ba3175a9c83e978aeb4ece9b4186a7f8e04f5947741753cf6310015935f83dc14959b1cf5d30b48dc56250c0aaba370c266952aacf729dadc766d7b8f5478070a93511752f933dabbf61f74560a2e207e119a7a21217120c41bfc6345fe41f965f49d0", 0x9b}, {&(0x7f0000001540)="00f1e0eaf9de472e52a9e79103a7941dbae4981a", 0x14}, {&(0x7f0000001580)="c8359ab9996c93cbbf3fb0fd72afae34293ed6d21807a0c783e87578f77c79c17bbcd7419cca261a79f58b64a496be8b2e30b8918a19ec3b9c5af556c3b938a3785f4cd76f8c641fd5eab594331456c4e552651ce9ac7f336742965f310b4d20af6315ee7c46bf484e07ac83a89d9ddde07a329acf7440ce672321bed82bab7fb60efc7a0572b5473334f19af3246de82ffc8655e498f1c9d61070f4d18b60fd64c7566bbac90178e306f8385ed87e82c851c42a4d12b4eef77f1aedaaca4ffc836dad5e5bcc9cbcc5d882d64b4ad1028681819c749f973dea49e9776e788c78f57b11feb6a5fff2", 0xe8}, {&(0x7f0000001680)="f164fb7b20aca794ca7becf267a91922fc1d542596a08611968f261e8dfaa7a935500cb6b03d926a0715c0e3fc671f2250de03821c752e0483244657035da9c2ff5c882d144b24f5c52f0686f5892168854790d1137c4d5b0a0405e886136fc2e484f84867670017c9d0ecc7262c879c9bc583939ed79ea4cef6fe8e27cbaeaaeb9d1395af43aa321b3c707fd166b467168ac54387d31f5057450a7284855a10dc5fb1ae3851e1ee6b8943b99f23d307c7ddb63e0a042ebf6d4f29e4f5607204b633099b9f69f123f5fb32b12e3d33a8", 0xd0}, {&(0x7f0000001780)="fd73579f5f756248631dceab78e0854aab765c009308f37352fba7aa3ced6ec054d3b3173bb2121e67d6d5753538450aba131fee5b6157fe1a164683e3e1f3be", 0x40}], 0x7}, {0x0, 0x0, &(0x7f0000001cc0)=[{&(0x7f0000001840)="221c36df844cdeffe0ceacad7be839f6912aa86e100c0801fd31ae3ba0198bf0773a12de8447246424fe7d101d2bc7586f156aeb82c591e81234e1843f965d369af57a01537f25d700", 0x49}, {&(0x7f00000018c0)="ec0dab990540f807dda9bee1109c02bab03563b78765dc840e4a73b7bddcad70bcd696c612104026a26817d4106b1aeccfe6628b", 0x34}, {&(0x7f0000001900)="180bac495072b78bb1da7032460edf7bb0d396975527979eb85df7ee628f89d8683adc347a245c6a4ba91acf5c4b38f7d135c2812a4a027fdf9f3bbb7bff36eab75010001edded8a392feaa216ca40f06a500b30ca6284597a987aa8bb852f98443012dba883cf396d204b03e83de6456907c4a6071eda7559162b5876fd1d3fbb41b97140f8c521983f01313940a23624894e9cdb824d7c0a084785f6bc6aad7eba5add0b887eb34bb03fb0c8dbc124894cfcd49c59a0107bc7c32aba0ceee65c507d41b195b9c9abff2c88c4dfb417761ea8a4bc788678bdc4132c3994ade92e57e95f6f1fa3070acf7118601fa7872c", 0xf1}, {&(0x7f0000001a00)="8f2dece13195022d9a24bcd23f822a952b203561e01bd66c58141a2f775f9b7e5ccdbf1395b5e059b85a7ea15f35ccdefebd27af67894abf148f1626742dbe6fd252c2013941a8a8f627f9e3e36e4857306df5359a1b10ba8ce2b39d0141155388f1fd3ee27e395d279c2450ccc901b9691c4373c404dc3348de59366022e750e5adb28fa7bc492ff849b0eafb9c105f45710ffe6a5549dd87b431c5b21f82b6e598982596fa87644e08ec1b17aad4fa123883e084fd7c99809d66a79aed7bafb1bf9fba665dcfa6869d50f65c", 0xcd}, {&(0x7f0000001b00)="e7bc48fc71d2c5dd41008fd1c74f0eaeb60e03aab7284a75abe016949bc3fda7848a2433f3a5fd09bd633c1cfa3a60eb5da0cddfa7235a618f9a31850c748776f18eabfcff5d5c5b9caf8fa754051313a76001baa077780c074d8e1b83f684737fc2f3f400a2617a5ff853867e09f3adef9bc0e2609cec0247796c9b34bfa1762dafff33bd0fd86ebb07681f854b861d689b88e104817e9cb352d3cca9ae8b66c5407cae1852b0806b0617d524626157e101bafcd1bcf2", 0xb7}, {&(0x7f0000001bc0)="b7c1713c5661754218fd39c18ba57a31408120be1d3aaa48f0ee9da510c5dcbe9fe816c220a094d222d154819c9e2f8ff8566b22da9f5c9791fe79ffa6381faf36abd8adc9243281f80ddab161b7e46de2b9fe20755ed6c132a2139d2b3bda5f404b1381c14fa77c309be9b85984b64e173a1dea5fd82ad2062f3c3a2bf4c62810bbd654186b73dc541990e7d4233c51bebbd2094823d0929e26c4c28716688b96ebf8d247c4a86129adbaccff3decbc6505392b9b40eb053ab0b813ce9a0e0ce281de686963cc93a2cab1d1b54c21ee0198", 0xd2}], 0x6, &(0x7f0000001d40)=[@assoc={0x18, 0x117, 0x4, 0x8}, @iv={0x58, 0x117, 0x2, 0x3d, "729377d9a8a1b0e1b23d9dfc69fddbedd6b0cd814a2c442ce73385531164f9ab68daeaa7770bf041601409b021851b7c06cfd9f82bee30ac28b3374352"}], 0x70, 0x4040894}, {0x0, 0x0, &(0x7f0000001f00)=[{&(0x7f0000001dc0)="15a991911104508edec33a54dfc5206ddc44bb9f0a56025532ef1678e697cdbffdafd1e410a0ca23e15a01", 0x2b}, {&(0x7f0000001e00)="560e80bbcfe5bf9cf85d7ab2ef0c25f26a9638a6e73fa1c695711ca88da3692ee4f2e47211adb28b2db9d4ab912cd0aba85103ca2a1396ba76608d5bc08c471a8b28c02fe0198f10f989a0c917f75c5d3b0680fdd3ab0ce1d50442ab1e025001c937d31fcb10392d56b61d8cfe4b28dcbc3e53c6039a734aee0b3244e753740d0c85bd7ebf4f16908e261cda22221f2daeb4c389123e589ce076e7f5243fe80441b0b8abaa277954b3c5730b612e702680fe9e30fbd4eb10be711ec4803b742dea90a7d9d8b36b0161175024893593996f76867de93081820c884a14ef7a", 0xde}], 0x2, &(0x7f0000001f40)=[@assoc={0x18, 0x117, 0x4, 0x2}, @iv={0x70, 0x117, 0x2, 0x57, "000e4aca522a042881c5be45769bdc13f595f5c1cd3a58d3242173f1eae24a6156c95c8b4216789c74492a04bfd45d42082257708ff43bb48b36cc790a10f648320f4c3785fad551bf91410aa2ab2c8ad4f1f45ac8d7a8"}], 0x88, 0x2400c006}, {0x0, 0x0, &(0x7f0000003540)=[{&(0x7f0000002000)="fc5627790346f6992e89f9fa353d6eeb2910fef2d13f766881aae4b50f06ff30d4aac6a257b30331c32e6f95a50e461654a98e105e75da53163c8465b80e17fff5796cea3cec1269e0b4d4b189452230dcf1a3b1e5d83268815f821743af4f8eea616bc49e9f9ce273be3fb381d3727476c14bf268e435c29f89e39c63de354a5128c31be59a7e5efa5ffae171c588497b9dc5603d1fa4230369e93471c935f569e1d9c7f69720f790fb64cfb9f92889804dd5ab353c212bcbd996d09f6606e1b2c2f2c9824adf0ba3a5cae7cc2f1e67ca34c85d8a0f618526f649a0174b", 0xde}, {&(0x7f0000002100)="044de015f8ae82bdc3086c415fa5685620471b5cc3eb944d32190721829d54bbbc567cb1afb30028d6b5874d4aad", 0x2e}, {&(0x7f0000002140)="3d671bcadb67b6d7169c63642260d09b21aca55d6d2f3d2d3c1085baae50349ed5d939112a63bf1eeffbddc0996fd78489a7a06e6e63f3df547cc215491e80f24c17f71dc116ac8bd2d7018a0e5a04fcbdb3eb132ee9860e5ecd401f6b8de1b0650637e88da814b8a692278fe0f832f5809b08f9735bde79ac06bb908ce90dda3b0273827af546ef833aca760739012747ecda91d369960ecb17a5974a34949addaeb2", 0xa3}, {&(0x7f0000002200)="15547b9f44e7e3b93059258816369e387bef63cc6339d67d672fac234a05566856b7944544d17ed4f9a61dd69db467619370c09bca1b739c08ec4ac37cf10ca317b384d6a69933c989c91232fda624415da9be5b1d9a1f119ee6c115510ef2bc237f47447b89ff383ce31c487812120e76020e9c9639b6e2f212a6c358d1e74121318704e82e1320c66aeaf9faa97d037b31", 0x92}, {&(0x7f00000022c0)="23fc9af66e759c63421d93286e08acbe32f44674a86c505dedb7f0a0a58608156f76376a02ee8ff3617cb0936ac36dd33f504038a853bdba3b1a50d7844e4ba16da5", 0x42}, {&(0x7f0000002340)="05de11e24c899863df6415d29081637ac577ef85ec5aa91aa10c7feda6e42ba5d82dc40df955c919260ec7f4253496ff5e7b4d4ee9c8515507fd73b75b5a7a7c4c8d6d4bf93ec25f8cc6ab988327a62b4b91bdc96351c75199060bcd1bf971be075bf642d76bcb7da43165ff10dc7ee1b3405b9de99c9f7c823ecfcf22b3165e75476f1ed2ef1af4795ec2247cd1d490b04360301a9561ed6713739af0c96c0541a758d9973804c0a325e7b17ce4e640f2bbbc0653a404299dc9648e976a410d85", 0xc1}, {&(0x7f0000002440)="3eca3695380a16df77b7574cea264b17434569def556f66c380beab10f871a39556ec7b642e96d37d047d38bae94ec6090b9ddd07a4928828f85df0d828ccfe49ed96fc77f2b0c3add7dba2b68a64d80463f68ecdfa17a5ff01074b091bc95b09c98e67bf2a2978e47abe1e858c440f3f67f6327e6662e338207e5fc059564dbf7fe81f7e82f8c54af8d4ffa175487e1a7d8b76e66475637829101e12ebf1438bea9404a8b647c12061c21b9abe2ecc9ab6e7996954ac9af34a4775b906548b02ffff01a1bc725b288530d3be78b7e0d574edf7dc1dd9798a1e40180b3fa48b798704df632", 0xe5}, {&(0x7f0000002540)="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", 0x1000}], 0x8, &(0x7f00000035c0)=[@assoc={0x18, 0x117, 0x4, 0x3}, @assoc={0x18, 0x117, 0x4, 0x4}, @op={0x18}, @iv={0xc0, 0x117, 0x2, 0xac, "f74ccd9a4cd00c9a7a837d548719df4884257320065302e32f43ea73e66f0b6582da8c0a135f9510081376487a0d433f672e1d69196dcfd3381a1f4818798fb7a2d70a0fd3886ed33b0a1027806bb4741ee66676556262823ae39cf27005fa65dccc5e7002c7f3b48c570abc488fb2ad6785ecdcd3cf447591425c54fba54eeaa216350a821e567678a5bf2bb903154db278f98e723f09975a76048ca3ac8d1e6d1396924ff7d1c5bb14b9c6"}, @op={0x18}], 0x120, 0x20000800}, {0x0, 0x0, &(0x7f0000005880)=[{&(0x7f0000003700)="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", 0x1000}, {&(0x7f0000004700)="2981998d9a4082c53f02b8fde181cc360e05b84a24457df2337e4b8e864b816cf7d7aef833a05b132d4da3f5d5436faf8371e0908c7259016293e38762e5b0444b68e80d665c8df9d14138c51d333267260cf95421a26ffae19b", 0x5a}, {&(0x7f0000004780)="1870566a60b8b83b06301a8d98960f240f493d402a78136c6d1ffb5d5e8d0a6f32b3191fe191a1ad2269bb92d535f52b5ce63752bb7584ef81d05d607f758a530ee6f6990e475ca91a2b618459f973c69be40010569df5cc971efcbcbbb9bdfc5edc85208e9a70531bfbb79ba1703b2e272332ef012d2ed5566c97e1ed76ee17e865885698021a1670f6eedc005ce68ff9bfc7297bf0d2c2f43758d4145315da6a496e71160890c0669326d912b944c841932f1f447e5a61e96f994dcad8baf6356311e1957ebf8b3e23045f530dd5871c882b1e52cd94bd896635db2f3a9b32960133345fbe35a0bc40430bb7abde96e7f62511a692c531cd29ceba165bfa68be29725e725a16e2cd29efa1bc7cf32c45ed6a8bd9aaff025f7368e6ccf5d599490579345ee79ab1dfc4c68b82acde45513cec294ce6a87623091b4d73647970b9d0a8496bca5cb247a1373f6c0babfac6402914bd59f13fb3243facbf8a6852be498a10afd6af393093d3b8c9f69b9c536674c4980b030e889b406a24dca697dcd23a2e685bd75998c3cb02d575a69c2c069eb2775cea349f6e623e9956b876aa74d2ff297ea1e2ffaef4b5825e0b23dc7d39446eb778b2442104ed428ac669d309c6c6b68c845157923ef9c443d18e500da0a77631fd6c994e75eaa22dad8227ade6e03915ad99b31c0d070be44c1ff10035583c9362450c8a987f50123c3ef8411fa6aa332c05b39368d173133c7c35f5377716bc7f5c5fc05c6eed4b033eadb2e44239d2de9f5e73a0b689c1cb1809f989eb15ef740d0be1275a6f090fc4f5968754115a4d04041ddb5d853881ada320f6b442c0ebfe214283d2319ae2c46b1caa8acc7594f76fcdb1d842ceaf789bfc89b488c2421d582cf03246d465cd4f6d85555639b92678442d15a01a08037d1325f5a4ed4b5829f6234b7760c9b48323a0adfad305045f00f3bc370d1c545aab85289c1f4a3900fb6baf6f3f5b69ff619ec7dede0b94adfbbda65d7db9ee8d05f9c8f3e462dabdef742b6fb35bbaf3d96339aa90486e62872a754788bda742eed661d10cd8a1d10bf0225b20bfb76960724b60cc53c8d83364aa3894da7ed127616325049515744de033a92d0a72df47d6cdf6d648bd7f6320b07bc3d31fc6d9d03610ce8f6805934fd0f125f4611a3d2de8a94a90304d4eedde064da0f7ba1ba82ee6d68c1a2ed2d8f1b87fa140d7157e690f59a2b92811e4404e24c727b1d5a88435cc77f36ad8b37dcd1768f97d1530e89c227322e11fb873df251ab7093b97d13cffafdc2f9491a179198ac1d3265c90c0009f93fa60359057235b90f4ad375d06eb12b8289fadb247a05fdb9de5bb34fe4b587bccd4b434a60adbafcf742636d3e2ed9430ee65e182041595c1c7346224cb3efb9d89f149a1155087c0928cdb9594c4e7dcc5c6c3cb00fe671b14ed00df73eed750c5c1728167439b34a2a4e003d97f97eadd20a635fefeae8898ed18f0a956eca8b346a4777abc5a7f80ee4cfef442e10bf44ec2dd2945faccadba0a4cbd684284139b5ab53d44e6624f956a7c0b8f9dbbe5ce3df1428b9839dac2536212dc3fad97a34b05f5fbd6350f8c95268eb5027a857fd18b526275d99518e256146bd5670b8f3d3f993072f2070046d7102f7e04097a277deeea104e918fa82c8a03b3fa0bf116d9fac72de2c9db9f51abffc1d67d33662a39e7c6ad9f3704d29ae38286da77ef81f618fad7279a43f64168b1a8bd06fb090cd82a1c54ca7c6f8c0966d85e0305fc8b0793a9e6bcd94f6f2468f1c1d569aa6bc9d3ab604086ae9b9824e8d082fdd1e8545912a13d891f2aacefd3bb7430b1dcd043fcd36a83bf0e6d2d93a7837e24eeec8bb38160e1fd538413db1cdfb658d234b034e3b998dd4662a568366a954b9bd088e9a30e8c16255f394d7436f77a74f5ad46d49bf636cfd368d01f9006d2ccc15dbf9a3ee858f728518c8eca4d790f67da1d0bdd836b6e4c34659a36fa945e71294eaacc28b0e57c7169b6db806233fa4aaf20f0a99068417dcdf1e780741de5a42bf7bf757fb8a43186d2fcaa957a3b9e426133ebf8f46528d2babd828af261989c55236dd14a8e4d5b3a574507eaf09610080f36666a644ad06031e52123c3e165b426077b1f6939fa69ff7d1f864cdab905777ddaef021ec927512c8c05fbbe81e3be4672c154c1c49682c99e30c3f23eced53bd578a679c388f01a3b8d8ca0b723093d66aca29d1bf88806823a84ad52e8e384ac3c4e229dcc6681cca85af543c1be4f2ca22e3f6a2efa36954a03ec9cd7a3eeff05fcaffe0ee6b85ebe0f2a4febb59fcfb667bd46f0c6c504d07a49f5acb32f92aee3d005d33242c7366ae75a0b58dc77ae505829b45d1423da593ed709b519e618280085041090bda61a5c9a448a6cb52005fc629b2ed8c300b51e7fee4a22885cf852c9291e019f915170aecff75979aef7dfae528c48d4ed673a2eb4377a813d20f558ea7896de375ce39d104ee74696e968534a87afd40b331273f55d53917fd36344eb7fd877e6b42fa494a5c829dab1d99bfc8d7c6673cba85db8e890e15544da9b3c8504c0b72b9a19d811cc7c3e294e37ca84f92613b8a9f481a078ca6f127afb1ffe84918acd2e940fc133f3d0a440e4733610ec967c055683476ceac5c7170fec2ccb1eeaa4168dd960c319acf4d06b733f98952e020cfdb96e74ad3ce3fa64c96febb4f15c2eca558db08216c2bfede5898b14fce69eca14a43622da54b88e934aa8aff46242e1e595cb3e45527675bcfb8b05b2546030363bc13c8989d51cf2a201a4845d75b9bed6a219b0ad85e093769710076c6e7c8b5263c7c6e25d79e44c21a74617b6e5fbdce860fdae89ac346adbcad9820b038dbadf4f8813b7593bcbfccdbab05e09326adc0b35b1593640961553b285f790d77f9dbd8e028493587e186ec70c67fd8126b9db70a39f15f3828deeb04e3ba2290f7836e088f9ae69b0a51ceaf51e5d1b891c9733a80de4fa9c1d0bde6586330b8c9b22f6ee6d67359fc215e854fde814c9ba2e3e878bad92b6cbfbe1dce3e46315363bbf26b8595c8d7a2521cfb92f06f7d42150dafff3edd0f225389fae16aed939ecd139608c536655346ff2295f8863d1d8511abfe789c9e0f3b2e1ff1985d495d03bf550855b745a4a14dca34be6d50a77a347cfc6e2b8a6d11fcd53216ded6851fd81b35813d53ecd7aefc77ad567ca11181e0c11d7f870fc0084eebf9a14c30188fe348ebcc52881e4361c508efa6fff5484765388148efd82d92f4d5455f23904887a83544136a7a42334c68731f94bb46eb0d61fa15306d6023a1b34fba7f6fb66fc8a8d8a61c54a94ec4cf110560f1f49dc44361885b050fd6813ba6e1a9b6a96ecf864d31404c00d091bd9d4b575d3cf8a69f4b20636e090b1b6d1a5ab0f731922c733977682267cf5bbf62f9274650d5e82dd56b48eddcac43bcf7ec14433cad61ef172617cf36633bed8e1cd0a91111dd3c26453ebb17548aca7f54e979f692aac1454e8ca97c86fd97a49ed42c50c61c3c4f409894c21d95dba5a82475b9eac9935ce6c982d4d98a8af1d707f13bc6f98e29eea3bb419b9db1e0b8aa465d1ad9f5b7fa8645e4366d45466530853ff73f08948cadbd64567528b4f36f9892aa169f589b9135bf893ee23f66ea3e789690efaec523d13139fc019eaf9bf2e12e795224149991e8de735f81d5ca5a5841230f568543a4856987a06d060de22d7a3181033e53f60ae069b7e977a504dc4cd2d8f7927c78ab79de19b769144785863e2e80d21cd42488e33dd8a801bb3122e164ac18527d1621f1fcb6e6673fd5ebcc83382729f83fb28dfc5eb16f4ec41aed1ba0f7e40e17a9a3e4b7304c3f8fe785273847a3b40af5e5d7661248d1e2b17bc62df4fc9a67aadd2efb085ac687d65bd513f192b580650e0548f7bd2215b91996927f3a538dc644682e90a41b87448c3ff38d35a2dde79423ff0e3dcbe24b836693b725a455e5deca8e9378efea484cf65e492dfb879914d2796c7d94058f083229c5bd8e1ae1a00db8c486b259ae27ce339bacd2dda8d7527e3fc11de3b23bf8d923d491e0d4c824abb1ee4a4d913cff61dea397064a6267476d0b563992a2c2c9e3068188ffb5af071d07ed8c747226fc520cceabf7e251294c246b2292e83843c13f8cf7c63c22e85807c81af9dbca0ab86d0bcbdae102f217d85bcdaa3f3e0b832c29ceb0fe24edf87818bd93912a4ce143e4deb95731201e9d89382686d0579ba5bccf2652f02217197a641f34a53d96276469c36a3028125eabac700421406cef7f61c42205e15d3af9df779820ccba4e70c6c9b3c284ff39b52d5470a27522484cf758a21388d878345e9d0cd8a51050a23b438d736952bfc9a5f6748c36f6dde0092d64ba7aadd2378ecf125528e3489257957c91d4b0b5c289432c51bce746fe7e7b5ac80b28862e28bda7f3e35f79c8d85e2a1e89dc471e317ca9c17c1f9c07ed8b73276aa6f59df04031fb5e5b28b60ab7e1f515e14b70841d5420ec10333df8a7f970f0b54f1589abe51c4cdd63285b7b25cdf8b2a260194e09225f5e5ce265437b5e190ffa05d60f2b326c6f79271a3878d7ac82fd4465806c98ccc959ef5ebcd31eaa4456130f765507a2646fca35a2543b9833c25aad5573d0cd90133d865bb011268f42349768f33c486a551f31efb070c7509c0f04cc934918b0b8561a7aae6af2c13ec99cb28ba8fa18e64332dd201835c1aa6af5da533adda1bac84d1872788bb42947aff1db988dd9ac5e551722ada237dff7e09865b4d46336d6589c0d9b2288dc4d0705731feee28a14d6029f59c648e47879bc244bab1903dfaea718a8b202cc21567e72f80a9a0b13a0f25dfc83e84b0b2cf8725bb11bd933a7aab59ab9aca3951ebbeb97bc98f300e6dffa77b0b1d332c7c594ce40117f43fd13afc18fe6fceff1463d6b0102e5633cd7bac2bb145623a878c1e52562f10226dfe77fe4b46089c8d7a758ead98805d7310e0c6adebf78a5f7aea8d8e1e1679071d54c83affbed44792f8e892aabdf18776eb2290eeb1fded6a70ecf749423d020049e693f7949a2a5f6d02a6c95971f61bbde79905a66f02382e3349fd5b57995dd522f5f4c1e7a2a7f90c0f516249bb7489a8aea5fc5c7a4231c056d490e22771d140aed21af7f78c9326f12d40d901c6e928a6c4e09a177b7f842272f817d882628324e8d43058684d96c0bcb4f233c2a720b71cc6227db0ab9fee88a143115bcd8aa661fc9ca4f5dab4f09ae30d9144c9a5b7f6f2ce84b0d988ef387617c31a7f59036dffbe07fb9881dc9ea47a2173239adc6f53e6c9b17a98a9d1ac2feb00f2569b0b25663ea7420405e290bca08d50d612024f4a72d0893791e1780add0b20eb1a9f449149b03eb863c0a4ce2c63fddff2600052b5dab7edce61d111283c577b22314b11efa09036e489bbe6c48f7b1216683deda0f3eb3a9844bf443e2805622cfa359dd552b2547a46a0b57cdc17585f1a9e963fdfb4d30d4329c804bc87f29dd1ef73ebae06b866a8c7afde2f7d46496ec366c02b1e1e31778ee784e775163b925eabc2d20a201387a626e9d905bf9dca9732d68b1527b16d4085795a4a63634c96c6403639883ab46df2b53c36f007a6df0623ff4320e85e006dcd6af7f2337cc66325b6aec8b09086d741b9b7e3e84af59a814bb6491219998eebacfe43c69f85bbcef93223385a0cbc54cbc930db4bbdf5ee646353c2981c0a67fa", 0x1000}, {&(0x7f0000005780)="4c543a092c4b52c6c2efe50984862c094eccc0ea959540cf58007608297bfb4fc16015b58c8ac81b25959f8dd56709c1856cd29d0ef3e665f4ac29e43b8dc6591f05cb67168299d318a233551eeeb34e24859418bfdf417391c0a7d3d1a452581defe62837c7477dcb35b03ef0df18e04ecedcdd5c9afd02a8e5cab02815113ede08edc62e2ec4e78be8850242ce0e1be20160e3f006541d6edf3f83bffbfab3", 0xa0}, {&(0x7f0000005840)="dad098257813b6fbfa0303f80960a8110872f68f5dca969463877ce4c3219dd792b626344d28370133b7939db61316dedea43ad13ba8a85e59", 0x39}], 0x5, 0x0, 0x0, 0x44040}, {0x0, 0x0, &(0x7f0000006900)=[{&(0x7f0000005900)="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", 0x1000}], 0x1, &(0x7f0000006940)=[@assoc={0x18, 0x117, 0x4, 0x1}, @op={0x18}, @iv={0xb8, 0x117, 0x2, 0x9f, "9ab5f4e815571841df1c3115dd5c2b1f77c8f32b88e20c0b3c7debc38ecc4910462755e38d6b874c444d90065af81eb277dfdae3dea44c3ffb53c472acdab6c2d5bc8b1e5bd31b4ca1c71e79df0a6d92265710e0520efdbe8403486e021c3f847dd846c65e8b695cdf4f9f6d3579897d10c1e5ec748e7adecd364361d1ff25bce7d440a75d266f767616d6fb7f80fdd173bdac2c402e98536e004f1ffb4b2f"}, @op={0x18}], 0x100, 0x1}, {0x0, 0x0, &(0x7f0000007000)=[{&(0x7f0000006a40)="681a9d46cd4e595eac6ac90c362c169279897b8ff5e7d7a640bc0454d29d640d738d37fa47f87bb1f9e77b5b6073c5f87a377f8c05243982117ad910d7a672cd592acbb89d2ebb2c1809c13da9d40f99882c2ca5468557928441f3c166bff3180413621c7c43fb6ee02655c5efb7c0b0e877d6153eaf3d969834bbfd685de7b64369bf52a3620fe411acbc4a16fe190f8232", 0x92}, {&(0x7f0000006b00)="df91b5269492851222382d95a4960c50b1173579b9105bb9a5998040f1fea3f40095ec2bbed5df3fe55a5f1955075a7339d737ce11ce08956b88238943379344", 0x40}, {&(0x7f0000006b40)="356a7590be18df2707d76fa3c588a1d2c1b56546787ae89b491553b337751e519c6dda0f8d62dde2ff56c31d6d0e0b994137a9d3d566384b5fd99e3dd0e341f3be8cff290f8bbd901f63a4d3054fe94f6409c87479b6fefdb47edd4fd672a9da1c89dd9ed168bbb7d315329a651c7366f22ae1397095d18e461823175e75fb27cda38d79cbb149f8096066761bca081fa0a87b2a60de7918f82cd2a47d861c6767f1adb2866ba0443782f3029387e3d6b78f01f01946a0dba006570b08d406b9b824ee19a65547ceccb3f3ea7ca2e1dae4624729", 0xd4}, {&(0x7f0000006c40)="d8c84a997e21a8c9591496ea253816d0b9f808e5292cd60da028a8a9986e0b2e6aa541abeae8dfc0247c1ca2d5638e893a9a691d1b72e83dfed0892fe83d99cfa1fdc4638eff99a3ed7388d4de2582e87ac2a02534064672dcd59fb64811a9a2625fd89d8a7cf877687891d717094ff0b65c21be8ab15f5d20c1f4cf61fa0fb07978f4a34b312bbf5fc57be0c3f4f9b4d071722b098f040bfc481dd8fc9a1d98cae5a4aebbccf772e6d90826911f152739a8e35ff065b7d4a89196afc4a6e243c28184f05c5df27048dba5fd4ec8c4eceda52f26199cf838154ee2", 0xdb}, {&(0x7f0000006d40)="4b641a7bb60ef927cc0af550909fd9968b14fa056bbef53ac3011ec27a6197edb5efcffbf959", 0x26}, {&(0x7f0000006d80)="34661bd823ade8f7dcdfeb2b6615c21c17a9806a5bd9dcf8c6b930ce1d24d96a6da5d5e3a512f656c272d365944e4df7c3d2d13866b8d37c9e0b6d89615dfb039d6392630e410a76c7654594d0b43f17cf1da683e38d84bf03286cc14419349c329d9bab7ff52e6b08bcb7673210c35330457947996c82917279f993b4027b7034938a36858e7ad937b751e89868d4d2fd81142bc1593edc95fee6c426637eae56a76a232c655f77ff9721a9c11bc9d790b41d83dcfbf858608613472130d3a7ab923591c0bf4f637363252658f5ab4642d551", 0xd3}, {&(0x7f0000006e80)="05c7c2a06c827efc8c46d3549f2b801f77e1023730ad5173169a32fc1f31ca106f67195a1229821d6a35ebcfc250f42d4937adf930616f740577f3d50f9703838c6210d40bbecfe39cdf837e9b2e1de1447d3cfe3c24d1b1abbd402535d7d3bf59963262792b709c2353b17cf6bf510c0e1a4b6abf61", 0x76}, {&(0x7f0000006f00)}, {&(0x7f0000006f40)="c5da8c1105e54e90afdf12f15d0970e3b390a91ca45478fb3152eb71f0413d5b464544ee005cd6aefd62521bef8478ac621c1cfcfb0ccc0de316af27eab86f041db91ec228497b347cb576970278bf7009e809e7db2657589e0bf82ca9f18a2c47206b3d0f02da5f6fbe333d14403f0945f49ae54ae80ebda7d1d1d28f31c76c87", 0x81}], 0x9, &(0x7f00000070c0)=[@iv={0xf8, 0x117, 0x2, 0xdd, "eb57c97289206ba5075131670e70b9973312978c0e0197431b7277281a3d0face8dbde691d6b89810c0546c2ea2597a1c23e7219e8d43fde7c6572149a0f8cfa2f7e20bdcc6775bfcf7b0ce5cb48784fb50332d86cdcd4f4d260e93c432da897b7b44a1ef97db5b290b6d4b16a4a6d9037ce3820ab60247274f658573fc2fee94664199be3b13542fa5ae9887509e1c53abb16f5d50e74b2f14e0e6a86146a0ea9ca4f76c4db5de7133eec573a44c3cfaa1391b19f13b35649e4c8d4ef79991839964474aa2b871c02672bfb2938efaec1c94c6ab6aed19566f4ed768d"}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x40}], 0x128, 0x20044000}], 0x8, 0x8000) 18:40:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0xc, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:58 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0x215b) 18:40:58 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/149, 0x27, 0x95, 0x1}, 0x20) 18:40:58 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x26000000, 0x0, 0x0, &(0x7f0000000040)) 18:40:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x2, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0xe, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:58 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0x5b21) 18:40:58 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/149, 0x27, 0x95, 0x1}, 0x20) 18:40:58 executing program 0: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x40030000000000}, 0x0) 18:40:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 18:40:58 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x26010000, 0x0, 0x0, &(0x7f0000000040)) 18:40:58 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0xf000) 18:40:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x10, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 18:40:59 executing program 0: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_LOCK(r0, 0xb) shmctl$IPC_STAT(r0, 0x2, &(0x7f0000000280)=""/227) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010001000000000000000c0000000c00000003000000010000000000000400000000005f00"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:40:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x48, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x1}]}}, &(0x7f0000000280)=""/149, 0x26, 0x95, 0x1}, 0x20) 18:40:59 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x27000000, 0x0, 0x0, &(0x7f0000000040)) 18:40:59 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0x34000) 18:40:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 18:40:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x1}]}}, &(0x7f0000000280)=""/149, 0x26, 0x95, 0x1}, 0x20) 18:40:59 executing program 0: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_LOCK(r0, 0xb) shmctl$IPC_STAT(r0, 0x2, &(0x7f0000000280)=""/227) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010001000000000000000c0000000c00000003000000010000000000000400000000005f00"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:40:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x4c, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:59 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0x400300) 18:40:59 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x27010000, 0x0, 0x0, &(0x7f0000000040)) 18:40:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f00000001c0)=""/137, 0x0, 0x89, 0x1}, 0x20) 18:40:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x68, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x1}]}}, &(0x7f0000000280)=""/149, 0x26, 0x95, 0x1}, 0x20) 18:40:59 executing program 0: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_LOCK(r0, 0xb) shmctl$IPC_STAT(r0, 0x2, &(0x7f0000000280)=""/227) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010001000000000000000c0000000c00000003000000010000000000000400000000005f00"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:40:59 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0xf0ffff) 18:40:59 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x28000000, 0x0, 0x0, &(0x7f0000000040)) 18:40:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f00000001c0)=""/137, 0x0, 0x89, 0x1}, 0x20) 18:40:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x6c, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/149, 0x27, 0x95, 0x1}, 0x20) 18:40:59 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0x1000000) 18:40:59 executing program 0: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_LOCK(r0, 0xb) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010001000000000000000c0000000c00000003000000010000000000000400000000005f00"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:40:59 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x28010000, 0x0, 0x0, &(0x7f0000000040)) 18:40:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f00000001c0)=""/137, 0x0, 0x89, 0x1}, 0x20) 18:40:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x74, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/149, 0x27, 0x95, 0x1}, 0x20) 18:40:59 executing program 0: shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010001000000000000000c0000000c00000003000000010000000000000400000000005f00"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:40:59 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0x2000000) 18:40:59 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x29000000, 0x0, 0x0, &(0x7f0000000040)) 18:40:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/137, 0x1a, 0x89, 0x1}, 0x20) 18:40:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x0]}}, &(0x7f0000000280)=""/149, 0x27, 0x95, 0x1}, 0x20) 18:40:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x7a, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/137, 0x1a, 0x89, 0x1}, 0x20) 18:40:59 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0xf000000) 18:40:59 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x29010000, 0x0, 0x0, &(0x7f0000000040)) 18:40:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010001000000000000000c0000000c00000003000000010000000000000400000000005f00"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:40:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/137, 0x1a, 0x89, 0x1}, 0x20) 18:40:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, 0x0, 0x27, 0x0, 0x1}, 0x20) 18:40:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x88, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:40:59 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0x215b0000) 18:40:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 18:40:59 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x2a000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 18:41:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x300, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, 0x0, 0x27, 0x0, 0x1}, 0x20) 18:41:00 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0x9effffff) 18:41:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 18:41:00 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x2a010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x500, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 18:41:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, 0x0, 0x27, 0x0, 0x1}, 0x20) 18:41:00 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0xf0ffffff) 18:41:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x600, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, 0x0, 0x26, 0x0, 0x1}, 0x20) 18:41:00 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x2b000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 18:41:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/149, 0x27, 0x95}, 0x20) 18:41:00 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0xfffff000) 18:41:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x2, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89}, 0x20) 18:41:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x700, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/149, 0x27, 0x95}, 0x20) 18:41:00 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x2b010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:41:00 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0xffffff7f) 18:41:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f0000000280)=""/149, 0x27, 0x95}, 0x20) 18:41:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x2, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89}, 0x20) 18:41:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:41:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0xa00, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:00 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0xffffff9e) 18:41:00 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x2c000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:00 executing program 2: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_LOCK(r0, 0xb) shmctl$IPC_STAT(r0, 0x2, &(0x7f0000000280)=""/227) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010001000000000000000c0000000c00000003000000010000000000000400000000005f00"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:41:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x2, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89}, 0x20) 18:41:00 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x2c010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:41:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0xc00, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:00 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0xfffffff0) 18:41:00 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) r1 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040)='gtp\x00', 0xffffffffffffffff) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd25, 0x25dfdbff, {}, [@GTPA_FLOW={0x6, 0x6, 0x4}, @GTPA_FLOW={0x6}, @GTPA_MS_ADDRESS={0x8, 0x5, @remote}]}, 0x2c}, 0x1, 0x0, 0x0, 0x88000}, 0x5b93703a390cf17e) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:41:00 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080)='nl802154\x00', 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000740)={'wpan4\x00'}) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(r2, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)={0x28, r3, 0x20, 0x70bd25, 0x25dfdbfe, {}, [@NL802154_ATTR_ACKREQ_DEFAULT={0x5, 0x1a, 0x1}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x28}}, 0x24000801) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) socketpair(0x5, 0x6, 0x9, &(0x7f0000000280)={0xffffffffffffffff}) r6 = syz_genetlink_get_family_id$gtp(&(0x7f0000000400)='gtp\x00', r4) sendmsg$GTP_CMD_DELPDP(r5, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x2c, r6, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@GTPA_MS_ADDRESS={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0xf}}, @GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_MS_ADDRESS={0x8, 0x5, @remote}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4004}, 0x1) write$P9_ROPEN(r4, &(0x7f0000000300)={0x18}, 0x18) ioctl$sock_SIOCADDRT(r4, 0x890b, &(0x7f0000000180)={0x0, @llc={0x1a, 0x21a, 0x4, 0x1, 0x4, 0x3f, @local}, @l2={0x1f, 0x4, @fixed={[], 0x12}, 0x2, 0x2}, @ax25={0x3, @bcast, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0xffffffff, 0x20}) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r1, 0x20, 0x70bd29, 0x25dfdbfd, {}, [@NL802154_ATTR_NETNS_FD={0x8, 0x1d, r0}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_PID={0x8, 0x1c, 0xffffffffffffffff}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x24004040) 18:41:00 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x2d000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:41:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0xe00, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:00 executing program 2: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0xf0ffffff}, 0x0) 18:41:00 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0x40030000000000) 18:41:00 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x2d010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:00 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080)='nl802154\x00', 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000740)={'wpan4\x00'}) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(r2, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)={0x28, r3, 0x20, 0x70bd25, 0x25dfdbfe, {}, [@NL802154_ATTR_ACKREQ_DEFAULT={0x5, 0x1a, 0x1}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x28}}, 0x24000801) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) socketpair(0x5, 0x6, 0x9, &(0x7f0000000280)={0xffffffffffffffff}) r6 = syz_genetlink_get_family_id$gtp(&(0x7f0000000400)='gtp\x00', r4) sendmsg$GTP_CMD_DELPDP(r5, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x2c, r6, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@GTPA_MS_ADDRESS={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0xf}}, @GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_MS_ADDRESS={0x8, 0x5, @remote}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4004}, 0x1) write$P9_ROPEN(r4, &(0x7f0000000300)={0x18}, 0x18) ioctl$sock_SIOCADDRT(r4, 0x890b, &(0x7f0000000180)={0x0, @llc={0x1a, 0x21a, 0x4, 0x1, 0x4, 0x3f, @local}, @l2={0x1f, 0x4, @fixed={[], 0x12}, 0x2, 0x2}, @ax25={0x3, @bcast, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0xffffffff, 0x20}) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r1, 0x20, 0x70bd29, 0x25dfdbfd, {}, [@NL802154_ATTR_NETNS_FD={0x8, 0x1d, r0}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_PID={0x8, 0x1c, 0xffffffffffffffff}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x24004040) 18:41:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:41:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x4800, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:01 executing program 2: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x1010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:01 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0xf0ffffffffffff) 18:41:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x4c00, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:01 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x2e000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:41:01 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r1, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x28, 0x1407, 0x200, 0x70bd25, 0x25dfdbfd, "", [@RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r2}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x84}, 0x20000000) 18:41:01 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080)='nl802154\x00', 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000740)={'wpan4\x00'}) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(r2, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)={0x28, r3, 0x20, 0x70bd25, 0x25dfdbfe, {}, [@NL802154_ATTR_ACKREQ_DEFAULT={0x5, 0x1a, 0x1}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x28}}, 0x24000801) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) socketpair(0x5, 0x6, 0x9, &(0x7f0000000280)={0xffffffffffffffff}) r6 = syz_genetlink_get_family_id$gtp(&(0x7f0000000400)='gtp\x00', r4) sendmsg$GTP_CMD_DELPDP(r5, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x2c, r6, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@GTPA_MS_ADDRESS={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0xf}}, @GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_MS_ADDRESS={0x8, 0x5, @remote}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4004}, 0x1) write$P9_ROPEN(r4, &(0x7f0000000300)={0x18}, 0x18) ioctl$sock_SIOCADDRT(r4, 0x890b, &(0x7f0000000180)={0x0, @llc={0x1a, 0x21a, 0x4, 0x1, 0x4, 0x3f, @local}, @l2={0x1f, 0x4, @fixed={[], 0x12}, 0x2, 0x2}, @ax25={0x3, @bcast, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0xffffffff, 0x20}) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r1, 0x20, 0x70bd29, 0x25dfdbfd, {}, [@NL802154_ATTR_NETNS_FD={0x8, 0x1d, r0}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_PID={0x8, 0x1c, 0xffffffffffffffff}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x24004040) 18:41:01 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0x100000000000000) 18:41:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x6800, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:41:01 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x2e010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000f000000010000000000000400000000005f00b207af92efa17a7155854f00633742dd42e817abff80cc211ef2e50c1a127b8d91acb7494e83a262c1317a4a13e0d7f1bb8cb2b772523680064e9215d04747d18d370430326dc7911031a683616140e72dcd1c035e6b31742e343b1ad30a8776a56f1f16c19af294dafe499d949655248b81bee635"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18, 0x71, 0x0, {{0x1}}}, 0x18) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18, 0x71, 0x0, {{0x0, 0x2, 0xfffffffffffffffc}}}, 0x18) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x10, &(0x7f0000000000)={&(0x7f0000000280)=""/138, 0x8a}}, 0x10) 18:41:01 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0x200000000000000) 18:41:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x6c00, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:41:01 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x2f000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:01 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000080)='nl802154\x00', 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000740)={'wpan4\x00'}) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(r1, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)={0x28, r2, 0x20, 0x70bd25, 0x25dfdbfe, {}, [@NL802154_ATTR_ACKREQ_DEFAULT={0x5, 0x1a, 0x1}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x28}}, 0x24000801) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) socketpair(0x5, 0x6, 0x9, &(0x7f0000000280)={0xffffffffffffffff}) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000400)='gtp\x00', r3) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x2c, r5, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@GTPA_MS_ADDRESS={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0xf}}, @GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_MS_ADDRESS={0x8, 0x5, @remote}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4004}, 0x1) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18}, 0x18) ioctl$sock_SIOCADDRT(r3, 0x890b, &(0x7f0000000180)={0x0, @llc={0x1a, 0x21a, 0x4, 0x1, 0x4, 0x3f, @local}, @l2={0x1f, 0x4, @fixed={[], 0x12}, 0x2, 0x2}, @ax25={0x3, @bcast, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0xffffffff, 0x20}) 18:41:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x7400, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000f000000010000000000000400000000005f00b207af92efa17a7155854f00633742dd42e817abff80cc211ef2e50c1a127b8d91acb7494e83a262c1317a4a13e0d7f1bb8cb2b772523680064e9215d04747d18d370430326dc7911031a683616140e72dcd1c035e6b31742e343b1ad30a8776a56f1f16c19af294dafe499d949655248b81bee635"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18, 0x71, 0x0, {{0x1}}}, 0x18) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18, 0x71, 0x0, {{0x0, 0x2, 0xfffffffffffffffc}}}, 0x18) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x10, &(0x7f0000000000)={&(0x7f0000000280)=""/138, 0x8a}}, 0x10) 18:41:01 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0xf00000000000000) 18:41:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:41:01 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x2f010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:01 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000080)='nl802154\x00', 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000740)={'wpan4\x00'}) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(r1, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)={0x28, r2, 0x20, 0x70bd25, 0x25dfdbfe, {}, [@NL802154_ATTR_ACKREQ_DEFAULT={0x5, 0x1a, 0x1}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x28}}, 0x24000801) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) socketpair(0x5, 0x6, 0x9, &(0x7f0000000280)={0xffffffffffffffff}) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000400)='gtp\x00', r3) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x2c, r5, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@GTPA_MS_ADDRESS={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0xf}}, @GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_MS_ADDRESS={0x8, 0x5, @remote}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4004}, 0x1) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18}, 0x18) 18:41:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010001000000000000000c0000000c000000"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:41:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x7a00, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:01 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0x215b000000000000) 18:41:01 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x30000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000f000000010000000000000400000000005f00b207af92efa17a7155854f00633742dd42e817abff80cc211ef2e50c1a127b8d91acb7494e83a262c1317a4a13e0d7f1bb8cb2b772523680064e9215d04747d18d370430326dc7911031a683616140e72dcd1c035e6b31742e343b1ad30a8776a56f1f16c19af294dafe499d949655248b81bee635"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18, 0x71, 0x0, {{0x1}}}, 0x18) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18, 0x71, 0x0, {{0x0, 0x2, 0xfffffffffffffffc}}}, 0x18) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000040)={r0, 0x10, &(0x7f0000000000)={&(0x7f0000000280)=""/138, 0x8a}}, 0x10) 18:41:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9f"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:41:01 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x30010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x8800, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:01 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0x9effffff00000000) 18:41:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:41:01 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000080)='nl802154\x00', 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000740)={'wpan4\x00'}) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(r1, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)={0x28, r2, 0x20, 0x70bd25, 0x25dfdbfe, {}, [@NL802154_ATTR_ACKREQ_DEFAULT={0x5, 0x1a, 0x1}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x28}}, 0x24000801) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) socketpair(0x5, 0x6, 0x9, &(0x7f0000000280)={0xffffffffffffffff}) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000400)='gtp\x00', r3) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x2c, r5, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@GTPA_MS_ADDRESS={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0xf}}, @GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_MS_ADDRESS={0x8, 0x5, @remote}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4004}, 0x1) 18:41:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9f"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:41:02 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x31000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:02 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0xf0ffffff00000000) 18:41:02 executing program 2: r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, r0, 0x200, 0x70bd28, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x20}, 0x1, 0x0, 0x0, 0x100}, 0x4000) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000000)={0x15, 0x65, 0xffff, 0x5, 0x8, '9P2000.L'}, 0x15) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="9fd4eb01001800000000000000b38cbbdd0c0000000c000000030000000100000059c52e80000000da28fa0333e509c11d8f09a479fc6366e35dd0c6832e664d0dbe7f9fdf8570429b2f6ff27a03f9f787cc7da64d2fe32cb163c45bb73d6817e7f3"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:41:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9f"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:41:02 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x31010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x2, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:02 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0xffffff7f00000000) 18:41:02 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000080)='nl802154\x00', 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000740)={'wpan4\x00'}) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(r1, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)={0x28, r2, 0x20, 0x70bd25, 0x25dfdbfe, {}, [@NL802154_ATTR_ACKREQ_DEFAULT={0x5, 0x1a, 0x1}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x28}}, 0x24000801) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) socketpair(0x5, 0x6, 0x9, &(0x7f0000000280)) syz_genetlink_get_family_id$gtp(&(0x7f0000000400)='gtp\x00', r3) 18:41:02 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) write$P9_RLERRORu(r1, &(0x7f0000000040)={0x13, 0x7, 0x1, {{0x6, '{{\xdc+-*'}, 0x4}}, 0x13) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_getaddr={0x28, 0x16, 0x400, 0x70bd2a, 0x25dfdbfb, {0x2, 0x78, 0x44, 0x2}, [@IFA_FLAGS={0x8, 0x8, 0x180}, @IFA_BROADCAST={0x8, 0x4, @loopback}]}, 0x28}, 0x1, 0x0, 0x0, 0x4040010}, 0x0) 18:41:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010001000000000000"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:41:02 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x32000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x3, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:02 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0xfffffffffffff000) 18:41:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:41:02 executing program 2: r0 = getpgid(0x0) getpgid(r0) r1 = getpgid(r0) r2 = syz_open_procfs$namespace(r1, &(0x7f0000000140)='ns/uts\x00') ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)) r3 = syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0x3, 0x109880) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000380)={0x0, 0x0}) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000400)={[], 0x2, 0x4, 0x40, 0xd6c, 0x4000000000000000, r4}) ioctl$NS_GET_PARENT(r2, 0xb705, 0x0) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={0xffffffffffffffff}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r5, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0xd2, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x3, 0x5}, 0x0, 0x0, &(0x7f0000000180)={0x2, 0x9, 0x10001}, &(0x7f00000001c0)=0x2bd6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0xfffffffffffffffe}}, 0x10) 18:41:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x4, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:41:02 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x32010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:02 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) socketpair(0x1, 0x800, 0x5, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$RDMA_NLDEV_CMD_SET(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0x1402, 0x800, 0x70bd2c, 0x25dfdbfb, "", [@RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz1\x00'}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r0}]}, 0x34}, 0x1, 0x0, 0x0, 0x20008011}, 0x4) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1, 0x0, 0x100000}, 0x10}}, 0x0) 18:41:02 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000080)='nl802154\x00', 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000740)={'wpan4\x00'}) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(r1, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)={0x28, r2, 0x20, 0x70bd25, 0x25dfdbfe, {}, [@NL802154_ATTR_ACKREQ_DEFAULT={0x5, 0x1a, 0x1}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x28}}, 0x24000801) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) socketpair(0x5, 0x6, 0x9, &(0x7f0000000280)) [ 2066.873463] blktrace: Concurrent blktraces are not allowed on loop3 18:41:02 executing program 2: r0 = getpgid(0x0) getpgid(r0) r1 = getpgid(r0) r2 = syz_open_procfs$namespace(r1, &(0x7f0000000140)='ns/uts\x00') ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)) r3 = syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0x3, 0x109880) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000380)={0x0, 0x0}) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000400)={[], 0x2, 0x4, 0x40, 0xd6c, 0x4000000000000000, r4}) ioctl$NS_GET_PARENT(r2, 0xb705, 0x0) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={0xffffffffffffffff}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r5, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0xd2, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x3, 0x5}, 0x0, 0x0, &(0x7f0000000180)={0x2, 0x9, 0x10001}, &(0x7f00000001c0)=0x2bd6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0xfffffffffffffffe}}, 0x10) 18:41:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x5, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:02 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x33000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:41:02 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000000000)=ANY=[@ANYBLOB="1000000002140100ffffffff00200000b505d5da69a0a792c4ddfb7faee3bb58db443c166be6bd9cd38306b1733bbd4d803537761834a5"], 0x10}}, 0x0) [ 2067.027447] blktrace: Concurrent blktraces are not allowed on loop3 18:41:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x6, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:02 executing program 2: r0 = getpgid(0x0) getpgid(r0) r1 = getpgid(r0) r2 = syz_open_procfs$namespace(r1, &(0x7f0000000140)='ns/uts\x00') ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)) r3 = syz_open_dev$loop(&(0x7f0000000340)='/dev/loop#\x00', 0x3, 0x109880) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000380)={0x0, 0x0}) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000400)={[], 0x2, 0x4, 0x40, 0xd6c, 0x4000000000000000, r4}) ioctl$NS_GET_PARENT(r2, 0xb705, 0x0) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={0xffffffffffffffff}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r5, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0xd2, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x3, 0x5}, 0x0, 0x0, &(0x7f0000000180)={0x2, 0x9, 0x10001}, &(0x7f00000001c0)=0x2bd6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0xfffffffffffffffe}}, 0x10) 18:41:02 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000000000)=ANY=[@ANYBLOB="1000f3032183bf2baacee10148594600000257b6000040000000000000eee6c501ed5b3cac064e561c52c0dad8b68b9b55127de59f4de8c8cd93d38d0600007043ff3643d68a671883f070718e33d293b641db7048a2bda7ab"], 0x10}}, 0x0) 18:41:02 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x33010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:02 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000080)='nl802154\x00', 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000740)={'wpan4\x00'}) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(r1, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)={0x28, r2, 0x20, 0x70bd25, 0x25dfdbfe, {}, [@NL802154_ATTR_ACKREQ_DEFAULT={0x5, 0x1a, 0x1}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x28}}, 0x24000801) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) 18:41:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb0100010000"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:41:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x7, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) [ 2067.170040] blktrace: Concurrent blktraces are not allowed on loop3 18:41:02 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, r1, 0x400, 0x70bd25, 0x25dfdbff, {}, [@NL802154_ATTR_SEC_DEVKEY={0x18, 0x24, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0x80}, @NL802154_DEVKEY_ATTR_ID={0xc, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0xff}]}]}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x38}, 0x1, 0x0, 0x0, 0xa040}, 0x4) syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000080)='ns/cgroup\x00') r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) ioctl$TCGETS2(r2, 0x802c542a, &(0x7f0000000100)) syz_open_dev$vcsu(&(0x7f0000000140)='/dev/vcsu#\x00', 0x3, 0x191600) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18}, 0x18) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000340)='nl802154\x00', r0) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x20, r5, 0x10, 0x70bd2c, 0x25dfdbfc, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}]}, 0x20}, 0x1, 0x0, 0x0, 0x4084}, 0x20000000) write$P9_ROPEN(r4, &(0x7f0000000300)={0x18}, 0x18) ioctl$NS_GET_PARENT(r4, 0xb701, 0x0) r6 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x26040, 0x0) ioctl$NS_GET_PARENT(r6, 0xb702, 0x0) 18:41:02 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) syz_genetlink_get_family_id$gtp(&(0x7f0000000000)='gtp\x00', r1) 18:41:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:41:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0xa, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:02 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x34000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:02 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000080)='nl802154\x00', 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000740)={'wpan4\x00'}) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(r1, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)={0x28, r2, 0x20, 0x70bd25, 0x25dfdbfe, {}, [@NL802154_ATTR_ACKREQ_DEFAULT={0x5, 0x1a, 0x1}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x28}}, 0x24000801) 18:41:02 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000080)='nl802154\x00', 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000740)={'wpan4\x00'}) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(r1, &(0x7f0000000340)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f0000000380)={0x28, r2, 0x20, 0x70bd25, 0x25dfdbfe, {}, [@NL802154_ATTR_ACKREQ_DEFAULT={0x5, 0x1a, 0x1}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x28}}, 0x24000801) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) 18:41:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:41:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0xc, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:03 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x1407, 0x100, 0x70bd25, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x40}, 0x4040) 18:41:03 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x34010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0xe, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:41:03 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)=ANY=[@ANYBLOB="10000000021404b87656000000000000"], 0x10}}, 0x0) 18:41:03 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000080)='nl802154\x00', 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000740)={'wpan4\x00'}) syz_genetlink_get_family_id$nl802154(&(0x7f0000000240)='nl802154\x00', 0xffffffffffffffff) 18:41:03 executing program 2: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) setns(r1, 0x20000) r2 = ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) setns(r2, 0x2000000) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000040)={0x0, @ax25={0x3, @default, 0x2}, @ipx={0x4, 0x1ff, 0x1, "ed7fcb6824b0", 0x4}, @vsock={0x28, 0x0, 0x2711}, 0x8, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000000)='veth0_to_bridge\x00', 0x1, 0x9, 0x1}) ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) 18:41:03 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x35000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x10, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010001"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:41:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x3, [@struct={0x1, 0x0, 0x0, 0x4, 0x0, 0xffffffff}, @restrict={0x2, 0x0, 0x0, 0xb, 0x5}, @union={0xb, 0x5, 0x0, 0x5, 0x0, 0x80000000, [{0xa, 0x2, 0x19a}, {0x1, 0x4, 0x5}, {0x9, 0x1, 0x3}, {0x6, 0x0, 0x90a2}, {0xb, 0x4, 0x10000}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x3}}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x93, 0x89, 0x1}, 0x20) 18:41:03 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000740)={'wpan4\x00'}) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x0, 0x70bd25, 0x25dfdbfe, {}, [@NL802154_ATTR_SEC_LEVEL={0x24, 0x22, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_LEVELS={0x5}, @NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x2}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x6}, @NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x3}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x20004804) 18:41:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x48, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:03 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x35010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:41:03 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000080)='nl802154\x00', 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000740)={'wpan4\x00'}) 18:41:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x3, [@struct={0x1, 0x0, 0x0, 0x4, 0x0, 0xffffffff}, @restrict={0x2, 0x0, 0x0, 0xb, 0x5}, @union={0xb, 0x5, 0x0, 0x5, 0x0, 0x80000000, [{0xa, 0x2, 0x19a}, {0x1, 0x4, 0x5}, {0x9, 0x1, 0x3}, {0x6, 0x0, 0x90a2}, {0xb, 0x4, 0x10000}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x3}}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x93, 0x89, 0x1}, 0x20) 18:41:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x4c, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:03 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x36000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:41:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x3, [@struct={0x1, 0x0, 0x0, 0x4, 0x0, 0xffffffff}, @restrict={0x2, 0x0, 0x0, 0xb, 0x5}, @union={0xb, 0x5, 0x0, 0x5, 0x0, 0x80000000, [{0xa, 0x2, 0x19a}, {0x1, 0x4, 0x5}, {0x9, 0x1, 0x3}, {0x6, 0x0, 0x90a2}, {0xb, 0x4, 0x10000}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x3}}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x93, 0x89, 0x1}, 0x20) 18:41:03 executing program 1: syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)=ANY=[@ANYBLOB="100000002a14010000000000ffd3df25"], 0x10}}, 0x0) 18:41:03 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000080)='nl802154\x00', 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 18:41:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:41:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x68, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:03 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x36010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 18:41:03 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000000000)=ANY=[@ANYBLOB="4c00000002149bbd00020000090000000900020073797a300000000008020100020000000900020073797a310000000008000100000000000900020073797a30000000000800010001000000"], 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0x0) socket$inet_udp(0x2, 0x2, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00', 0xffffffffffffffff) 18:41:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb0100"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:41:03 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000080)='nl802154\x00', 0xffffffffffffffff) 18:41:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x6c, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 18:41:03 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x37000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:03 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_DEL_SEC_DEV(r2, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x3f87a0c99adc599c}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x68, 0x0, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_SEC_DEVICE={0x10, 0x23, 0x0, 0x1, {0xc, 0x4, {0xaaaaaaaaaaaa0302}}}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x68}, 0x1, 0x0, 0x0, 0x44}, 0x40010) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000740)={'wpan4\x00'}) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10002000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r3, 0x100, 0x70bd29, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000840}, 0x4008c55) 18:41:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb0100"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:41:03 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:41:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 18:41:03 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x37010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x74, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb0100"], &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:41:04 executing program 5: ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb701, 0x0) 18:41:04 executing program 1: syz_open_dev$ptys(0xc, 0x3, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x19e80000000) r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)=ANY=[@ANYBLOB="0004000000000042006aa1f93531874c"], 0x10}}, 0x0) ioctl$IMADDTIMER(0xffffffffffffffff, 0x80044940, &(0x7f0000000000)) 18:41:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x7a, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f00000001c0)=""/137, 0x0, 0x89, 0x1}, 0x20) 18:41:04 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x38000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:04 executing program 5: ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb701, 0x0) 18:41:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010001"], 0x0, 0x27, 0x0, 0x1}, 0x20) 18:41:04 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x38010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x88, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:04 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000000000)=ANY=[@ANYBLOB="100000000214cc0100000000008da050cd"], 0x10}}, 0x0) 18:41:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f00000001c0)=""/137, 0x0, 0x89, 0x1}, 0x20) 18:41:04 executing program 5: ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb701, 0x0) 18:41:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010001"], 0x0, 0x27, 0x0, 0x1}, 0x20) 18:41:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:04 executing program 1: r0 = syz_genetlink_get_family_id$gtp(&(0x7f0000000000)='gtp\x00', 0xffffffffffffffff) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) write$P9_RSTAT(r2, &(0x7f00000000c0)={0x8f, 0x7d, 0x1, {0x0, 0x88, 0x7f21, 0x10000, {0x0, 0x0, 0x2}, 0x0, 0x80000001, 0xdb, 0x7f, 0x29, '/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x3, '\t}\xcb', 0x0, '', 0x29, '/proc/sys/net/ipv4/vs/expire_nodest_conn\x00'}}, 0x8f) write$P9_RSTATFS(r2, &(0x7f00000001c0)={0x43, 0x9, 0x2, {0x987, 0x8, 0x1f, 0x1, 0x3, 0x5, 0x10001, 0x7}}, 0x43) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18}, 0x18) sendmsg$RDMA_NLDEV_CMD_SET(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000000080)=ANY=[@ANYRES32=r3, @ANYRES32=r1, @ANYRESOCT=r0, @ANYRES64=r2], 0x10}}, 0x0) 18:41:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f00000001c0)=""/137, 0x0, 0x89, 0x1}, 0x20) 18:41:04 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x39000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010001"], 0x0, 0x27, 0x0, 0x1}, 0x20) 18:41:04 executing program 5: r0 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:41:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:04 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x0, 0x1, 0x70bd25, 0x25dfdbfc, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x28}, 0x1, 0x0, 0x0, 0x40001}, 0x800) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18}, 0x18) ioctl$NS_GET_NSTYPE(r3, 0xb703, 0x0) 18:41:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x3, [@struct={0x1, 0x0, 0x0, 0x4, 0x0, 0xffffffff}, @restrict={0x2, 0x0, 0x0, 0xb, 0x5}, @union={0xb, 0x5, 0x0, 0x5, 0x0, 0x80000000, [{0xa, 0x2, 0x19a}, {0x1, 0x4, 0x5}, {0x9, 0x1, 0x3}, {0x6, 0x0, 0x90a2}, {0xb, 0x4, 0x10000}]}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x7b, 0x89, 0x1}, 0x20) 18:41:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010001"], &(0x7f00000001c0)=""/137, 0x27, 0x89}, 0x20) 18:41:04 executing program 5: r0 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:41:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0x2}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:04 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x39010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x1, 0x0, 0x0, 0x4, 0x0, 0xffffffff}, @restrict={0x2, 0x0, 0x0, 0xb, 0x5}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x33, 0x89, 0x1}, 0x20) 18:41:04 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0x0) 18:41:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0x3}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010001"], &(0x7f00000001c0)=""/137, 0x27, 0x89}, 0x20) 18:41:04 executing program 5: r0 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:41:04 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x3a000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1, 0x0, 0x0, 0x4, 0x0, 0xffffffff}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:41:04 executing program 1: read$alg(0xffffffffffffffff, &(0x7f00000000c0)=""/231, 0xe7) r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f00000001c0)=ANY=[@ANYBLOB="10000004000000000000000000000000bfe3af635e7ecbdb34c5a1e96e68e9a3528eafe2cff24112b484fea9fdfa58a06baf3750972c744446d61dd832519663398d8c69b7d8b79061b656cce797ce34a8bb6fe5259a18c701200d3b9336664fa9db2ab8a9bf0c59b8f9605d7fd31b700a7d17d6872a3c08c1de48d6f5b6a330f464eb36eb141e8f7502c5ca8c27744e6a69425647"], 0x10}}, 0x0) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) 18:41:04 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb701, 0x0) 18:41:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010001"], &(0x7f00000001c0)=""/137, 0x27, 0x89}, 0x20) 18:41:04 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x3a010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0x4}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1, 0x0, 0x0, 0x4, 0x0, 0xffffffff}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:41:04 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb701, 0x0) 18:41:04 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000000000)=ANY=[@ANYBLOB="100000000214010000000000000000003403ff9d9e718d0b24a3ad05570993f1afa44652431b4a3e5bc5bf9a83e4ba606b12d9ecc467263f"], 0x10}}, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) ioctl$sock_ifreq(r1, 0xdd, &(0x7f0000000080)={'syzkaller1\x00', @ifru_settings={0x0, 0x0, @fr_pvc=&(0x7f0000000040)={0x401}}}) 18:41:04 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x3b000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0x5}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x7a, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1, 0x0, 0x0, 0x4, 0x0, 0xffffffff}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:41:05 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb701, 0x0) 18:41:05 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x92101, 0x0) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000000080)={0x2c, 0x1402, 0x20, 0x0, 0xfffffffe, "", [@RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r1}]}, 0x2c}, 0x1, 0x0, 0x0, 0xc40a4}, 0x0) 18:41:05 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x3b010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:05 executing program 0: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)=ANY=[@ANYBLOB="10000000021404b87656000000000000"], 0x10}}, 0x0) 18:41:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x1, 0x0, 0x0, 0x4, 0x0, 0xffffffff}, @restrict={0x0, 0x0, 0x0, 0xb, 0x5}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x33, 0x89, 0x1}, 0x20) 18:41:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x1000000, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:05 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x64, 0x0, 0x20, 0x70bd26, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_ENABLED={0x5}, @NL802154_ATTR_SEC_FRAME_COUNTER={0x8, 0x21, 0x4}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r1}, @NL802154_ATTR_SEC_ENABLED={0x5}]}, 0x64}, 0x1, 0x0, 0x0, 0x1}, 0x0) r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="010000000000000000000b00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00060003000000030000000c00060003000000000000000c000600000000000000000006000a00a1aa000006000a00000000000c000600030000000000000006000a00a1aa00000c000600020000000000000008000300", @ANYRES32=r6], 0x78}}, 0x0) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r7, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="78bf6d00", @ANYRES16=r9, @ANYBLOB="010000000000000000000b00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00060003000000030000000c00060003000000000000000c000600000000000000000006000a00a1aa000006000a00000000000c000600030000000000000006000a00a1aa00000c000600020000000000000008000300", @ANYRES32=r10], 0x78}}, 0x0) sendmsg$NL802154_CMD_GET_SEC_LEVEL(r0, &(0x7f0000000200)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000300)={0x14, r5, 0xd2d42a268405acc, 0x70bd2d, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x20048000}, 0x24040004) ioctl$NS_GET_PARENT(r2, 0xb705, 0x0) 18:41:05 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x3c000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:05 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x40, 0x1407, 0x20, 0x70bd26, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz1\x00'}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz0\x00'}]}, 0x40}, 0x1, 0x0, 0x0, 0x8000}, 0x8081) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) sendmsg$nl_route(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x42}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@getneightbl={0x14, 0x42, 0x10, 0x70bd2a, 0x25dfdbfd, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000010}, 0x4) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)=ANY=[@ANYBLOB="100000f10114cf6e5d02000000000000"], 0x10}}, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) r3 = syz_genetlink_get_family_id$gtp(&(0x7f0000000280)='gtp\x00', r1) sendmsg$GTP_CMD_GETPDP(r2, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r3, 0x2c, 0x70bd2d, 0x25dfdbfe, {}, [@GTPA_O_TEI={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44004}, 0x44004) 18:41:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0x7}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x1, 0x0, 0x0, 0x4, 0x0, 0xffffffff}, @restrict]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x33, 0x89, 0x1}, 0x20) 18:41:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x1, 0x0, 0x0, 0x4, 0x0, 0xffffffff}, @restrict={0x0, 0x0, 0x0, 0xb, 0x5}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x33, 0x89, 0x1}, 0x20) 18:41:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@restrict]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:41:05 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x3c010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:05 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x64, 0x0, 0x20, 0x70bd26, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_ENABLED={0x5}, @NL802154_ATTR_SEC_FRAME_COUNTER={0x8, 0x21, 0x4}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}, @NL802154_ATTR_SEC_ENABLED={0x5, 0x1e, 0x1}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r1}, @NL802154_ATTR_SEC_ENABLED={0x5}]}, 0x64}, 0x1, 0x0, 0x0, 0x1}, 0x0) r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="010000000000000000000b00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00060003000000030000000c00060003000000000000000c000600000000000000000006000a00a1aa000006000a00000000000c000600030000000000000006000a00a1aa00000c000600020000000000000008000300", @ANYRES32=r6], 0x78}}, 0x0) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r7, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="78bf6d00", @ANYRES16=r9, @ANYBLOB="010000000000000000000b00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00060003000000030000000c00060003000000000000000c000600000000000000000006000a00a1aa000006000a00000000000c000600030000000000000006000a00a1aa00000c000600020000000000000008000300", @ANYRES32=r10], 0x78}}, 0x0) sendmsg$NL802154_CMD_GET_SEC_LEVEL(r0, &(0x7f0000000200)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000300)={0x14, r5, 0xd2d42a268405acc, 0x70bd2d, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x20048000}, 0x24040004) ioctl$NS_GET_PARENT(r2, 0xb705, 0x0) 18:41:05 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000040)={0x0, 0x1, r0, 0x8, 0x80000}) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x3) 18:41:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0xa}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x1, 0x0, 0x0, 0x4, 0x0, 0xffffffff}, @restrict={0x0, 0x0, 0x0, 0xb, 0x5}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x33, 0x89, 0x1}, 0x20) 18:41:05 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x3d000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@restrict]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:41:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0xc}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:05 executing program 0: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r1 = getpgid(0x0) r2 = getpgid(0x0) getpgid(r2) sched_rr_get_interval(r2, &(0x7f0000000240)) getpgid(r1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000140)) getpgid(r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) r4 = syz_open_procfs$namespace(r3, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r4, 0xb701, 0x0) setns(r4, 0x2c000080) r5 = getpgid(r0) sched_rr_get_interval(r5, &(0x7f00000001c0)) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f00000002c0)={'wlan1\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, 0x0, 0x400, 0x70bd27, 0x25dfdbfe, {{}, {@void, @void, @void}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r6}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x0, 0x4c}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x6e}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r7}]}, 0x40}, 0x1, 0x0, 0x0, 0x4001}, 0x20048004) r8 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r8, &(0x7f0000000300)={0x18}, 0x18) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r8, 0xc0182101, &(0x7f0000000200)={0x0, 0x7, 0x7}) 18:41:05 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0x6f5, 0x20880) ioctl$RAW_CHAR_CTRL_GETBIND(r1, 0xac01, &(0x7f00000000c0)={0x0, 0x7, 0x0}) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000000000)=ANY=[@ANYBLOB="10000000021401000000000000000000e2270e4e40ecd6c1cd18334400035861d9c1d4d6ecde729f53dd28747c425ee6dbbe09b3ea862c93e571e90e7b51d92ac02a8147749a299b46becd5119cb3190a150b19c1063ad3158ab6bcb7d39326cd66b6df04132f20d3c"], 0x10}}, 0x0) 18:41:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x1, 0x0, 0x0, 0x4, 0x0, 0xffffffff}, @restrict={0x0, 0x0, 0x0, 0xb, 0x5}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x33, 0x89, 0x1}, 0x20) 18:41:05 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x3d010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@restrict]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:41:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0xe}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:05 executing program 0: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r1 = getpgid(0x0) r2 = getpgid(0x0) getpgid(r2) sched_rr_get_interval(r2, &(0x7f0000000240)) getpgid(r1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000140)) getpgid(r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) r4 = syz_open_procfs$namespace(r3, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r4, 0xb701, 0x0) setns(r4, 0x2c000080) r5 = getpgid(r0) sched_rr_get_interval(r5, &(0x7f00000001c0)) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f00000002c0)={'wlan1\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, 0x0, 0x400, 0x70bd27, 0x25dfdbfe, {{}, {@void, @void, @void}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r6}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x0, 0x4c}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x6e}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r7}]}, 0x40}, 0x1, 0x0, 0x0, 0x4001}, 0x20048004) r8 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r8, &(0x7f0000000300)={0x18}, 0x18) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r8, 0xc0182101, &(0x7f0000000200)={0x0, 0x7, 0x7}) 18:41:05 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000140)={0x7, 0x1, 0x9, 0x1, 0x2b, 0x0, 0xfb}, 0xc) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f00000000c0)={@any, 0x7195}) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mISDNtimer\x00', 0x50000, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000000)=0x8, 0x8) r1 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$vsock_stream(0x28, 0x1, 0x0) sendmsg$RDMA_NLDEV_CMD_SET(r1, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000000100)=ANY=[@ANYRES32=r1, @ANYRESOCT=r1, @ANYRES64=r2], 0x10}}, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x301200, 0x0) 18:41:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 18:41:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffff}, @restrict]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x33, 0x89, 0x1}, 0x20) 18:41:05 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x3e000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0x10}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 18:41:05 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001380)={0x10, 0x1402, 0x1, 0x0, 0x4}, 0x10}}, 0x40881) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) ioctl$sock_ifreq(r1, 0x8935, &(0x7f0000000080)={'veth1_vlan\x00', @ifru_ivalue}) 18:41:05 executing program 0: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r1 = getpgid(0x0) r2 = getpgid(0x0) getpgid(r2) sched_rr_get_interval(r2, &(0x7f0000000240)) getpgid(r1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000140)) getpgid(r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) r4 = syz_open_procfs$namespace(r3, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r4, 0xb701, 0x0) setns(r4, 0x2c000080) r5 = getpgid(r0) sched_rr_get_interval(r5, &(0x7f00000001c0)) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f00000002c0)={'wlan1\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, 0x0, 0x400, 0x70bd27, 0x25dfdbfe, {{}, {@void, @void, @void}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r6}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x0, 0x4c}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x6e}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r7}]}, 0x40}, 0x1, 0x0, 0x0, 0x4001}, 0x20048004) r8 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r8, &(0x7f0000000300)={0x18}, 0x18) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r8, 0xc0182101, &(0x7f0000000200)={0x0, 0x7, 0x7}) 18:41:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct, @restrict]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x33, 0x89, 0x1}, 0x20) 18:41:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0x48}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:05 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x3e010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:05 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)=ANY=[@ANYBLOB="10000000025e4035bd75500fb5000000"], 0x10}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000000000000000b00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00060003000000030000000c00060003000000000000000c000600000000000000000006000a00a1aa000006000a00000000000c000600030000000000000006000a00a1aa00000c000600020000000000000008000300", @ANYRES32=r4], 0x78}}, 0x0) sendmsg$NL802154_CMD_SET_SHORT_ADDR(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x100, 0x70bd2a, 0x25dfdbfc, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_SHORT_ADDR={0x6, 0xa, 0xffff}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000740)={'wpan4\x00'}) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000180)='nl802154\x00', r2) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(r5, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, r6, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_SEC_DEVKEY={0x1c, 0x24, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc, 0x2, {0x300}}, @NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x80) 18:41:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 18:41:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0x4c}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:06 executing program 0: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r1 = getpgid(0x0) r2 = getpgid(0x0) getpgid(r2) sched_rr_get_interval(r2, &(0x7f0000000240)) getpgid(r1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000140)) getpgid(r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) r4 = syz_open_procfs$namespace(r3, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r4, 0xb701, 0x0) setns(r4, 0x2c000080) r5 = getpgid(r0) sched_rr_get_interval(r5, &(0x7f00000001c0)) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f00000002c0)={'wlan1\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, 0x0, 0x400, 0x70bd27, 0x25dfdbfe, {{}, {@void, @void, @void}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r6}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x0, 0x4c}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x6e}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r7}]}, 0x40}, 0x1, 0x0, 0x0, 0x4001}, 0x20048004) r8 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r8, &(0x7f0000000300)={0x18}, 0x18) 18:41:06 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x3f000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f00000001c0)=""/137, 0x0, 0x89, 0x1}, 0x20) 18:41:06 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 18:41:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0x68}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:06 executing program 0: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r1 = getpgid(0x0) r2 = getpgid(0x0) getpgid(r2) sched_rr_get_interval(r2, &(0x7f0000000240)) getpgid(r1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000140)) getpgid(r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) r4 = syz_open_procfs$namespace(r3, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r4, 0xb701, 0x0) setns(r4, 0x2c000080) r5 = getpgid(r0) sched_rr_get_interval(r5, &(0x7f00000001c0)) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f00000002c0)={'wlan1\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, 0x0, 0x400, 0x70bd27, 0x25dfdbfe, {{}, {@void, @void, @void}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r6}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x0, 0x4c}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x6e}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r7}]}, 0x40}, 0x1, 0x0, 0x0, 0x4001}, 0x20048004) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) 18:41:06 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x3f010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:06 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 18:41:06 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0x0) r1 = getpgid(0x0) getpgid(r1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={[], 0x9e, 0x2, 0x1e774c2, 0xfffffffffffffffa, 0x2, r1}) 18:41:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f00000001c0)=""/137, 0x0, 0x89, 0x1}, 0x20) 18:41:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0x6c}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:06 executing program 0: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r1 = getpgid(0x0) r2 = getpgid(0x0) getpgid(r2) sched_rr_get_interval(r2, &(0x7f0000000240)) getpgid(r1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000140)) getpgid(r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) r4 = syz_open_procfs$namespace(r3, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r4, 0xb701, 0x0) setns(r4, 0x2c000080) r5 = getpgid(r0) sched_rr_get_interval(r5, &(0x7f00000001c0)) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f00000002c0)={'wlan1\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, 0x0, 0x400, 0x70bd27, 0x25dfdbfe, {{}, {@void, @void, @void}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r6}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x0, 0x4c}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x6e}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r7}]}, 0x40}, 0x1, 0x0, 0x0, 0x4001}, 0x20048004) 18:41:06 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x40000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:06 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 18:41:06 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) socketpair(0x1a, 0x3, 0x8, &(0x7f0000000340)={0xffffffffffffffff}) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000380)=0x1, 0x4) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000040)={'wlan1\x00'}) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000000000)=ANY=[@ANYBLOB="100000000214010000001dcc0000001202002000000000009afe824b5e864ef3e0c9a54b4bf3a607e493ce8b2248fa8e82b2d0dc04000000a8"], 0x10}}, 0x0) 18:41:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={0x0, &(0x7f00000001c0)=""/137, 0x0, 0x89, 0x1}, 0x20) 18:41:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0x74}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:06 executing program 0: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r1 = getpgid(0x0) r2 = getpgid(0x0) getpgid(r2) sched_rr_get_interval(r2, &(0x7f0000000240)) getpgid(r1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000140)) getpgid(r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) r4 = syz_open_procfs$namespace(r3, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r4, 0xb701, 0x0) setns(r4, 0x2c000080) r5 = getpgid(r0) sched_rr_get_interval(r5, &(0x7f00000001c0)) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f00000002c0)={'wlan1\x00'}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'wlan1\x00'}) 18:41:06 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x40010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:06 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89}, 0x20) 18:41:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1, 0x0, 0x0, 0x4, 0x0, 0xffffffff}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:41:06 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x24000, 0x0) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0x0) 18:41:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0x7a}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:06 executing program 0: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r1 = getpgid(0x0) r2 = getpgid(0x0) getpgid(r2) sched_rr_get_interval(r2, &(0x7f0000000240)) getpgid(r1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000140)) getpgid(r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) r4 = syz_open_procfs$namespace(r3, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r4, 0xb701, 0x0) setns(r4, 0x2c000080) r5 = getpgid(r0) sched_rr_get_interval(r5, &(0x7f00000001c0)) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f00000002c0)={'wlan1\x00'}) 18:41:06 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x41000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:06 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000000000)=ANY=[@ANYBLOB="1000000002140100000000f100000000031b4754ebe121735692d25cdb57da33aabb169f2e8196691997a7fa571f60fb09eefc8799b2169d484931c9e0a91a7ca4946641122ebfd0ee543a389d0852e16e"], 0x10}}, 0x0) 18:41:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1, 0x0, 0x0, 0x4, 0x0, 0xffffffff}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:41:06 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89}, 0x20) 18:41:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0x88}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:06 executing program 0: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r1 = getpgid(0x0) r2 = getpgid(0x0) getpgid(r2) sched_rr_get_interval(r2, &(0x7f0000000240)) getpgid(r1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000140)) getpgid(r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) r4 = syz_open_procfs$namespace(r3, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r4, 0xb701, 0x0) setns(r4, 0x2c000080) r5 = getpgid(r0) sched_rr_get_interval(r5, &(0x7f00000001c0)) 18:41:06 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x41010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:06 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) iopl(0x2) r2 = timerfd_create(0x4, 0x80000) timerfd_gettime(r2, &(0x7f00000000c0)) write$P9_RSTATFS(r1, &(0x7f0000000040)={0x43, 0x9, 0x2, {0x7, 0x0, 0x8, 0x7, 0x1526a5e5, 0x7, 0x0, 0x9, 0x2}}, 0x43) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) write$P9_RSTAT(r1, &(0x7f0000000100)={0x3d, 0x7d, 0x1, {0x0, 0x36, 0x80, 0xff, {0x40, 0x4, 0x5}, 0x200000, 0xfffffffd, 0x8, 0x200, 0x1, '(', 0x0, '', 0x2, '-$'}}, 0x3d) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)=ANY=[@ANYBLOB="10000000021401050300000000000000"], 0x10}}, 0x0) 18:41:06 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89}, 0x20) 18:41:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1, 0x0, 0x0, 0x4, 0x0, 0xffffffff}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:41:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0x300}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:06 executing program 0: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r1 = getpgid(0x0) r2 = getpgid(0x0) getpgid(r2) sched_rr_get_interval(r2, &(0x7f0000000240)) getpgid(r1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000140)) getpgid(r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) r4 = syz_open_procfs$namespace(r3, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r4, 0xb701, 0x0) setns(r4, 0x2c000080) getpgid(r0) 18:41:06 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x42000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:06 executing program 2: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r1 = getpgid(0x0) r2 = getpgid(0x0) getpgid(r2) sched_rr_get_interval(r2, &(0x7f0000000240)) getpgid(r1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000140)) getpgid(r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) r4 = syz_open_procfs$namespace(r3, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r4, 0xb701, 0x0) setns(r4, 0x2c000080) r5 = getpgid(r0) sched_rr_get_interval(r5, &(0x7f00000001c0)) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f00000002c0)={'wlan1\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, 0x0, 0x400, 0x70bd27, 0x25dfdbfe, {{}, {@void, @void, @void}}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r6}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x0, 0x4c}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x6e}, @NL80211_ATTR_PID={0x8, 0x52, r0}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r7}]}, 0x40}, 0x1, 0x0, 0x0, 0x4001}, 0x20048004) r8 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r8, &(0x7f0000000300)={0x18}, 0x18) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r8, 0xc0182101, &(0x7f0000000200)={0x0, 0x7, 0x7}) 18:41:06 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)=ANY=[@ANYBLOB="10000400000001f415fb28b0cbb71161"], 0x10}}, 0x0) 18:41:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x1, 0x0, 0x0, 0x4, 0x0, 0xffffffff}, @restrict]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x33, 0x89, 0x1}, 0x20) 18:41:06 executing program 0: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r1 = getpgid(0x0) r2 = getpgid(0x0) getpgid(r2) sched_rr_get_interval(r2, &(0x7f0000000240)) getpgid(r1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000140)) getpgid(r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) r4 = syz_open_procfs$namespace(r3, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r4, 0xb701, 0x0) setns(r4, 0x2c000080) 18:41:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0x500}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:07 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x42010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:07 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000000300)=ANY=[@ANYBLOB="599fd9a9dec91553fa1000400c635e593bd11563556f7486accbf20000002007ab27c4776d9d74ffb818878fb3c3e43757044ef5"], 0x10}}, 0x0) ioctl$IOCTL_CONFIG_SYS_RESOURCE_PARAMETERS(0xffffffffffffffff, 0x40096100, &(0x7f0000000280)={{&(0x7f0000000200)={'Accelerator\x00', {}, {&(0x7f0000000180)={'Accelerator\x00', {&(0x7f00000000c0)=@adf_dec={@bank={'Bank', '2', 'InterruptCoalescingEnabled\x00'}, {0x800}, {&(0x7f0000000000)=@adf_hex={@format={'Dc', '3', 'NumConcurrentRequests\x00'}, {0x3}}}}}}}}}, 0x18}) 18:41:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@restrict]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:41:07 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18, 0x71, 0x0, {{0x0, 0x4}}}, 0x18) r2 = ioctl$NS_GET_PARENT(r1, 0xb702, 0x0) r3 = syz_open_dev$vcsu(&(0x7f00000000c0)='/dev/vcsu#\x00', 0x0, 0x2000) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x54, 0x0, 0x800, 0x70bd2c, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_NETNS_FD={0x8, 0x1d, r1}, @NL802154_ATTR_NETNS_FD={0x8, 0x1d, r2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_NETNS_FD={0x8, 0x1d, r3}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}]}, 0x54}, 0x1, 0x0, 0x0, 0x8010}, 0x20004000) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYRES64=0x0], &(0x7f0000000180)=""/137, 0x27, 0xfe1f, 0x1}, 0x20) 18:41:07 executing program 0: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r1 = getpgid(0x0) r2 = getpgid(0x0) getpgid(r2) sched_rr_get_interval(r2, &(0x7f0000000240)) getpgid(r1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000140)) getpgid(r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) r4 = syz_open_procfs$namespace(r3, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r4, 0xb701, 0x0) 18:41:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0x600}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:07 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x43000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:07 executing program 1: syz_genetlink_get_family_id$gtp(&(0x7f0000000000)='gtp\x00', 0xffffffffffffffff) r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0x0) 18:41:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@restrict]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:41:07 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000040)='/dev/vcsu#\x00', 0xfffffffffffffffa, 0x6208c2) r2 = syz_genetlink_get_family_id$gtp(&(0x7f00000000c0)='gtp\x00', 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r2, 0x4, 0x70bd2b, 0x25dfdbfd, {}, [@GTPA_NET_NS_FD={0x8, 0x7, r0}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0xc000) 18:41:07 executing program 0: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r1 = getpgid(0x0) r2 = getpgid(0x0) getpgid(r2) sched_rr_get_interval(r2, &(0x7f0000000240)) getpgid(r1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000140)) getpgid(r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb701, 0x0) 18:41:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0x700}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:07 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x43010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:07 executing program 1: syz_genetlink_get_family_id$nl802154(&(0x7f00000001c0)='nl802154\x00', 0xffffffffffffffff) syz_mount_image$omfs(&(0x7f0000000040)='omfs\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x7, &(0x7f0000000880)=[{&(0x7f00000000c0)="a6ad33d89640b7fb2759dd6e900deaeb520699bd3152b0460a9f9432390bfb69cf0318da4cc1266fbebe67105f0c8ba56b6a875d479f9ed2be9c6c1df3a16d33cd27af7ee436a33c82b80afe2aa0014bb0bcbeef34fbe4e14a769d9911b590d83a75dffd01c9", 0x66, 0x1}, {&(0x7f0000000140)="577695839f6c0e61ea2ea4774cdc3862d9c02271021d76b1ba28c326f1d897ef82e2e14947fd051cfdf669cd0adf4412f530247f858028aa5c4a61362c0fe61e17b7bc1bfcf8dd904156031faffc7c727c525bd56a", 0x55, 0x200}, {&(0x7f0000000600)="20239bb021ffe09fc720c7e484f4b146d61dda71d05db60321b75131d27f0161dacf5ea626ab950912b9a0918e4db4b78734fb24c9e2bef94d41c30e7deb770cd577b138533492ae4c8077516f8ab96eddbe2651b20146beffea8d9fcaef9910d6fed52d97c85da7bcc3c6806798008e98167cb829fa2ac38fb3ad4bc842eb986e9894ac79d703dcf61acb41bb6e35b38ca33ad088eeab466d3f394075c44eff148e27b1b988052cf05e73b602a387ccd325de7a8c31fec59856a1d66e363d654afada9048a36e50e901", 0xca, 0x3}, {&(0x7f00000002c0)="8f4d36170687655ca1b315a426bd01183056c964f14ec779d9832e0938fa2f85ee5e705796c5dac1f3e23cb394418d8889d6dbac97a77f5a8707411368d41b7e86867fa898a0d5dd12c0c2d2d0b7837f43f36209e2ee5d589fa09eb60d7a090c0293d614c32094c12a402f445132eb0f8c82f1f62edffba3664403b92c", 0x7d, 0x866}, {&(0x7f0000000940)="0d9b4e53fd52ecc2cbf3b1b3c404ff935b0fd00b8cd064d1a51e3bd31f04c2bd8fbf73e70e4b21cc384ddae047013aa78688ce522da586b0587fa4eacbfb52260adb7336000000000000000000001df6175e9aac1d646845cd165a6e0992a570d173aa01647aaf3a532271221025371e390007f781420d363e32571a1315178981dec3281b3c92b26ffceedf5c47b076fbdde4937eead507c198e4d15587f9b16a0d5db93bdd2f0786a1a791f0963adab3def55a1d3300", 0xb7, 0x1}, {&(0x7f00000003c0)="1558813820899081bca1df79b285e374c00b982be0b183e5f6b85b0d37f473950ba35a59ec670e5e6f52ec351fa593189f8104e61e9198e6d4c5769a578594601bc45712cec12e03dad1", 0x4a, 0x2}, {&(0x7f0000000440)="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", 0xff, 0x800000003}], 0x2000004, &(0x7f0000000740)=ANY=[@ANYRES64=0x0, @ANYRESDEC, @ANYBLOB=',dont_measure,\x00']) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) timerfd_settime(r0, 0x1, &(0x7f0000000240)={{r1, r2+10000000}, {0x77359400}}, &(0x7f0000000280)) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) 18:41:07 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000040)='/dev/vcsu#\x00', 0xfffffffffffffffa, 0x6208c2) r2 = syz_genetlink_get_family_id$gtp(&(0x7f00000000c0)='gtp\x00', 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r2, 0x4, 0x70bd2b, 0x25dfdbfd, {}, [@GTPA_NET_NS_FD={0x8, 0x7, r0}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0xc000) 18:41:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@restrict]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:41:07 executing program 0: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r1 = getpgid(0x0) r2 = getpgid(0x0) getpgid(r2) sched_rr_get_interval(r2, &(0x7f0000000240)) getpgid(r1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000140)) getpgid(r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb701, 0x0) 18:41:07 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x44000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0xa00}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) [ 2071.838180] omfs: Invalid superblock (0) 18:41:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct={0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffff}, @restrict]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x33, 0x89, 0x1}, 0x20) 18:41:07 executing program 0: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r1 = getpgid(0x0) r2 = getpgid(0x0) getpgid(r2) sched_rr_get_interval(r2, &(0x7f0000000240)) getpgid(r1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000140)) getpgid(r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb701, 0x0) 18:41:07 executing program 2: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000740)={'wpan4\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_TX_POWER(r3, &(0x7f0000000580)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000500)={0x54, 0x0, 0x800, 0x70bd27, 0x25dfdbfc, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}, @NL802154_ATTR_TX_POWER={0x8, 0xb, 0x81}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x40d0}, 0x1) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r2, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r4, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="010000000000000000000b00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00060003000000030000000c00060003000000000000000c000600000000000000000006000a00a1aa0000000000000000000600000008000300"/72, @ANYRES32=r8], 0x78}}, 0x0) r9 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r9, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r10, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r11, @ANYBLOB="010000000000000000000b00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00060003000000030000000c00060003000000000000000c000600000000000000000006000a00a1aa000006000a00000000000c000600030000000000000006000a00a1aa00000c000600020000000000000008000300", @ANYRES32=r12], 0x78}}, 0x0) sendmsg$NL802154_CMD_DEL_SEC_KEY(r1, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000040)={&(0x7f0000000b40)={0x3b4, r4, 0x20, 0x70bd27, 0x25dfdbfd, {}, [@NL802154_ATTR_SEC_KEY={0x28, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_CMDS={0x24, 0x3, "5794e6579281f60851b5aa035b26ea05e87dcda9ef0280f2c13716755a4ad58e"}]}, @NL802154_ATTR_SEC_KEY={0x44, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_BYTES={0x14, 0x4, "ca3169580ae5cffea5887051d470e5df"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x30}, @NL802154_KEY_ATTR_USAGE_CMDS={0x24, 0x3, "f7faac949ccc4e8a834a288c261ff8d8b3d7aeef915ccb210c8a5820d0f79849"}]}, @NL802154_ATTR_SEC_KEY={0x90, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x2f}]}, @NL802154_KEY_ATTR_USAGE_CMDS={0x24, 0x3, "bfd2b904bb8b57736b8551bfd9487602ab6a282304d708cc2143f685ec556d9f"}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "07203b442e7a200bf0659f682adfa5a6"}, @NL802154_KEY_ATTR_USAGE_CMDS={0x24, 0x3, "e79e55225462e34527e95612ebb598ef40d47d3f164c9e782749991da4f6528b"}, @NL802154_KEY_ATTR_USAGE_CMDS={0x24, 0x3, "4593ff703724eef3f90153890fd69918709197c67e4178d77c3b91e4e7bcd255"}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r12}, @NL802154_ATTR_SEC_KEY={0x14c, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_CMDS={0x24, 0x3, "347ac6ef5690fbb80af21485141125a56ceb042edeb390247bb1e1322309182d"}, @NL802154_KEY_ATTR_USAGE_CMDS={0x24, 0x3, "204f9974a9cbe6a821a68707c2445c52b8e1ea489190b666a2a4d1a7a386f33d"}, @NL802154_KEY_ATTR_ID={0xc0, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x2}, @NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x2}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x7cc}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0xdf72}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x24, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x1}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x2}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x2}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xfffe}]}, @NL802154_KEY_ID_ATTR_IMPLICIT={0xc, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x3}]}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x50, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0002}}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0102}}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0002}}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0302}}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0xfffff000}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0x1001d}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc}]}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x40f6}]}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "034729f7932fd84b56f5136a737c2d95"}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "bb74772d0f2304dc9b861ee76d3e3ac8"}, @NL802154_KEY_ATTR_ID={0x10, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0xc000000}]}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0xff}]}, @NL802154_ATTR_SEC_KEY={0x148, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_CMDS={0x24, 0x3, "1930c9dc476c36d300a937db7a7be54f4ee05590fe5202546e8d6ee891c31b37"}, @NL802154_KEY_ATTR_ID={0xf4, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_MODE={0x8, 0x1, 0x3}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x30, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0002}}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x2}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x1}, @NL802154_DEV_ADDR_ATTR_SHORT={0x6}]}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x3c, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x2}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0302}}, @NL802154_DEV_ADDR_ATTR_MODE={0x8}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0102}}, @NL802154_DEV_ADDR_ATTR_MODE={0x8}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x3}]}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x7ff}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0xfb2}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0xfbc}, @NL802154_KEY_ID_ATTR_MODE={0x8}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x2c, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_SHORT={0x6}, @NL802154_DEV_ADDR_ATTR_MODE={0x8}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x1}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x3}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x2}]}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x5}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x1c, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_PAN_ID={0x6}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0x3}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x2}]}]}, @NL802154_KEY_ATTR_USAGE_CMDS={0x24, 0x3, "02c45c18e21465b605f5946019681ae8a346c0aa19ce59e6e5989bf686688ada"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x8a}]}]}, 0x3b4}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) 18:41:07 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x44010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0xc00}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) [ 2071.946400] omfs: Invalid superblock (0) 18:41:07 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r2, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r3, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_NEW_SEC_DEV(r1, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, r3, 0xb000862c0a9d1623, 0x70bd2b, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_SEC_DEVICE={0x30, 0x23, 0x0, 0x1, [@NL802154_DEV_ATTR_SHORT_ADDR={0x6, 0x3, 0xaaa0}, @NL802154_DEV_ATTR_FRAME_COUNTER={0x6, 0x1, 0x3}, @NL802154_DEV_ATTR_SHORT_ADDR={0x6, 0x3, 0xaaa1}, @NL802154_DEV_ATTR_SECLEVEL_EXEMPT={0x5, 0x5, 0x1}, @NL802154_DEV_ATTR_EXTENDED_ADDR={0xc}]}]}, 0x54}, 0x1, 0x0, 0x0, 0xa7fd165f40a76422}, 0x2) 18:41:07 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x45000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:07 executing program 0: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r1 = getpgid(0x0) r2 = getpgid(0x0) getpgid(r2) sched_rr_get_interval(r2, &(0x7f0000000240)) getpgid(r1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000140)) getpgid(r0) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r3, 0xb701, 0x0) [ 2072.018968] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 18:41:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct, @restrict]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x33, 0x89, 0x1}, 0x20) 18:41:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0xe00}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:07 executing program 2: syz_genetlink_get_family_id$nl802154(&(0x7f00000001c0)='nl802154\x00', 0xffffffffffffffff) syz_mount_image$omfs(&(0x7f0000000040)='omfs\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x7, &(0x7f0000000880)=[{&(0x7f00000000c0)="a6ad33d89640b7fb2759dd6e900deaeb520699bd3152b0460a9f9432390bfb69cf0318da4cc1266fbebe67105f0c8ba56b6a875d479f9ed2be9c6c1df3a16d33cd27af7ee436a33c82b80afe2aa0014bb0bcbeef34fbe4e14a769d9911b590d83a75dffd01c9", 0x66, 0x1}, {&(0x7f0000000140)="577695839f6c0e61ea2ea4774cdc3862d9c02271021d76b1ba28c326f1d897ef82e2e14947fd051cfdf669cd0adf4412f530247f858028aa5c4a61362c0fe61e17b7bc1bfcf8dd904156031faffc7c727c525bd56a", 0x55, 0x200}, {&(0x7f0000000600)="20239bb021ffe09fc720c7e484f4b146d61dda71d05db60321b75131d27f0161dacf5ea626ab950912b9a0918e4db4b78734fb24c9e2bef94d41c30e7deb770cd577b138533492ae4c8077516f8ab96eddbe2651b20146beffea8d9fcaef9910d6fed52d97c85da7bcc3c6806798008e98167cb829fa2ac38fb3ad4bc842eb986e9894ac79d703dcf61acb41bb6e35b38ca33ad088eeab466d3f394075c44eff148e27b1b988052cf05e73b602a387ccd325de7a8c31fec59856a1d66e363d654afada9048a36e50e901", 0xca, 0x3}, {&(0x7f00000002c0)="8f4d36170687655ca1b315a426bd01183056c964f14ec779d9832e0938fa2f85ee5e705796c5dac1f3e23cb394418d8889d6dbac97a77f5a8707411368d41b7e86867fa898a0d5dd12c0c2d2d0b7837f43f36209e2ee5d589fa09eb60d7a090c0293d614c32094c12a402f445132eb0f8c82f1f62edffba3664403b92c", 0x7d, 0x866}, {&(0x7f0000000940)="0d9b4e53fd52ecc2cbf3b1b3c404ff935b0fd00b8cd064d1a51e3bd31f04c2bd8fbf73e70e4b21cc384ddae047013aa78688ce522da586b0587fa4eacbfb52260adb7336000000000000000000001df6175e9aac1d646845cd165a6e0992a570d173aa01647aaf3a532271221025371e390007f781420d363e32571a1315178981dec3281b3c92b26ffceedf5c47b076fbdde4937eead507c198e4d15587f9b16a0d5db93bdd2f0786a1a791f0963adab3def55a1d3300", 0xb7, 0x1}, {&(0x7f00000003c0)="1558813820899081bca1df79b285e374c00b982be0b183e5f6b85b0d37f473950ba35a59ec670e5e6f52ec351fa593189f8104e61e9198e6d4c5769a578594601bc45712cec12e03dad1", 0x4a, 0x2}, {&(0x7f0000000440)="adc684dc65f3f4f702d33cab2187b300707aef6249f94caeb41e3115afcb6705406c0b006867c9f096a5f1da092990ddb0fc95757318e28e621607b4e901d4e21d602724b94ff210bcfd250381444ff34eaf5e8cdedec760261193cef3ff0de2f7c4f74ca9ec5a3a19276fd57fd248ae98c3dfa66482117b07214bac40a28b8e323ea004c56181b47dd4a0743f87e1161eb44cd60511e3f9a1d4ca9261ab91febc2ef655231e2fe4d5565cea87415122822a626bea3f27694d8853065fba6fe3252e7f0e4d2159df645ea33f33ec7b754fa4afa898da7e10b9480fba82bcb580a311f3ed99e0e5614c4906006160024e530da720ef1987911b32b6d397fb59", 0xff, 0x800000003}], 0x2000004, &(0x7f0000000740)=ANY=[@ANYRES64=0x0, @ANYRESDEC, @ANYBLOB=',dont_measure,\x00']) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) timerfd_settime(r0, 0x1, &(0x7f0000000240)={{r1, r2+10000000}, {0x77359400}}, &(0x7f0000000280)) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) 18:41:07 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x45010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:07 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000000000)=ANY=[@ANYBLOB="10000000021401000000000000000000415789ead228689b6945ae4b94fb16dfb7a0fe3e4763ceec3444429d131d7d9cbc3a4b4563786c42e128f4b8ed0a3775adaea449f6b595595c47d62f1bdbdbd262ec04e03bdebc7ee88d7fa86b75d4f7e72c56f414195b574bcbed8e26e7eb4c8034d7fd62e2b772d968b2ade62cb46c49be728b983e45dd2c7692ef344e92a919cf3d6bc3a7c896bc76b7c7acb73a7fd919fe6ba4792e53346f450fec52309fc6ad252f6591328fafb02a1cbddbeda23c17fe7ea01f1faac743e6973785b1e10679da73c5631daf7ce0dbe4a4e3c440d7f8e62c40"], 0x10}}, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) sendmsg$RDMA_NLDEV_CMD_SET(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)={0x50, 0x1402, 0x200, 0x70bd2b, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz1\x00'}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}]}, 0x50}, 0x1, 0x0, 0x0, 0x20000880}, 0x4000000) 18:41:07 executing program 0: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r0 = getpgid(0x0) r1 = getpgid(0x0) getpgid(r1) sched_rr_get_interval(r1, &(0x7f0000000240)) getpgid(r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000140)) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r2, 0xb701, 0x0) 18:41:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0x4800}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:07 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x46000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:07 executing program 0: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r0 = getpgid(0x0) r1 = getpgid(0x0) getpgid(r1) sched_rr_get_interval(r1, &(0x7f0000000240)) getpgid(r0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r2, 0xb701, 0x0) 18:41:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 18:41:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0x4c00}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:07 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000000000)=ANY=[@ANYBLOB="100000000214010000000000e6ffffff656a8828dc00495757d95b68c19675d4326bafd61ea51869a174598f9952346c4bbe7967c3cb422040f066d0f5318fd076c00f290c8a05c1a8577c3a87b34afcf4c0e33f0419a2197926bab3bb0bedfa0299f6e169fd19289e58c492cd5965ec52ce04f3e506878fd37812ac02b395759ec31296b0a19d8461f2c7110f0933ae7069f6e126bd2b5245eb620211c27283e51835353a458fd8793efa123f000000fb1f2f646a4ee8894940a760af830155f59ca947ddbea527745a30066e46"], 0x10}}, 0x0) [ 2072.343609] omfs: Invalid superblock (0) 18:41:08 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x46010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:08 executing program 0: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) getpgid(0x0) r0 = getpgid(0x0) getpgid(r0) sched_rr_get_interval(r0, &(0x7f0000000240)) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r1, 0xb701, 0x0) 18:41:08 executing program 2: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f00000007c0)={@mcast2, 0x0}, &(0x7f0000000800)=0x14) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18}, 0x18) sendmsg$GTP_CMD_GETPDP(r1, &(0x7f0000000900)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000008c0)={&(0x7f0000000840)={0x60, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@GTPA_FLOW={0x6}, @GTPA_LINK={0x8, 0x1, r2}, @GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_NET_NS_FD={0x8, 0x7, r3}, @GTPA_TID={0xc}, @GTPA_TID={0xc, 0x3, 0x2}, @GTPA_FLOW={0x6, 0x6, 0x3}, @GTPA_TID={0xc, 0x3, 0x2}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000004}, 0x4) ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) 18:41:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 18:41:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0x6800}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:08 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000000000)=ANY=[@ANYBLOB="100000000214829419ed18b6e56d38c45fad0100000000000500000000000000e91c6a51c028a074"], 0x10}}, 0x0) 18:41:08 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x47000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:08 executing program 0: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) getpgid(0x0) r0 = getpgid(0x0) getpgid(r0) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r1, 0xb701, 0x0) 18:41:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, 0x0, 0x32, 0x0, 0x1}, 0x20) 18:41:08 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x1000000, 0x89, 0x1}, 0x20) 18:41:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0x6c00}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:08 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x47010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:08 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) sendmsg$GTP_CMD_NEWPDP(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x54, 0x0, 0x2, 0x70bd25, 0x25dfdbfe, {}, [@GTPA_I_TEI={0x8, 0x8, 0x4}, @GTPA_LINK={0x8}, @GTPA_TID={0xc, 0x3, 0x4}, @GTPA_TID={0xc, 0x3, 0x3}, @GTPA_NET_NS_FD={0x8}, @GTPA_MS_ADDRESS={0x8, 0x5, @private=0xa010101}, @GTPA_PEER_ADDRESS={0x8, 0x4, @dev={0xac, 0x14, 0x14, 0x10}}]}, 0x54}}, 0x4000001) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000000140)=ANY=[@ANYBLOB="1000006a8200021401000000000000000000"], 0x10}}, 0x0) 18:41:08 executing program 0: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) getpgid(0x0) getpgid(0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:41:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89}, 0x20) 18:41:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0x7400}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:08 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x48000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:08 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)=ANY=[@ANYBLOB='\x00'/16], 0x10}}, 0x0) 18:41:08 executing program 0: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) getpgid(0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:41:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89}, 0x20) 18:41:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0x7a00}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:08 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f]}}, &(0x7f00000001c0)=""/137, 0x1000000, 0x89, 0x1}, 0x20) 18:41:08 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x48010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:08 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000100)={'wlan0\x00'}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$IOCTL_CONFIG_SYS_RESOURCE_PARAMETERS(r2, 0x40096100, &(0x7f00000002c0)) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000000140)={0x24, 0x1402, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz0\x00'}]}, 0x24}}, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) pipe2$9p(&(0x7f00000001c0), 0x4c00) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18}, 0x18) sendmsg$GTP_CMD_DELPDP(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, 0x0, 0x400, 0x70bd2b, 0x25dfdbff, {}, [@GTPA_VERSION={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x24040848) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r3, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x1407, 0x10, 0x70bd26, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x80}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40880}, 0x800) 18:41:08 executing program 0: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:41:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89}, 0x20) 18:41:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0x8800}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:08 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x49000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:08 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:41:08 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x8, 0x20000) write$P9_RCLUNK(r1, &(0x7f0000000040)={0x7, 0x79, 0x1}, 0x7) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0x0) 18:41:08 executing program 5: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:41:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0xffffff}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:08 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x49010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:08 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0xffffff}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89}, 0x20) 18:41:08 executing program 1: syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, r1, 0x800, 0x70bd29, 0x25dfdbff, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}]}, 0x34}, 0x1, 0x0, 0x0, 0x40400d4}, 0x20000000) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) sendmsg$RDMA_NLDEV_CMD_SET(r2, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001380)={0x10, 0x1402, 0x1, 0x70bd27}, 0x10}}, 0x0) 18:41:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0x1000000}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:08 executing program 0: r0 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:41:08 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x4a000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:09 executing program 0: r0 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:41:09 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000740)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_SET_MAX_FRAME_RETRIES(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x38, 0x0, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_MAX_FRAME_RETRIES={0x5}, @NL802154_ATTR_MAX_FRAME_RETRIES={0x5, 0xf, 0x6}]}, 0x38}, 0x1, 0x0, 0x0, 0x20040000}, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000640)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$P9_ROPEN(r4, &(0x7f0000000300)={0x18}, 0x18) write$RDMA_USER_CM_CMD_BIND_IP(r4, &(0x7f0000000340)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x9, @mcast2, 0x5}}}, 0x30) write$P9_ROPEN(r3, &(0x7f0000000300)={0x3, 0x71, 0x8, {{0x0, 0x0, 0x7}}}, 0x18) syz_open_dev$char_usb(0xc, 0xb4, 0x200) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000380)={0xf, 0x7, 0x1, {0x6, 'wpan1\x00'}}, 0xf) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000740)={'wpan4\x00'}) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000280)={'wpan1\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000480)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(r7, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x20, r8, 0x400, 0x70bd27, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}]}, 0x20}, 0x1, 0x0, 0x0, 0x4048840}, 0x40008c0) sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(r5, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="020227bd7000fbdbdf251e0000000c00060002000000000000000c00060003000000030000000c0006000300000003000000080003001a5eeaf369bcde1deafcc085448cbd88dd2086e7f7989343", @ANYRES32=r6, @ANYBLOB="0c0006000200000002000000540024800c000200000000000000000008000100018000000c0002000201aaaaaaaaaaaa3000038008000400018000000800040006000000050002000100000008000100030000000c000500040000000000000004002480"], 0xa4}, 0x1, 0x0, 0x0, 0x10}, 0x80) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x1402, 0x200, 0x70bd28, 0x25dfdc00}, 0x10}, 0x1, 0x0, 0x0, 0x8c3}, 0x200000c0) 18:41:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0x2000000}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x7, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:09 executing program 2: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000040)={@private1, 0x0}, &(0x7f0000000080)=0x14) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x68, 0x0, 0x300, 0x70bd28, 0x25dfdbff, {}, [@GTPA_NET_NS_FD={0x8, 0x7, r0}, @GTPA_LINK={0x8, 0x1, r1}, @GTPA_TID={0xc}, @GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_O_TEI={0x8, 0x9, 0x3}, @GTPA_I_TEI={0x8, 0x8, 0x4}, @GTPA_NET_NS_FD={0x8, 0x7, r0}, @GTPA_I_TEI={0x8, 0x8, 0x3}, @GTPA_VERSION={0x8}, @GTPA_MS_ADDRESS={0x8, 0x5, @private=0xa010102}]}, 0x68}, 0x1, 0x0, 0x0, 0x4044040}, 0x4008804) ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) 18:41:09 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x4a010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:09 executing program 0: r0 = syz_open_procfs$namespace(0x0, 0x0) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:41:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0x3000000}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:09 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x4b000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0x2000000}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:09 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0xfffff000) 18:41:09 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb701, 0x0) 18:41:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0x4000000}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:09 executing program 1: syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x0, 0x600e804}, 0x0) 18:41:09 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x4b010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x1}]}, {0x0, [0x5f], 0x68}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:41:09 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040)='gtp\x00', 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r2, 0x1}, 0x14}}, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18}, 0x18) r4 = syz_genetlink_get_family_id$gtp(&(0x7f0000000200)='gtp\x00', r0) accept(r0, &(0x7f0000000d80)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000e00)=0x80) sendmsg$GTP_CMD_GETPDP(r3, &(0x7f0000000f00)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000ec0)={&(0x7f0000000e40)={0x60, r4, 0x10, 0x70bd27, 0x25dfdbff, {}, [@GTPA_TID={0xc, 0x3, 0x3}, @GTPA_LINK={0x8, 0x1, r5}, @GTPA_I_TEI={0x8, 0x8, 0x1}, @GTPA_VERSION={0x8}, @GTPA_LINK={0x8}, @GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_MS_ADDRESS={0x8, 0x5, @multicast1}, @GTPA_FLOW={0x6, 0x6, 0x4}, @GTPA_PEER_ADDRESS={0x8, 0x4, @loopback}]}, 0x60}, 0x1, 0x0, 0x0, 0x48190}, 0x4000) sendmsg$GTP_CMD_NEWPDP(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, r2, 0x4, 0x70bd28, 0x25dfdbfb, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @loopback}, @GTPA_FLOW={0x6, 0x6, 0x2}, @GTPA_I_TEI={0x8, 0x8, 0x3}, @GTPA_TID={0xc, 0x3, 0x2}]}, 0x38}, 0x1, 0x0, 0x0, 0x20004010}, 0x44044) r6 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') ioctl$NS_GET_PARENT(r6, 0xb705, 0x0) 18:41:09 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb701, 0x0) 18:41:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0x5000000}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:09 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x4c000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:09 executing program 5: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') ioctl$NS_GET_PARENT(r0, 0xc0189436, 0x0) 18:41:09 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb701, 0x0) 18:41:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0x6000000}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:09 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) ioctl$sock_ifreq(0xffffffffffffffff, 0x0, &(0x7f0000000040)={'macsec0\x00', @ifru_map}) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0x0) ioctl$sock_bt_cmtp_CMTPCONNADD(0xffffffffffffffff, 0x400443c8, &(0x7f0000000000)={r0, 0x57e}) 18:41:09 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7, 0x4b, 0x2}, 0x7) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040)={0x0, 0x6}, 0x2) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') 18:41:09 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x4c010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:09 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv4_newroute={0x28, 0x18, 0x400, 0x70bd27, 0x25dfdbfe, {0x2, 0x20, 0x10, 0x7, 0xfd, 0x1, 0xfe, 0x2, 0x200}, [@RTA_MULTIPATH={0xc, 0x9, {0x33d, 0x10, 0x6b}}]}, 0x28}, 0x1, 0x0, 0x0, 0x810}, 0x8000) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x200040, 0x0) ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) 18:41:09 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb701, 0x0) [ 2074.124762] misc userio: No port type given on /dev/userio 18:41:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0x7000000}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:09 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x4d000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:09 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000000000)=ANY=[@ANYRESDEC=r1], 0x10}}, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x9) 18:41:09 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7, 0x4b, 0x2}, 0x7) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040)={0x0, 0x6}, 0x2) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') 18:41:09 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/ipc\x00') ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) 18:41:09 executing program 0: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0xd401, 0x0, 0x0, &(0x7f0000000040)) 18:41:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0xa000000}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) [ 2074.252865] misc userio: No port type given on /dev/userio 18:41:09 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x4d010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:09 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7, 0x4b, 0x2}, 0x7) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040)={0x0, 0x6}, 0x2) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') 18:41:09 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000000040)=ANY=[@ANYBLOB="100000000214010000000000fedbdf256fcbfbb45f7b9c9f6099932e8e26f8f6b1721058a9b955932e5670cb42ff4652e9333993f7b01cf6af132db1a418f8645842bc7b3dba9629820330aedee6544b86f0f772b0b78439f2996b2dd7f80b0e358bb1be638e1df68a01b577745c0a17d33344dee45e90999db4b66081f9b068066d8bc9a83b06d35458222f9b69568453b4fffe0fbdd74545fdb13b2b83882890604e937ff39052a043dfdad31e78cd9b9163697ec56b6bbdeff641772da76e8dbb43176f034ce0"], 0x10}, 0x1, 0x0, 0x0, 0x50}, 0x80c0) ioctl$TIOCL_GETMOUSEREPORTING(0xffffffffffffffff, 0x541c, &(0x7f0000000000)) socket$nl_route(0x10, 0x3, 0x0) 18:41:09 executing program 5: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') ioctl$NS_GET_PARENT(r0, 0xc0045878, 0x0) 18:41:09 executing program 0: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/pid_for_children\x00') ioctl$NS_GET_PARENT(r0, 0x4030582a, 0x0) 18:41:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0xc000000}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:10 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) sendmsg$GTP_CMD_DELPDP(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x5c, 0x0, 0x200, 0x70bd27, 0x25dfdbfb, {}, [@GTPA_TID={0xc, 0x3, 0x2}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}, @GTPA_I_TEI={0x8, 0x8, 0x4}, @GTPA_PEER_ADDRESS={0x8, 0x4, @multicast2}, @GTPA_TID={0xc}, @GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_MS_ADDRESS={0x8, 0x5, @multicast2}, @GTPA_PEER_ADDRESS={0x8, 0x4, @empty}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0xc61b81a17219405a) r1 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r1, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x0, 0x4040081}, 0x0) [ 2074.412916] misc userio: No port type given on /dev/userio 18:41:10 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x4e000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:10 executing program 5: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x4d010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:10 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7, 0x4b, 0x2}, 0x7) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040)={0x0, 0x6}, 0x2) 18:41:10 executing program 0 (fault-call:1 fault-nth:0): r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:41:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0xe000000}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:10 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x4e010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:10 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x0, 0x20008094}, 0x0) 18:41:10 executing program 5 (fault-call:0 fault-nth:0): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) [ 2074.538683] misc userio: No port type given on /dev/userio [ 2074.566084] FAULT_INJECTION: forcing a failure. [ 2074.566084] name failslab, interval 1, probability 0, space 0, times 0 18:41:10 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x4f000000, 0x0, 0x0, &(0x7f0000000040)) [ 2074.614007] CPU: 1 PID: 26044 Comm: syz-executor.0 Not tainted 4.19.177-syzkaller #0 [ 2074.621928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2074.631285] Call Trace: [ 2074.633904] dump_stack+0x1fc/0x2ef [ 2074.637547] should_fail.cold+0xa/0xf [ 2074.641359] ? setup_fault_attr+0x200/0x200 [ 2074.645695] ? lock_acquire+0x170/0x3c0 [ 2074.649683] __should_failslab+0x115/0x180 [ 2074.653934] should_failslab+0x5/0x10 [ 2074.657742] kmem_cache_alloc+0x277/0x370 [ 2074.661902] alloc_inode+0xab/0x180 [ 2074.665536] new_inode_pseudo+0x14/0xe0 [ 2074.669514] __ns_get_path+0x138/0x760 [ 2074.673415] ? __put_user_ns+0x60/0x60 [ 2074.677309] open_related_ns+0xcf/0x1f0 [ 2074.681284] ? __ns_get_path+0x760/0x760 [ 2074.685356] ns_ioctl+0x288/0x370 [ 2074.688821] ? open_related_ns+0x1f0/0x1f0 [ 2074.693067] do_vfs_ioctl+0xcdb/0x12e0 [ 2074.696966] ? lock_downgrade+0x720/0x720 [ 2074.701125] ? check_preemption_disabled+0x41/0x280 [ 2074.706150] ? ioctl_preallocate+0x200/0x200 [ 2074.710577] ? __fget+0x356/0x510 [ 2074.714047] ? do_dup2+0x450/0x450 [ 2074.717605] ? vfs_write+0x393/0x540 [ 2074.721328] ? fput+0x2b/0x190 [ 2074.724537] ksys_ioctl+0x9b/0xc0 [ 2074.728004] __x64_sys_ioctl+0x6f/0xb0 [ 2074.731901] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2074.736492] do_syscall_64+0xf9/0x620 [ 2074.740307] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2074.745505] RIP: 0033:0x465ef9 18:41:10 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x10}}, 0x0) 18:41:10 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040)={0x0, 0x6}, 0x2) 18:41:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0x10000000}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) [ 2074.748708] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2074.767611] RSP: 002b:00007efd505ca188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2074.775326] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2074.782603] RDX: 0000000000000000 RSI: 000000000000b701 RDI: 0000000000000003 [ 2074.789874] RBP: 00007efd505ca1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2074.797150] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2074.804423] R13: 00007ffdf92ff10f R14: 00007efd505ca300 R15: 0000000000022000 18:41:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0x48000000}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:10 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x0, 0x8000}, 0x0) [ 2074.872009] misc userio: No port type given on /dev/userio [ 2074.890587] FAULT_INJECTION: forcing a failure. [ 2074.890587] name failslab, interval 1, probability 0, space 0, times 0 18:41:10 executing program 2: write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x6}, 0x2) [ 2074.959933] CPU: 1 PID: 26070 Comm: syz-executor.5 Not tainted 4.19.177-syzkaller #0 [ 2074.967847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2074.977203] Call Trace: [ 2074.979809] dump_stack+0x1fc/0x2ef [ 2074.983456] should_fail.cold+0xa/0xf [ 2074.987271] ? setup_fault_attr+0x200/0x200 [ 2074.991691] ? lock_acquire+0x170/0x3c0 [ 2074.995681] __should_failslab+0x115/0x180 [ 2074.999926] should_failslab+0x5/0x10 [ 2075.003738] kmem_cache_alloc_trace+0x284/0x380 [ 2075.008418] ? proc_tgid_io_accounting+0x7f0/0x7f0 [ 2075.013365] btf_new_fd+0x1d2/0x3800 [ 2075.017094] ? apparmor_sb_mount+0x970/0x970 [ 2075.021513] ? lock_downgrade+0x720/0x720 [ 2075.025673] ? lock_acquire+0x170/0x3c0 [ 2075.029656] ? __might_fault+0xef/0x1d0 [ 2075.033642] ? btf_type_seq_show+0x180/0x180 [ 2075.038072] ? security_capable+0x8f/0xc0 [ 2075.042231] __se_sys_bpf+0x10c2/0x3a20 [ 2075.046226] ? check_preemption_disabled+0x41/0x280 [ 2075.051252] ? bpf_prog_load+0x1240/0x1240 [ 2075.055495] ? vfs_write+0x393/0x540 [ 2075.059225] ? fput+0x2b/0x190 [ 2075.062437] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2075.067813] ? trace_hardirqs_off_caller+0x6e/0x210 [ 2075.072849] ? do_syscall_64+0x21/0x620 [ 2075.076837] do_syscall_64+0xf9/0x620 [ 2075.080654] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2075.085848] RIP: 0033:0x465ef9 [ 2075.089047] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2075.107952] RSP: 002b:00007f3602f98188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2075.115655] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2075.122905] RDX: 0000000000000020 RSI: 0000000020000140 RDI: 0000000000000012 [ 2075.130169] RBP: 00007f3602f981d0 R08: 0000000000000000 R09: 0000000000000000 [ 2075.137419] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2075.144669] R13: 00007ffc63b4c40f R14: 00007f3602f98300 R15: 0000000000022000 18:41:10 executing program 0 (fault-call:1 fault-nth:1): r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:41:10 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x4f010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:10 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1, 0x100000}, 0x10}}, 0x0) fanotify_init(0x0, 0x40000) 18:41:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0x4c000000}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:10 executing program 5 (fault-call:0 fault-nth:1): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:10 executing program 2: write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x6}, 0x2) 18:41:10 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x50000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0x68000000}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) [ 2075.242990] FAULT_INJECTION: forcing a failure. [ 2075.242990] name failslab, interval 1, probability 0, space 0, times 0 18:41:10 executing program 2: write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x6}, 0x2) [ 2075.297807] FAULT_INJECTION: forcing a failure. [ 2075.297807] name failslab, interval 1, probability 0, space 0, times 0 [ 2075.314498] CPU: 1 PID: 26091 Comm: syz-executor.0 Not tainted 4.19.177-syzkaller #0 [ 2075.322409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2075.331767] Call Trace: [ 2075.334371] dump_stack+0x1fc/0x2ef [ 2075.338018] should_fail.cold+0xa/0xf [ 2075.341836] ? setup_fault_attr+0x200/0x200 [ 2075.346169] ? lock_acquire+0x170/0x3c0 [ 2075.350160] __should_failslab+0x115/0x180 [ 2075.354407] should_failslab+0x5/0x10 [ 2075.358221] kmem_cache_alloc+0x277/0x370 [ 2075.362383] __d_alloc+0x2b/0xa10 [ 2075.365851] __ns_get_path+0x318/0x760 [ 2075.369751] ? __put_user_ns+0x60/0x60 [ 2075.373649] open_related_ns+0xcf/0x1f0 [ 2075.377634] ? __ns_get_path+0x760/0x760 [ 2075.381714] ns_ioctl+0x288/0x370 [ 2075.385179] ? open_related_ns+0x1f0/0x1f0 [ 2075.389430] do_vfs_ioctl+0xcdb/0x12e0 [ 2075.393328] ? lock_downgrade+0x720/0x720 [ 2075.397488] ? check_preemption_disabled+0x41/0x280 [ 2075.402530] ? ioctl_preallocate+0x200/0x200 [ 2075.406954] ? __fget+0x356/0x510 [ 2075.410423] ? do_dup2+0x450/0x450 [ 2075.413969] ? vfs_write+0x393/0x540 [ 2075.417696] ? fput+0x2b/0x190 [ 2075.420904] ksys_ioctl+0x9b/0xc0 [ 2075.424374] __x64_sys_ioctl+0x6f/0xb0 [ 2075.428273] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2075.432868] do_syscall_64+0xf9/0x620 [ 2075.436686] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2075.441878] RIP: 0033:0x465ef9 [ 2075.445074] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2075.463978] RSP: 002b:00007efd505ca188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2075.471687] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2075.478952] RDX: 0000000000000000 RSI: 000000000000b701 RDI: 0000000000000003 [ 2075.486211] RBP: 00007efd505ca1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2075.493467] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2075.500730] R13: 00007ffdf92ff10f R14: 00007efd505ca300 R15: 0000000000022000 [ 2075.508020] CPU: 0 PID: 26099 Comm: syz-executor.5 Not tainted 4.19.177-syzkaller #0 [ 2075.515909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2075.525272] Call Trace: [ 2075.527878] dump_stack+0x1fc/0x2ef [ 2075.531517] should_fail.cold+0xa/0xf [ 2075.535329] ? setup_fault_attr+0x200/0x200 [ 2075.539671] ? lock_acquire+0x170/0x3c0 [ 2075.543663] __should_failslab+0x115/0x180 [ 2075.548028] should_failslab+0x5/0x10 [ 2075.551845] kmem_cache_alloc_trace+0x284/0x380 [ 2075.556531] btf_new_fd+0x41c/0x3800 [ 2075.560277] ? apparmor_sb_mount+0x970/0x970 [ 2075.564696] ? lock_downgrade+0x720/0x720 [ 2075.568857] ? lock_acquire+0x170/0x3c0 [ 2075.572840] ? __might_fault+0xef/0x1d0 [ 2075.576827] ? btf_type_seq_show+0x180/0x180 [ 2075.581250] ? security_capable+0x8f/0xc0 [ 2075.585413] __se_sys_bpf+0x10c2/0x3a20 [ 2075.589404] ? check_preemption_disabled+0x41/0x280 [ 2075.594431] ? bpf_prog_load+0x1240/0x1240 18:41:11 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x50010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:11 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r1, 0x541c, &(0x7f0000000000)) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0x0) 18:41:11 executing program 1: write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x79, 0x1}, 0x7) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000140)={0x7, 0x7b, 0x1}, 0x7) r0 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ocfs2_control\x00', 0x2000, 0x0) ioctl$RAW_CHAR_CTRL_SETBIND(r0, 0xac00, &(0x7f0000000200)={0x0, 0x7, 0x0}) r1 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) write$P9_RVERSION(r0, &(0x7f0000000240)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.L'}, 0x15) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) write$char_usb(r2, &(0x7f0000000040)="48adf294cefd05307db5d537f8b9abb33fe956ca7a1e994a6aa7a66b5853cc6e6cd891926b23be12d591332c70a3447f5526de5c50c3ddbcc5fb73407bd691d032a23c870203917a1fb1460ef0c02b9816579f86dab36a96c8c4b49d782ad2ca39ecc763963d7eef67c00f1ceadaff187a64f2c964daf8ebf36590cbe80057ae57a33ecfc51b0ddf82401634afb9eb7ce61059d46d3e97d358461f5cc4e506eaed985ab37cc20dd27d2fac3cbb8da67eaf9dacbbfbb50644cd590c591fe7d717bf3ca92ebd23f8794c495fc30631beff336a6582a4e1ea48da42031ace1ce7832c79de56dcd293", 0xe7) sendmsg$RDMA_NLDEV_CMD_SET(r1, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)=ANY=[@ANYBLOB="000000000214014000000000007910fb"], 0x10}}, 0x0) [ 2075.598682] ? vfs_write+0x393/0x540 [ 2075.602411] ? fput+0x2b/0x190 [ 2075.605619] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2075.610993] ? trace_hardirqs_off_caller+0x6e/0x210 [ 2075.616020] ? do_syscall_64+0x21/0x620 [ 2075.620010] do_syscall_64+0xf9/0x620 [ 2075.623822] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2075.629017] RIP: 0033:0x465ef9 18:41:11 executing program 0 (fault-call:1 fault-nth:2): r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:41:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0x6c000000}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:11 executing program 2: r0 = openat$userio(0xffffffffffffff9c, 0x0, 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040)={0x0, 0x6}, 0x2) [ 2075.632221] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2075.651244] RSP: 002b:00007f3602f98188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2075.658956] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2075.666227] RDX: 0000000000000020 RSI: 0000000020000140 RDI: 0000000000000012 [ 2075.673494] RBP: 00007f3602f981d0 R08: 0000000000000000 R09: 0000000000000000 [ 2075.680758] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2075.688018] R13: 00007ffc63b4c40f R14: 00007f3602f98300 R15: 0000000000022000 18:41:11 executing program 5 (fault-call:0 fault-nth:2): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) [ 2075.742973] FAULT_INJECTION: forcing a failure. [ 2075.742973] name failslab, interval 1, probability 0, space 0, times 0 18:41:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0x74000000}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:11 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) connect$vsock_stream(r1, &(0x7f0000000040), 0x10) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ttyS3\x00', 0x1, 0x0) write$P9_RLERROR(r1, &(0x7f0000000000)={0x9, 0x7, 0x2}, 0x9) [ 2075.810786] FAULT_INJECTION: forcing a failure. [ 2075.810786] name failslab, interval 1, probability 0, space 0, times 0 [ 2075.819811] CPU: 0 PID: 26128 Comm: syz-executor.0 Not tainted 4.19.177-syzkaller #0 [ 2075.829899] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2075.839256] Call Trace: [ 2075.841948] dump_stack+0x1fc/0x2ef [ 2075.845592] should_fail.cold+0xa/0xf [ 2075.849403] ? setup_fault_attr+0x200/0x200 [ 2075.853735] ? lock_acquire+0x170/0x3c0 [ 2075.857734] __should_failslab+0x115/0x180 [ 2075.861984] should_failslab+0x5/0x10 [ 2075.865797] kmem_cache_alloc+0x277/0x370 [ 2075.869963] __alloc_file+0x21/0x330 [ 2075.873691] alloc_empty_file+0x6d/0x170 [ 2075.877756] dentry_open+0x70/0x1d0 [ 2075.881395] ? __put_user_ns+0x60/0x60 [ 2075.885289] open_related_ns+0x136/0x1f0 [ 2075.889359] ? __ns_get_path+0x760/0x760 [ 2075.893439] ns_ioctl+0x288/0x370 [ 2075.896901] ? open_related_ns+0x1f0/0x1f0 [ 2075.901149] do_vfs_ioctl+0xcdb/0x12e0 [ 2075.905049] ? lock_downgrade+0x720/0x720 [ 2075.909200] ? check_preemption_disabled+0x41/0x280 [ 2075.914226] ? ioctl_preallocate+0x200/0x200 [ 2075.918642] ? __fget+0x356/0x510 [ 2075.922095] ? do_dup2+0x450/0x450 [ 2075.925639] ? vfs_write+0x393/0x540 [ 2075.929363] ? fput+0x2b/0x190 [ 2075.932650] ksys_ioctl+0x9b/0xc0 [ 2075.936111] __x64_sys_ioctl+0x6f/0xb0 [ 2075.940006] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2075.944590] do_syscall_64+0xf9/0x620 [ 2075.948398] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2075.958540] RIP: 0033:0x465ef9 [ 2075.961738] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2075.980648] RSP: 002b:00007efd505ca188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2075.988366] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2075.995638] RDX: 0000000000000000 RSI: 000000000000b701 RDI: 0000000000000003 [ 2076.002910] RBP: 00007efd505ca1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2076.010183] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2076.017457] R13: 00007ffdf92ff10f R14: 00007efd505ca300 R15: 0000000000022000 [ 2076.024749] CPU: 1 PID: 26136 Comm: syz-executor.5 Not tainted 4.19.177-syzkaller #0 [ 2076.032643] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2076.041999] Call Trace: [ 2076.044597] dump_stack+0x1fc/0x2ef [ 2076.048238] should_fail.cold+0xa/0xf [ 2076.052046] ? setup_fault_attr+0x200/0x200 [ 2076.056375] ? lock_acquire+0x170/0x3c0 [ 2076.060364] __should_failslab+0x115/0x180 [ 2076.064610] should_failslab+0x5/0x10 [ 2076.068418] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 2076.073535] __kmalloc_node+0x38/0x70 [ 2076.077345] kvmalloc_node+0x61/0xf0 [ 2076.081067] btf_new_fd+0x460/0x3800 [ 2076.084790] ? apparmor_sb_mount+0x970/0x970 [ 2076.089210] ? lock_downgrade+0x720/0x720 [ 2076.093363] ? lock_acquire+0x170/0x3c0 [ 2076.097343] ? __might_fault+0xef/0x1d0 [ 2076.101330] ? btf_type_seq_show+0x180/0x180 [ 2076.105750] ? security_capable+0x8f/0xc0 18:41:11 executing program 2: r0 = openat$userio(0xffffffffffffff9c, 0x0, 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040)={0x0, 0x6}, 0x2) 18:41:11 executing program 0 (fault-call:1 fault-nth:3): r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) [ 2076.109915] __se_sys_bpf+0x10c2/0x3a20 [ 2076.113903] ? check_preemption_disabled+0x41/0x280 [ 2076.118930] ? bpf_prog_load+0x1240/0x1240 [ 2076.123181] ? vfs_write+0x393/0x540 [ 2076.126905] ? fput+0x2b/0x190 [ 2076.130111] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2076.135488] ? trace_hardirqs_off_caller+0x6e/0x210 [ 2076.140519] ? do_syscall_64+0x21/0x620 [ 2076.144505] do_syscall_64+0xf9/0x620 [ 2076.148307] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2076.153544] RIP: 0033:0x465ef9 [ 2076.156717] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2076.175636] RSP: 002b:00007f3602f98188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2076.183362] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2076.190624] RDX: 0000000000000020 RSI: 0000000020000140 RDI: 0000000000000012 [ 2076.197885] RBP: 00007f3602f981d0 R08: 0000000000000000 R09: 0000000000000000 [ 2076.205181] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 18:41:11 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x7) ioctl$sock_SIOCADDRT(r0, 0x5421, &(0x7f0000000080)={0x0, @nfc={0x27, 0x1, 0x1, 0x1}, @l2={0x1f, 0x0, @none}, @hci={0x1f, 0x0, 0x3}}) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f00000000c0)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x20, r2, 0x8, 0x70bd28, 0x25dfdbfc, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}]}, 0x20}, 0x1, 0x0, 0x0, 0x40004}, 0x40800) r3 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000380)={'wlan1\x00'}) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000200)={'wpan4\x00', 0x0}) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'wpan4\x00'}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_GET_SEC_DEVKEY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000440)={&(0x7f0000000500)={0x54, r2, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x40) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="010000000000000000000b00000008000300", @ANYRES32=0x0, @ANYBLOB="0c0006000300000003000000000000000c0006000000f0000000000006000a00a1aa000006000a00000000000c0006000000000006000a00a1aa00000c000400000000000000002800000300000000007f0c9aaf2f66cab342b0c7cfb556f3213b25699eb9c760c2a3d2697de7678c68d5a6780508", @ANYRES32=r9], 0x78}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000240)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_LBT_MODE(r1, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000780)=ANY=[@ANYBLOB='|\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00012cbd7000fddbdf251200000008000300", @ANYRES32=r4, @ANYBLOB="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", @ANYRES32=r9, @ANYBLOB="0c00060000000000000000000c00060002000000020000000c00060000000000000000000c00060000000000000000000c000600030000000300000008000300", @ANYRES32=0x0, @ANYBLOB="08000300", @ANYRES32=r10, @ANYBLOB="0c0006000200000002000000"], 0x7c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) sendmsg$RDMA_NLDEV_CMD_SET(r3, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000000000)=ANY=[@ANYBLOB="10dca5cccf72679c3f00000090000000609a201403064e3c4927509524398e67309d5cdd880de0a4ecfd137c866e5af2904fc88e5d6caaa8ab75d6a1a81e173a985900b26c3c0aa2a16834fa567f219a13d291a97b16f7329feaa3d388d7d14b5b1164e62feaa4c573ffb726fd9bc335750f"], 0x10}}, 0x0) 18:41:11 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x51000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:11 executing program 5 (fault-call:0 fault-nth:3): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) [ 2076.212456] R13: 00007ffc63b4c40f R14: 00007f3602f98300 R15: 0000000000022000 18:41:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0x7a000000}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:11 executing program 2: r0 = openat$userio(0xffffffffffffff9c, 0x0, 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040)={0x0, 0x6}, 0x2) [ 2076.293903] FAULT_INJECTION: forcing a failure. [ 2076.293903] name failslab, interval 1, probability 0, space 0, times 0 [ 2076.319558] FAULT_INJECTION: forcing a failure. [ 2076.319558] name failslab, interval 1, probability 0, space 0, times 0 [ 2076.352422] CPU: 1 PID: 26155 Comm: syz-executor.0 Not tainted 4.19.177-syzkaller #0 [ 2076.360388] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2076.369743] Call Trace: [ 2076.372351] dump_stack+0x1fc/0x2ef [ 2076.375991] should_fail.cold+0xa/0xf [ 2076.379803] ? setup_fault_attr+0x200/0x200 [ 2076.384142] ? lock_acquire+0x170/0x3c0 [ 2076.388125] __should_failslab+0x115/0x180 [ 2076.392361] should_failslab+0x5/0x10 [ 2076.396160] kmem_cache_alloc_trace+0x284/0x380 [ 2076.400838] apparmor_file_alloc_security+0x394/0xad0 [ 2076.405095] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.1'. [ 2076.406026] ? apparmor_file_receive+0x160/0x160 [ 2076.406047] ? __alloc_file+0x21/0x330 [ 2076.406066] security_file_alloc+0x40/0x90 [ 2076.427451] __alloc_file+0xc9/0x330 [ 2076.431167] alloc_empty_file+0x6d/0x170 [ 2076.435224] dentry_open+0x70/0x1d0 [ 2076.438842] ? __put_user_ns+0x60/0x60 [ 2076.442734] open_related_ns+0x136/0x1f0 [ 2076.446784] ? __ns_get_path+0x760/0x760 [ 2076.450844] ns_ioctl+0x288/0x370 [ 2076.454286] ? open_related_ns+0x1f0/0x1f0 [ 2076.458511] do_vfs_ioctl+0xcdb/0x12e0 [ 2076.462391] ? lock_downgrade+0x720/0x720 [ 2076.466536] ? check_preemption_disabled+0x41/0x280 [ 2076.471541] ? ioctl_preallocate+0x200/0x200 [ 2076.475943] ? __fget+0x356/0x510 [ 2076.479386] ? do_dup2+0x450/0x450 [ 2076.482913] ? vfs_write+0x393/0x540 [ 2076.486616] ? fput+0x2b/0x190 [ 2076.489807] ksys_ioctl+0x9b/0xc0 [ 2076.493256] __x64_sys_ioctl+0x6f/0xb0 [ 2076.497142] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 2076.501727] do_syscall_64+0xf9/0x620 [ 2076.505521] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2076.510717] RIP: 0033:0x465ef9 [ 2076.513912] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2076.532805] RSP: 002b:00007efd505ca188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2076.540501] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2076.547764] RDX: 0000000000000000 RSI: 000000000000b701 RDI: 0000000000000003 [ 2076.555021] RBP: 00007efd505ca1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2076.562277] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2076.569535] R13: 00007ffdf92ff10f R14: 00007efd505ca300 R15: 0000000000022000 [ 2076.576817] CPU: 0 PID: 26163 Comm: syz-executor.5 Not tainted 4.19.177-syzkaller #0 [ 2076.584707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2076.594495] Call Trace: [ 2076.597095] dump_stack+0x1fc/0x2ef [ 2076.600735] should_fail.cold+0xa/0xf [ 2076.604551] ? setup_fault_attr+0x200/0x200 [ 2076.608884] ? lock_acquire+0x170/0x3c0 [ 2076.612878] __should_failslab+0x115/0x180 [ 2076.617126] should_failslab+0x5/0x10 [ 2076.620939] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 2076.626058] __kmalloc_node+0x38/0x70 [ 2076.629919] kvmalloc_node+0x61/0xf0 [ 2076.633646] btf_new_fd+0x19cd/0x3800 [ 2076.637465] ? lock_acquire+0x170/0x3c0 [ 2076.641450] ? __might_fault+0xef/0x1d0 [ 2076.645439] ? btf_type_seq_show+0x180/0x180 [ 2076.649861] ? security_capable+0x8f/0xc0 [ 2076.654022] __se_sys_bpf+0x10c2/0x3a20 [ 2076.658098] ? check_preemption_disabled+0x41/0x280 [ 2076.663133] ? bpf_prog_load+0x1240/0x1240 [ 2076.667380] ? vfs_write+0x393/0x540 [ 2076.671108] ? fput+0x2b/0x190 [ 2076.674318] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2076.679694] ? trace_hardirqs_off_caller+0x6e/0x210 [ 2076.684720] ? do_syscall_64+0x21/0x620 [ 2076.688711] do_syscall_64+0xf9/0x620 [ 2076.692527] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2076.697720] RIP: 0033:0x465ef9 [ 2076.700919] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2076.719823] RSP: 002b:00007f3602f98188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2076.729097] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2076.736372] RDX: 0000000000000020 RSI: 0000000020000140 RDI: 0000000000000012 [ 2076.743650] RBP: 00007f3602f981d0 R08: 0000000000000000 R09: 0000000000000000 18:41:12 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x51010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0x88000000}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:12 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x0, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040)={0x0, 0x6}, 0x2) 18:41:12 executing program 0 (fault-call:1 fault-nth:4): r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:41:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0xffffff00}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) [ 2076.750927] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2076.758199] R13: 00007ffc63b4c40f R14: 00007f3602f98300 R15: 0000000000022000 18:41:12 executing program 5 (fault-call:0 fault-nth:4): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:12 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x52000000, 0x0, 0x0, &(0x7f0000000040)) [ 2076.812084] netlink: 80 bytes leftover after parsing attributes in process `syz-executor.1'. 18:41:12 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000100)) ioctl$TIOCCBRK(r0, 0x5428) r1 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r1, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000000000)=ANY=[@ANYBLOB="100000000214010000000000000000006fa7e33ec0d5738b070000f382eb9c77990e67823d948aa7bd6530095bc5e12be19f7fa15814cfabe98c0100000001084a74f98d846f72ae49733b55407ec936b9a8d527ff7f0000e0562c9126199528b611cc5fa3b4165afee15e034895aed11cd7c109d5e4e9564e7a44604312aeec59f21d6ae8b7fb793a7dddec2c8a78a090e4f70fe4ccc97118c540ec13d347a97883541b48ef445d3d6e772f5ef901d83e8ccdaf1de8636cbf1a4ebb3ead813ae132774049d1a882755cf45f8afa685c35ec905d8875994f6e604e5e1f"], 0x10}}, 0x0) 18:41:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:12 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x0, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040)={0x0, 0x6}, 0x2) 18:41:12 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) [ 2076.889548] FAULT_INJECTION: forcing a failure. [ 2076.889548] name failslab, interval 1, probability 0, space 0, times 0 [ 2076.953193] CPU: 1 PID: 26199 Comm: syz-executor.5 Not tainted 4.19.177-syzkaller #0 [ 2076.961118] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2076.970475] Call Trace: [ 2076.973078] dump_stack+0x1fc/0x2ef [ 2076.976720] should_fail.cold+0xa/0xf [ 2076.980534] ? setup_fault_attr+0x200/0x200 [ 2076.984864] ? lock_acquire+0x170/0x3c0 [ 2076.988854] __should_failslab+0x115/0x180 [ 2076.993102] should_failslab+0x5/0x10 [ 2076.996914] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 2077.002027] __kmalloc_node+0x38/0x70 [ 2077.005843] kvmalloc_node+0x61/0xf0 [ 2077.009568] btf_new_fd+0x1c49/0x3800 [ 2077.013394] ? lock_acquire+0x170/0x3c0 [ 2077.017379] ? __might_fault+0xef/0x1d0 [ 2077.021364] ? btf_type_seq_show+0x180/0x180 [ 2077.025788] ? security_capable+0x8f/0xc0 [ 2077.029955] __se_sys_bpf+0x10c2/0x3a20 [ 2077.033945] ? check_preemption_disabled+0x41/0x280 [ 2077.038972] ? bpf_prog_load+0x1240/0x1240 [ 2077.043214] ? vfs_write+0x393/0x540 [ 2077.046935] ? fput+0x2b/0x190 [ 2077.050142] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2077.055514] ? trace_hardirqs_off_caller+0x6e/0x210 [ 2077.060541] ? do_syscall_64+0x21/0x620 [ 2077.064526] do_syscall_64+0xf9/0x620 [ 2077.068342] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2077.073540] RIP: 0033:0x465ef9 [ 2077.076751] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2077.095654] RSP: 002b:00007f3602f98188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 18:41:12 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0x2, 0x0) 18:41:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}, {0x2}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:12 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0x541b, 0x0) 18:41:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}, {0x3}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:12 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0x5421, 0x0) 18:41:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}, {0x4}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) [ 2077.103369] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2077.110641] RDX: 0000000000000020 RSI: 0000000020000140 RDI: 0000000000000012 [ 2077.117916] RBP: 00007f3602f981d0 R08: 0000000000000000 R09: 0000000000000000 [ 2077.125187] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2077.132465] R13: 00007ffc63b4c40f R14: 00007f3602f98300 R15: 0000000000022000 18:41:12 executing program 5 (fault-call:0 fault-nth:5): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:12 executing program 1: arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x8001) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000000)={0x42, 0x7d, 0x1, {0x0, 0x3b, 0x7, 0x7fff, {0x0, 0x4, 0x6}, 0x40000000, 0x1, 0x7, 0x0, 0x1, '*', 0x3, '-{-', 0x2, '#&', 0x2, '}-'}}, 0x42) r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) write$P9_RLINK(r1, &(0x7f00000000c0)={0x7, 0x47, 0x2}, 0x7) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0x0) 18:41:12 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0x5450, 0x0) 18:41:12 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x52010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}, {0x5}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:12 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x0, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040)={0x0, 0x6}, 0x2) 18:41:12 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0x5451, 0x0) 18:41:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}, {0x6}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:12 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)=@newneigh={0x48, 0x1c, 0x300, 0x70bd28, 0x25dfdbff, {0x1c, 0x0, 0x0, 0x0, 0x2, 0x10}, [@NDA_SRC_VNI={0x8, 0xb, 0x1}, @NDA_MASTER={0x8, 0x9, 0x8}, @NDA_PROBES={0x8, 0x4, 0x1}, @NDA_VLAN={0x6, 0x5, 0x3}, @NDA_LLADDR={0xa, 0x2, @broadcast}]}, 0x48}, 0x1, 0x0, 0x0, 0x4}, 0x80000) 18:41:12 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x53000000, 0x0, 0x0, &(0x7f0000000040)) [ 2077.317181] FAULT_INJECTION: forcing a failure. [ 2077.317181] name failslab, interval 1, probability 0, space 0, times 0 18:41:12 executing program 2: openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x6}, 0x2) [ 2077.398438] CPU: 0 PID: 26246 Comm: syz-executor.5 Not tainted 4.19.177-syzkaller #0 [ 2077.406366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2077.415725] Call Trace: [ 2077.418369] dump_stack+0x1fc/0x2ef [ 2077.422011] should_fail.cold+0xa/0xf [ 2077.425827] ? setup_fault_attr+0x200/0x200 [ 2077.430159] ? lock_acquire+0x170/0x3c0 [ 2077.434151] __should_failslab+0x115/0x180 [ 2077.438409] should_failslab+0x5/0x10 [ 2077.442228] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 2077.447349] __kmalloc_node+0x38/0x70 [ 2077.451165] kvmalloc_node+0x61/0xf0 [ 2077.454889] btf_new_fd+0x1c6c/0x3800 [ 2077.458708] ? lock_acquire+0x170/0x3c0 [ 2077.462694] ? __might_fault+0xef/0x1d0 [ 2077.466783] ? btf_type_seq_show+0x180/0x180 [ 2077.471205] ? security_capable+0x8f/0xc0 [ 2077.475372] __se_sys_bpf+0x10c2/0x3a20 [ 2077.479364] ? check_preemption_disabled+0x41/0x280 [ 2077.484392] ? bpf_prog_load+0x1240/0x1240 [ 2077.488640] ? vfs_write+0x393/0x540 [ 2077.492359] ? fput+0x2b/0x190 [ 2077.495567] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2077.500943] ? trace_hardirqs_off_caller+0x6e/0x210 [ 2077.505975] ? do_syscall_64+0x21/0x620 [ 2077.509967] do_syscall_64+0xf9/0x620 [ 2077.513785] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2077.518981] RIP: 0033:0x465ef9 [ 2077.522185] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2077.541093] RSP: 002b:00007f3602f98188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 18:41:13 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0x5452, 0x0) [ 2077.548815] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2077.556093] RDX: 0000000000000020 RSI: 0000000020000140 RDI: 0000000000000012 [ 2077.563372] RBP: 00007f3602f981d0 R08: 0000000000000000 R09: 0000000000000000 [ 2077.570644] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2077.577917] R13: 00007ffc63b4c40f R14: 00007f3602f98300 R15: 0000000000022000 18:41:13 executing program 5 (fault-call:0 fault-nth:6): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:13 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x53010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}, {0x7}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:13 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1, 0x70bd28}, 0x10}}, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000200)=0x3, 0x8) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040)='gtp\x00', 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r2, 0x1}, 0x14}}, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) getsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000580)={@mcast1, 0x0}, &(0x7f00000005c0)=0x14) sendmsg$DCCPDIAG_GETSOCK(r3, &(0x7f0000000640)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000600)={&(0x7f0000001480)={0x149c, 0x13, 0x300, 0x70bd2d, 0x25dfdbff, {0xb, 0x1, 0x1f, 0x0, {0x4e24, 0x4e24, [0x8, 0xb1, 0x40], [0x2, 0x3, 0x6, 0x400], r4, [0xfffff801, 0x9]}, 0x1, 0x9}, [@INET_DIAG_REQ_BYTECODE={0xca, 0x1, "02c1355cfba0dcd29d5e73052e75b98aa3a318ae8f22d9a9e72b7da346b81c6f31d47a02e8e3bda393dd6ff946faf447a01d112cc4abe98e74932106d9cc0f18cd5c00390d8d1e120fc396180bc817c8f8bbb14157667b26132bfedad1d7ff8ea62f93197f9d441dc86a9dc6feaa76ed9564614d8081273f23dbf90ba6ba85383586ccbbda119a8d938694c34185efd9d98422c7732011d92ba12b0808b02ac02ccd3be58531b8b00b237344d4402330443ab8779a39740ab9a90a14595c01d2790c9c2d9149"}, @INET_DIAG_REQ_BYTECODE={0x1004, 0x1, "dde8f5bb4b81da7882de3ec76a8a70afed410376c7ceb9f81a31cc012f6603837849dd0813bb7284e034c8c50def0aedbdcda4431b5f0872ec81d504f5feb5d5e60cd714c380522153e1b95937b62360dbe7e4a898a53ea00235474ae9c496d92569082d112ad88d315d1cdf5ffa17c66f38884465c0015f8b8ce9f0b27bf2e932fa0cbb2d50c63dede0f575252a091a846d9e60671748a71381363eb85d127258efa1b52305cf901445c8a87bf9f5a08d4b747e4aa77c3f01d4dd10fc5a60fd8f01b14b10656e959291a50bd240aba37f3705616670b947f5511961e5ed7a0606505591b128e35f428b9954fef3a5cda3c44dcb3a61c5a96bb0e7731f65b491fda6d21e2601ff3ba5fc144ace4a122cee4910739084bac5f7fd6e42a5dfe27bdcc08e8cc012572c3c3c9cb427dd3692e359173f5ccf00e986388f224a85a1fd4985cb27ab080dd6fdb9181e6c4eeaeaca6c873238106650b6b960c7d9e98a104e1dc029ca0096d49166ebaf7812334d454ad82980b07d6af16ee84477ffeb772eee8e6aa133c28043170c0de997c36af676c00f7d62adc1ddcab392d3982f388f3ef742047fc6d8caec2b1e6a3601582a755fd28a9e07b873d1e85b85ebf23c9b8193159b5cd340eaea6351a31e6139c99f1a7ea8119f7b22b1a3b4ce6859b76b9700fd1c17b110ad70782d8ce4c84bdd06dffbc0454263fd87a962bf9bbaa47719b2e2309bae462a92ef0a4f18705b4b82de07a5f2bcd94d4089a8d0620d53b2de22e9f8b34b2ee508d799e3d0e8eb2b0680ba5afbf7dc5df5eda7d79a220ad2078a5c7915479b22fb4248cb5599fb594a58453347369f1ff13128d1f372c7d3c028d3b31288e92ef580ca5249997752529388f884f9b1055d671a157c96ac962353ece4f3345d9eba33f53481eda945d332aac9a9a6ae01191c020c9f6ca976ce8b8490cf8400a39724ea49f7f80b2074e78fe7421fc80e113715e2001026c233a271fd622c391590b147569cb2627523c5f9d59dbb5ecdd4da16cd96089333d65a47cf6f4f8d5b1726c8ded882de240af7671565bfc492e3ae308a9e56203b7ebb030090d557a8c62f245bb53c48f0ec98fd89acdbaf1b07a2ec65af15005cfdceef6d13874e6af24b5ce97b058d8ab740895ab1fa407fff69bd865ed7ee3b819731e33e5b3a68f74aeb9b7d68c5cf1fd2c4bd3fbeb24b0a6e61ad7fe796a12c697f463383dc9b333bff73e41f6111e333b9576dd87fe79c3825aa35c47538e0de539a4fb035eea1118ef84c0e7a06ae63b0bce4dcba962ddc7e7ad57f362e11faddb2d77fa3671a388950f6893716fe00c494f7203bb9035ffdd3d3074728e09db1907e16b12ef9c1af27164d56719b5c23217acc1ea7fdd528474114e051038d672c981eff76d9e2c4ad9000ff0af4e6d8aa7d312d570faafa610e11121d1b4dfce7db3e89b1bd0218668bf781969a5145a2084849289021b5104df2d7ca830234595dedc5997e59460bc6e9df9f767c77010c8faa000ea61ac4423271258bb55da00cc1a7b0f72cf6a14ea9b4f41b7d577625a159c111590a875622e0df810203606b85e9443b14bd7a1edb321980330e72020dd01c25dc0b618137d13f34cd2c6ca29cbd88be361cf69220f07bb89a394f912c0d2adb49e9291b57e081910adcc5037fffb5d975a7d314d1d88087562e25e9769f9599430a7cc2be5df73ed1b3d71de04e303aceb2466c4b5999bc68953589301c0e9614d62bbec3e479c587411655d86bd8daf309aa34ea5ab383ae5610d246201993dcef631a3a77cd957876a72f7dd5c47bf9f3f25919328604ab353e07a34d9be9d2e41976b2b9b5380b4fa8ce415dd9dad87852c2b067fb907cd8d115bbbb9a749526dc135a1db6fabe4ce75199ebc227d684f34721567c1df2cac260d1548b5f28b795f76fe433b01e7de84c7c4920f136b4bfc39e12cd787e8cb03b1aa0f1e727796d901f372fe870a122fa5178c26881c586670ec28980bd28dd66e31bbdf27bbc7acd815c7212ea7e77abcc940474c7e46791e126ff5455c81b84b5cb09243b2327baab7204e9069d61a8c611d3d098b7ee9c23d0412bf72921af9dc8eb685f79e70be18339781002e5e5be1ebd20240d233938c993dc754426f3106f98b5586dde296a196bae61612e9076ae3a511c2ce6ed515075ce590d6dc76a37d82479cdc7f9a1421224b53cb355b8d2465c98fafa67cc2455115c2dca75ede95baf021fba67a2016b88f7a970ef1532947d3842b6dd1264119cd268c9197ef1fa6d213793055a3e72c919d9a501e983128d778e428c78057f85f6c0863095a5da42a74602b29b6895cfacd8e99d01b41f4a2d3240566fbfaeac5f71adb1a4528669834608b9d9344d3edd5e349f0d9312e9e91d0b23817677ef6a61a418058ea55e7e4e3a8971c1a80257b633a16efa061de2b54202edc4f338f8799f6e79e237afdbfa38266d63050e5763ccbd6d26862184550b07fc5d3cd4b1609411f3e9fa06094e297a1ab95b9db93b47a5f2c6480e5c2c81af01eba0c2dc874aa42f0c477e5b98efa54a498e4782302b4e169b71a7d6c03913533bfe7bbaebc5e371c6685b33c4b8be4b46e9dd537382a3e0c6c34eb8ac54a4c1568519df087bb7102fc5716d9c5df155e0f98a137a9747ee436df3601391ac37e1421efe58e0494e846ce5719105f5462d3e8bd49e8fc78e6f80b2bafa08b21a96f811a77eeea5599b28b4700a469b7325b96cf846c2479c67795ced768d291055514008a0be05f398f33aa17e147a08b527956d52ad21622580dc123e12d99b3f39278e07f14e425fe12e974f4661391dac63d91b73f1e63c4bb974626247e8f7e3c23635caafd92a1802defe228d636e6f2652290b61a5f85ec1eb70e00aa01a0db166d5c0fd71fcea843283e72d2206d5a75f3d2f10b602dce0354a3513758b758670a4dfc8160203d120bdcb1b968db30e7e9fd184022fe78d6956fdf087de235e2179669312797b1cbc97d5bfbe2d05e77a0d98f2654a80e19e538aaf41caae53978141027fc768e6c0280d33ee4905f85ab2ad981b95e104e06cf8d2199b3f9ab89f137cb0ea1e82d27461abb4861ff0ba186e03d7ed1961f727e859ff85c28cd4c160413897d49b94807be867821f6a19aea1a88806256ac9e40b8d80883a1d55f38243c73c67272214f1ae41310ee6ff78a5f20261a90f61d8a6b520e8c90cd487cd18446ca5ceff7d1c3b7b3635c1216bd4d743eb14011fea22a404da5dda88f64211ef4b56dd1026fa51cc481c65679a762ef8781acc3a7486d4f1153fce21ffaca9f3edb2b8db6e70a2777a9acde93c614cee9d2488262cc4c778d361656f13b0c46efc36f1db92d018aae27cdd9a681f59595b87d7493e46d7ab5ff0e16ec5b2c8feadc9dc7a8df8d4f8d0123183c3cf589df06e3ea7fa3b606eedc5bfe41f961f5f84f014c8982a44190278930d3b42f3427439d62f271923023aa0fef836cf7e329d5f86fd55183d39f90fd6066c084e85a68a35af262db2c9aaa11ec2faf8ef2df4eb97fccfd951bbbf140fbbe4bb11b347ef22222bc70b443a43b664ed1dfe8e2b161a19a7731adbda54c25397cf6a7fbdc992458da62c91cc763e61e070c8703626b58034652b592b70ca2c3518a4376f28691b23ff95910670ab6c58e8b98dd9a7b11c80d6c0f29e7819e994f192e53ea6261b3eb559995b3dd102b3eb3b77079f028749b92835e8f9b48f7a7456bdccbd2261bb9d7132b894e3b25a66905543e0b95b306b69de80064f1e9ed668cadb8eff26afa06e606e5682d5628be65aa1c28ffb7216d2ed21fc435fb5a4984f46115a6ac689b2233d61990c74cf556dbd91f56d05e6d75107211b0c902935c8b37ffdda87045a08e84ca757486f8715ed8d4b5dbc591cfccfa3fbd1709314850ef9cb03f4a2f3edfb59ccaecf616cfbd1c9c19683d77c91642afecfd2f1f4eca78c0e410200739f9e672983b3d8080153595e13c0750eafb13690ec0288f9ce96a1f0998bc1e5b39348c5bdaf79dfe19e974a7d0cd141c69fec6f23124aeb1b37e9088ac335f7a8bbaa4da0b6ad35ff8a0ca6a33779308fcf1c5e3cd68b2f278b09bfeca9edbe0293c282abd18c64a214a9ce485c0d69ba4f1dfb7d29885e096f101a2ee1055d7f1d4e284fcb47c9567c93696d975218e8fb3b40bf37af7a837e29e9bbc03a8ea54f876b57107a12948537edec3bdf3495a01afb022bcd28b1f495da34b4dc913641e990e0be5828e29290f98ad35cfd2a1a19cf6a27a00c78832b3446991dc70ac28f881b6790f2987623c2642e38bbf6668e6708f1c3a4e034a8f9e8afa7dab6316322349e5024924b2e8a635a3f3a6daf746d968c015eae8b88088441733fb850cff98ae5f2b6eeb92d9dbf73dd7da4c7a204aa78c02c26d0c1ba764518167b0a56515d4010d816315103b0fedd11d2fc7dfde570202cf3c81d51334a630bfd060d7d3ead9efc654d4189f351d446e9725defb7c376c3d4ca7dc5f148f19e6f2afa8a5365e21637b0212d9a05a1f7fbf83638bc405d2c07fda3afa722f0ec7326cc3df3ab7227812381b03275e870779f0316e6cb6638de52a799a989ac11ec2983cc5668bc236c91aef10ba01eba123d91082eb62723037191b7a92b41bd6b809def32f60dfbae3b1227a75c6b0be90606ef3ebf00df39aad08d89ede05bf857009adcd7463062722916fecf86f8e1d84c6fb35ed419d71148091268b44723b957cbb60514164b3bd7e6c5dd5e700e5c4ba0691ef978c4e88431916266ca79fe9451d30ce4bcfdf091573e4dc1a97aa60825234f35fd80a3409205b0727daf392501b0bd78217f4c263012a85812bc3496fa80c7a76c92073eda14b53788da32381b9f31a257626b15fbd1c389b83e5c9a1e9d9e50fd4d20b9acf0cffc4ab3a545d7ef69765cb613a347e6215380bb8f8409147fda99b28be26e5a2033eb033921afe87230094c8820f0f5b7f366610a2400f6dfc6c5927dabddd311fd9dd86165e0d3757f7da097daff4efb432ab8a6c05c26e270917ad724cee7e2ea115a71715dffb9d194657197bcc9682176fb135303c6aa00f724f74c5ecbda61bd3aca682d2e0c86b7ac670ad3dc6f65df613c89c2f357128d9a77701d7fe3a568329ee46608f91192eee7abe860ca1d5c3107669d4296b0c5f0a6e97a07e52777dbddc93dc47473c749af2da4ed44ebdf2c23a6bb8eb11c26ad0855ab7286e811638b2d21df737d9626c0a4fe4df233dc507d36e394605dc82723268b40ead905c295adf75eae76672f9e2369aacde1ce4631a22a470f966925d364d6924a2c5186c90dc3b7b37c40e7f314d6c02f661c5d6029d9725e3504d4c94d1138e75662915c957866d9f5fe76b4aa45e27408f8950f99222130a1867a444682223fe8b65085e4b4079909f2b5fb885643d05261b15e87572966f1b0e70d0b4146757a0e9f7fe0aa6b82cd6d89d3e958fee99573facbd296e355308a283d1eb3ff1d2cd05ffe2cbcb90052c0c8ad9e1879ebee8f6e388d222608d94a3cbe7534d6402616b432a2427588c612371abce7498ede0950274d7c9b988e4ad891b83f0ca18b0e9884ef5dc1a3c8676284ee1b88d0f6f76eae2c973fd9eb427eaaf23660b4bcacdae4ce09ef791c5bb9b97b64d9019354abcabad14694abf70a703129191d4a90076c3253e8c03116b64c04777fea5de9851dc38d8a5f200f4726ce298cf7b7414e967cc90a15b59770e9c41fd4c2a094bf2b"}, @INET_DIAG_REQ_BYTECODE={0x47, 0x1, "1f2f609b15dfbebc9ddbe7888c978d589a1e8b2ca476bfa446d48ff934e232bc7d976ae27676bb559bd20e70ca596f3d3807fd01f839dcdc18c47fd689324860ea34b0"}, @INET_DIAG_REQ_BYTECODE={0xd8, 0x1, "5faca60b63d2d021033d6daf4247e577205b529e2992cc98ec7b86fa64fc4900e0968cdbf89c3ebcd47b3e9df8b72229073568ec7680eb0a847887c2aa4b18d4b8557b89224f3ab2e36595af7180ed4a2247e2b4d33063ded3a26efe2e39299552153491506bd92a299352017e10eeb3418210a0a03e0c01a233824901796e3174077e46ba5bf4a737141e6d04fc77b4ae28c00504e6df1e0cf777fd67fcc075b23fa30008f546cfec241c1bbfd307be8579102967deddbb96750409aec762296d23d9e08d1e06e243980b68f6ae05ed40062f98"}, @INET_DIAG_REQ_BYTECODE={0xf9, 0x1, "1d77d1c7466d539746acb0221ab0916e2a12dd9319b6c5ac80ceff5d4307861936e94e9c6d38ae3ce5af7f31be14957a933171f41c7d6e81cdd6adea4d1468855fac97f9976a5cd562eca81c47c82043be564cc6ada88838bff3cda9834cc815c1b4180656a109b2a1ebbae309bef3dc7671581e46e4a74e38d0b9ad7878d19764b3db42e0eb77de00e30794f9107deb1c59edbda76223753c3c6a9ba898a05e6a932794c4205683f79966b27627be8a7d11280ac9967ff1a317d4053486607721c0f81295fba40ce963cd6c49640d278048f35e6a6fa1497f7dec4a74f1c22284d0d86baeec8c8f698946c2979736fa4e069d0273"}, @INET_DIAG_REQ_BYTECODE={0x90, 0x1, "842977136cb228b387b5711f94efefca38b7ff31767408d4ba4c6431e022a6ccbf6a407ebbfa21c91ee2af328eb6958497cd2ccca5eef889e35b99b2e0529c86c250ee75308f72f02d92f864f70e656406846ca0942ad56c3c406cf9550a451e6499df3203ba3511a26180b6f80218620be18b49ca0efb91f41f1b21df3bd3341acd3e6fb04572f8c6f2a590"}, @INET_DIAG_REQ_BYTECODE={0xd2, 0x1, "7bb53e47a7fac1b90146ca7d2a75d32ce68b03e5805637bd88f8b05134d9a9587c13defb624a49becc55bf706d1951bdfb9f454c285d40df81ebfa7ac6670fb718ebf5269241e55db74286c0bd94314a1c067c25ae811df4bd84d6dbcfe8c5749d84142403e0c61fef6e9c2f09c853c439cbb9434f7f0b34e735638524c9802b618b32d9b7252b3c6499e099f3d5a957c3f6a873dc049530ffa3d4e12b9b138f56649ad6baf5d1dd672943b71e73625363a1d1ae9cbfec0cc8bc8bc1dfbb8da4938681998620f51bd2fe93903066"}]}, 0x149c}, 0x1, 0x0, 0x0, 0x4040010}, 0x890) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18}, 0x18) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f00000001c0)={'wlan0\x00'}) r5 = syz_open_dev$vcsu(&(0x7f0000000280)='/dev/vcsu#\x00', 0x7, 0x11b182) sendmsg$DCCPDIAG_GETSOCK(r5, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000340)={&(0x7f0000002940)={0x22d8, 0x13, 0x400, 0x70bd2c, 0x25dfdbff, {0xc, 0x3f, 0x0, 0x4, {0x4e20, 0x4e20, [0xffffffc1, 0x1000, 0x8001, 0x9], [0x7fffffff, 0x8001, 0x0, 0x11], 0x0, [0x80, 0x8]}, 0x200, 0x1}, [@INET_DIAG_REQ_BYTECODE={0x1004, 0x1, "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"}, @INET_DIAG_REQ_BYTECODE={0xe, 0x1, "20655ce74439fd008d9a"}, @INET_DIAG_REQ_BYTECODE={0x98, 0x1, "bbb8806b4b0cc91650811f2a052ae2535d5cc2b7330924bb7d2210e4c169684c502f7ae18ce5d5bfba74d52f2ba5fd652bc04cb4255bc0f5a61ba37bdfbc84f460a50bb0ac459acb4245a247505218ab81246590c9a14ca6855ec0599f8eb0e7bfb096bc011c062a0851d191be812fb1a0da14145a55e225a2bbbab1541e51cc3a129e39f150d59bdf2770aa7e87bbb9e9ca60d8"}, @INET_DIAG_REQ_BYTECODE={0xc8, 0x1, "deda54d2ade0ef41d9b4ab27fd7e292e2882c0d1d7567b025f4355f9e052eb5e52f20443732a471ddfc7665f4b5b74c1a243b8cec62e5abade0cbf8e614ca3b92592e4aae0ce809d773b697036c549b5d717a55d0d7ef5480142095c421ba00d642d259e82fc8a342f40625d0b488c18cd6ce4ea08069914d0f7e4266d50df724c30ef29252c7d3cbb142c27106299602f6f4be45eab5de09abd76f91392b1673c34333758641243400f275bc7665d8775b48d4374499e2c1187215b0ea013e8b74a4a35"}, @INET_DIAG_REQ_BYTECODE={0x46, 0x1, "3399adb33817011b61c4dc0ed701575e63f629aa54a59ff2b892fc6b82972d2b40faa6f780dbddbccbb67f705c19cac33c359ddc83a13bbda984153320a171e88bc9"}, @INET_DIAG_REQ_BYTECODE={0x1004, 0x1, "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"}, @INET_DIAG_REQ_BYTECODE={0xcb, 0x1, "df05089688babe462c70acedf6b5026d0e4e7136f135e41187c9cc77afca77f77114eb75a6925811663053dc1a96d4eec37d7674c3309bdc5ba758bca013167e3e293308362d3ca30d61cc521bccd29d0bbc514509903c19d80143502f9a3472d650380afb5d9364af2ee1396f7c732dd716147c3b07e30e61465a42f7323984083e40e6c291a3d2560a2cb18ad118b8d7eaa8822c3d957962d108e310338e72fcb660228ca3a9bd80448e640d14b33dfdb0117c881e466955f2f20d0aa566161f94743fc23bb7"}]}, 0x22d8}, 0x1, 0x0, 0x0, 0x20000080}, 0x20008014) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, r2, 0x2, 0x70bd2c, 0x25dfdbff, {}, [@GTPA_MS_ADDRESS={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @GTPA_VERSION={0x8}, @GTPA_FLOW={0x6, 0x6, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40004) 18:41:13 executing program 2: openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x6}, 0x2) 18:41:13 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0x5460, 0x0) 18:41:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}, {0xa}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:13 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x54000000, 0x0, 0x0, &(0x7f0000000040)) [ 2077.703383] FAULT_INJECTION: forcing a failure. [ 2077.703383] name failslab, interval 1, probability 0, space 0, times 0 [ 2077.768208] CPU: 0 PID: 26277 Comm: syz-executor.5 Not tainted 4.19.177-syzkaller #0 [ 2077.776128] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2077.785490] Call Trace: [ 2077.788105] dump_stack+0x1fc/0x2ef [ 2077.791751] should_fail.cold+0xa/0xf [ 2077.795566] ? setup_fault_attr+0x200/0x200 [ 2077.799900] ? lock_acquire+0x170/0x3c0 [ 2077.803893] __should_failslab+0x115/0x180 [ 2077.808142] should_failslab+0x5/0x10 [ 2077.811963] kmem_cache_alloc_node_trace+0x244/0x3b0 [ 2077.817081] __kmalloc_node+0x38/0x70 [ 2077.820883] kvmalloc_node+0x61/0xf0 [ 2077.824606] btf_new_fd+0x1c8f/0x3800 [ 2077.828424] ? lock_acquire+0x170/0x3c0 [ 2077.832409] ? __might_fault+0xef/0x1d0 [ 2077.836399] ? btf_type_seq_show+0x180/0x180 [ 2077.840824] ? security_capable+0x8f/0xc0 [ 2077.844988] __se_sys_bpf+0x10c2/0x3a20 [ 2077.848978] ? check_preemption_disabled+0x41/0x280 [ 2077.854001] ? bpf_prog_load+0x1240/0x1240 [ 2077.858248] ? vfs_write+0x393/0x540 [ 2077.861974] ? fput+0x2b/0x190 [ 2077.865180] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2077.870563] ? trace_hardirqs_off_caller+0x6e/0x210 [ 2077.875590] ? do_syscall_64+0x21/0x620 [ 2077.879579] do_syscall_64+0xf9/0x620 [ 2077.883394] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2077.888589] RIP: 0033:0x465ef9 [ 2077.891796] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2077.910706] RSP: 002b:00007f3602f98188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 18:41:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}, {0xc}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:13 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x54010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:13 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000000)={0x68, 0x29, 0x1, {0xffa, [{{0x4, 0x3, 0x7}, 0x1f, 0x80, 0x7, './file0'}, {{0x80, 0x0, 0x6}, 0x6, 0xff, 0x7, './file0'}, {{0x20}, 0x5, 0x8, 0x7, './file0'}]}}, 0x68) 18:41:13 executing program 2: openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x6}, 0x2) [ 2077.918421] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2077.925694] RDX: 0000000000000020 RSI: 0000000020000140 RDI: 0000000000000012 [ 2077.932969] RBP: 00007f3602f981d0 R08: 0000000000000000 R09: 0000000000000000 [ 2077.940266] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2077.947544] R13: 00007ffc63b4c40f R14: 00007f3602f98300 R15: 0000000000022000 18:41:13 executing program 5 (fault-call:0 fault-nth:7): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:13 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) 18:41:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}, {0xe}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:13 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$MPTCP_PM_CMD_GET_ADDR(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x48, 0x0, 0x201, 0x70bd2b, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_ADDR={0x34, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @empty}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x5}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @private2}]}]}, 0x48}, 0x1, 0x0, 0x0, 0xe60439d725957fe1}, 0x20000880) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0x0) 18:41:13 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, 0x0, 0x0) 18:41:13 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x55000000, 0x0, 0x0, &(0x7f0000000040)) [ 2078.142212] misc userio: Invalid payload size 18:41:13 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb703, 0x0) 18:41:13 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, 0x0, 0x0) 18:41:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}, {0x10}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:13 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x55010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:13 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)=ANY=[@ANYBLOB="10e200000300eba01ead0000000000"], 0x10}}, 0x0) 18:41:13 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) [ 2078.260762] misc userio: Invalid payload size 18:41:13 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, 0x0, 0x0) 18:41:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}, {0x48}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:13 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb704, 0x0) 18:41:13 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x56000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:13 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x2080, 0x0) r2 = getpgid(0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={[], 0x7, 0x21, 0x220, 0x100000001, 0x6, r2}) r3 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ocfs2_control\x00', 0x404c20, 0x0) ioctl$RAW_CHAR_CTRL_SETBIND(r3, 0xac00, &(0x7f0000000180)={0x1, 0x7, 0x0}) ioctl$RAW_CHAR_CTRL_SETBIND(r3, 0xac00, &(0x7f0000000000)={0x1, 0x7, 0x0}) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000400)={0x5, 0x2, 0x16, &(0x7f00000003c0)="611ce915b6c4877fab5cd2218b6bbd7e7d1f9dba82df"}) ioctl$NS_GET_NSTYPE(0xffffffffffffffff, 0xb703, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_SHORT_ADDR(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x28, 0x0, 0x100, 0x70bd2c, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}]}, 0x28}, 0x1, 0x0, 0x0, 0x20008000}, 0x4004045) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x10}}, 0x0) 18:41:13 executing program 5: bpf$BPF_BTF_LOAD(0x2, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) [ 2078.373937] misc userio: Invalid payload size 18:41:14 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:14 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x56010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:14 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}, {0x4c}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:14 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:14 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb705, 0x0) [ 2078.421130] blktrace: Concurrent blktraces are not allowed on nullb0 18:41:14 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)=ANY=[@ANYBLOB="2c42cf0e0000fcffffff0d000000fb14"], 0x10}}, 0x4044050) 18:41:14 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}, {0x68}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) [ 2078.479499] blktrace: Concurrent blktraces are not allowed on nullb0 [ 2078.504526] misc userio: No port type given on /dev/userio 18:41:14 executing program 5: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:14 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x57000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:14 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0x2, 0x0) 18:41:14 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}, {0x6c}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:14 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000000000)=ANY=[@ANYBLOB="100098000214010000000000000000001121e9e812cc0392896ce488ad36e389d7491e3de07a1ae2f5408795d5458f6d7a6e99141e201a09684718ea0e7294c4b4064742d127e7c25ba73debb65b931f124d552753a67824006db87b59ef4e176f0a940b6754a480e57ea73e03b657c49ded5ea5e8c2cca3a90c59e3a1e71d12a9ce805165574811c724e8c2568a8f9d0d4e37ba6c3df7e23366be43c85212d2d5d27147d7cc4fa28a9b92e54861c804474d4d5d8c7499f32ad48fed230e7002228580ae60bc7f67953c881f86fffc5093a76bc5bcb808f36018b63a6d40ea305abe63e423cc3df345b0a94e00ad16dc40e55500"/254], 0x10}}, 0x0) 18:41:14 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0x40049409, 0x0) 18:41:14 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x57010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:14 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}, {0x74}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:14 executing program 5: bpf$BPF_BTF_LOAD(0x5, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:14 executing program 2: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x51010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:14 executing program 1: syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) sendmsg$RDMA_NLDEV_CMD_SET(r1, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001380)={0x10, 0x1402, 0x400, 0x0, 0x25dfdbfb}, 0xfffffffffffffe29}, 0x1, 0x0, 0x0, 0x4000}, 0x4840) 18:41:14 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}, {0x7a}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:14 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0x4020940d, 0x0) 18:41:14 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x58000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:14 executing program 5: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:14 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000080)={0x7, 0x4b, 0x2}, 0x7) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040)={0x0, 0x6}, 0x2) 18:41:14 executing program 1: syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f00000001c0)={0x30, 0x1402, 0x100, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x80}, 0x48000) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x30000281}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0xa8, 0x14, 0x20, 0x70bd2b, 0x25dfdbfc, {0x9, 0x1}, [@INET_DIAG_REQ_BYTECODE={0x33, 0x1, "0cb1a94028bfd9eab4c0ab15d5df75ca19675afd87162369c9c011ecb4f86cdd7026f175fb6313c07568a4328e1005"}, @INET_DIAG_REQ_BYTECODE={0x5f, 0x1, "2e19b96bbd09741c88383b827db4ea968c338734790f4960a8f694f703ad50b59e23cc7e999083e156baad9037c548e3d5a7a5447ced84317bdb5f7b6ac06f3e1fc1652ec87e5d4b8cd3981122a0048975bd714ebdfbf90e425113"}]}, 0xa8}, 0x1, 0x0, 0x0, 0x24008004}, 0x84) 18:41:14 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}, {0x88}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:14 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0x40305828, 0x0) 18:41:14 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x58010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:14 executing program 5: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:14 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)=ANY=[@ANYBLOB="10000000021401000000000001000008"], 0x10}}, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) r2 = syz_genetlink_get_family_id$gtp(&(0x7f0000000080)='gtp\x00', 0xffffffffffffffff) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f00000000c0)={@dev, 0x0}, &(0x7f0000000100)=0x14) r4 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ocfs2_control\x00', 0x40, 0x0) sendmsg$GTP_CMD_DELPDP(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x34, r2, 0x400, 0x70bd27, 0x25dfdbfc, {}, [@GTPA_FLOW={0x6, 0x6, 0x3}, @GTPA_LINK={0x8, 0x1, r3}, @GTPA_NET_NS_FD={0x8, 0x7, r4}, @GTPA_O_TEI={0x8, 0x9, 0x4}]}, 0x34}, 0x1, 0x0, 0x0, 0x804}, 0xc000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000)='nl80211\x00', 0xffffffffffffffff) [ 2078.922105] misc userio: No port type given on /dev/userio 18:41:14 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:14 executing program 2: syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f00000001c0)={0x30, 0x1402, 0x100, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x80}, 0x48000) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x30000281}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0xa8, 0x14, 0x20, 0x70bd2b, 0x25dfdbfc, {0x9, 0x1}, [@INET_DIAG_REQ_BYTECODE={0x33, 0x1, "0cb1a94028bfd9eab4c0ab15d5df75ca19675afd87162369c9c011ecb4f86cdd7026f175fb6313c07568a4328e1005"}, @INET_DIAG_REQ_BYTECODE={0x5f, 0x1, "2e19b96bbd09741c88383b827db4ea968c338734790f4960a8f694f703ad50b59e23cc7e999083e156baad9037c548e3d5a7a5447ced84317bdb5f7b6ac06f3e1fc1652ec87e5d4b8cd3981122a0048975bd714ebdfbf90e425113"}]}, 0xa8}, 0x1, 0x0, 0x0, 0x24008004}, 0x84) 18:41:14 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0x4030582a, 0x0) 18:41:14 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x59000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:14 executing program 5: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:14 executing program 2 (fault-call:1 fault-nth:0): r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:14 executing program 5: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:14 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}, {0x0, [], 0x2}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:14 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x59010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:14 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xc0045878, 0x0) 18:41:14 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x100}, 0x10}}, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0xad, 0x2) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0}) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18}, 0x18) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f00000000c0)={r2, 0x0, r3, 0xfffffff9}) [ 2079.197928] misc userio: No port type given on /dev/userio 18:41:14 executing program 5: bpf$BPF_BTF_LOAD(0xa, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:14 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:14 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}, {0x0, [], 0x3}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:14 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x5a000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:14 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xc0045878, 0x0) 18:41:14 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}, {0x0, [], 0x4}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) [ 2079.328192] misc userio: No port type given on /dev/userio 18:41:14 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000000000)={0x10, 0x1402, 0x800}, 0x10}}, 0x0) 18:41:14 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:14 executing program 5: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:15 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x5a010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:15 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xc0189436, 0x0) 18:41:15 executing program 5: bpf$BPF_BTF_LOAD(0xc, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) [ 2079.437894] misc userio: No port type given on /dev/userio 18:41:15 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)=ANY=[@ANYBLOB="100000000214010007e2005a00000000"], 0x10}}, 0x0) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000000)) 18:41:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}, {0x0, [], 0x5}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:15 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040)={0x2}, 0x2) 18:41:15 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x5b000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:15 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xc020660b, 0x0) 18:41:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}, {0x0, [], 0x6}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:15 executing program 5: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) [ 2079.587449] misc userio: The device must be registered before sending interrupts 18:41:15 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0x0) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000000)={0x13, 0x65, 0xffff, 0x3, 0x6, '9P2000'}, 0x13) 18:41:15 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x5b010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:15 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040)={0x3}, 0x2) 18:41:15 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x4) 18:41:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}, {0x0, [], 0x7}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:15 executing program 5: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:15 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x5c000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:15 executing program 1: ioctl$sock_bt_cmtp_CMTPGETCONNLIST(0xffffffffffffffff, 0x800443d2, &(0x7f0000000040)) r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0x0) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000200)) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(0xffffffffffffffff, 0x800443d2, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{}, {@fixed}]}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040)='gtp\x00', 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r2, 0x1}, 0x14}}, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r2, 0x8, 0x70bd26, 0x25dfdbfd, {}, [@GTPA_I_TEI={0x8, 0x8, 0x4}, @GTPA_PEER_ADDRESS={0x8, 0x4, @private=0xa010102}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x4001) 18:41:15 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0xf0) 18:41:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}, {0x0, [], 0xa}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:15 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040)={0x4}, 0x2) 18:41:15 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x5c010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:15 executing program 5: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}, {0x0, [], 0xc}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:15 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000440)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f00000004c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @empty}}, r2}}, 0x30) write$RDMA_USER_CM_CMD_BIND_IP(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x80, @empty, 0x7fffffff}, r2}}, 0x30) 18:41:15 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040)={0x5}, 0x2) 18:41:15 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0xf000) 18:41:15 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x5d000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:15 executing program 5: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}, {0x0, [], 0xe}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:15 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040)={0x6}, 0x2) 18:41:15 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)=ANY=[@ANYBLOB="100200"/16], 0x10}, 0x1, 0x0, 0x0, 0x4}, 0x0) 18:41:15 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0xf0ffff) 18:41:15 executing program 5: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:15 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x5d010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:15 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) ioctl$sock_bt_cmtp_CMTPCONNDEL(0xffffffffffffffff, 0x400443c9, &(0x7f0000000000)={@any, 0x3}) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000000040)=ANY=[@ANYBLOB="000093c67866000c7e000000000000000000"], 0x10}, 0x1, 0x0, 0x0, 0x80}, 0x400c470) 18:41:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}, {0x0, [], 0x10}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:15 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x4000000) 18:41:15 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040)={0x7}, 0x2) 18:41:15 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x5e000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}, {0x0, [], 0x48}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:15 executing program 5: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:15 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040)={0x48}, 0x2) 18:41:15 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0xfeffffff) 18:41:15 executing program 5: bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:15 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x5e010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:15 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)=ANY=[@ANYBLOB="0100"/12], 0x10}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="180000000214000427bd7000fddbdf25080044002db584868950842266207fd4c5b98de99bb69a0059961049005a8d2f1d874325f124c20736d670dc030f994e37065b35c2f6889ca0b6f2012d1011d0758be6220944d3a677a646271382abf96467d71b07083e207e583419144ae5a3dbe6623095b3bc0ff9597df9bbbabc240c15392099049cfe8ea959671686bb1839a6aa5bb51e401262673fa5c209e20475cbb19e3ee49b450c70630faf18f914613d981e5100a6cf7610c3", @ANYRES32, @ANYBLOB], 0x18}, 0x1, 0x0, 0x0, 0x800}, 0x40000) sendmsg$NL802154_CMD_SET_CHANNEL(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x4, 0x70bd25, 0x25dfdbfb, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x44101}, 0x4000085) 18:41:15 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040)={0x4c}, 0x2) 18:41:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}, {0x0, [], 0x4c}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:15 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0xfffff000) 18:41:16 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x5f000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:16 executing program 5: bpf$BPF_BTF_LOAD(0x3fe, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}, {0x0, [], 0x68}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:16 executing program 1: sendmsg$NL802154_CMD_SET_TX_POWER(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, 0x0, 0x200, 0x70bd2d, 0x25dfdbfe, {}, [@NL802154_ATTR_TX_POWER={0x8, 0xb, 0x9}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x8080) r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000000100)=ANY=[@ANYBLOB="100000000214010000004d35771b8a0929a2b4d2000000000000"], 0x10}}, 0x0) 18:41:16 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040)={0x60}, 0x2) 18:41:16 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0xfffffffe) 18:41:16 executing program 5: bpf$BPF_BTF_LOAD(0x7ffff, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:16 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x5f010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}, {0x0, [], 0x6c}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:16 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000000040)={0x38, 0x1402, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r2}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x38}}, 0x0) 18:41:16 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x1000000000000) 18:41:16 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040)={0x68}, 0x2) 18:41:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:16 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x60000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}, {0x0, [], 0x74}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:16 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0xf0ffffffffffff) 18:41:16 executing program 1: r0 = getpgid(0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r2, 0x100, 0x70bd2b, 0x25dfdbfb, {}, [@NL802154_ATTR_NETNS_FD={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40040}, 0x8000) getpgid(r0) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x37, 0x1, {0x1, 0x4, 0x8000000000000000, r0, 0xa, '-:@\xddP.#+-$'}}, 0x28) r3 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r3, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0x0) 18:41:16 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040)={0x6c}, 0x2) 18:41:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x2, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:16 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x60010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}, {0x0, [], 0x7a}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:16 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x400000000000000) 18:41:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0xa, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:16 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040)={0x74}, 0x2) 18:41:16 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x61000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:16 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0x0) sendmsg$NL802154_CMD_GET_SEC_DEVKEY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0x9, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x0, 0x200, 0x70bd2a, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x808}, 0x48000) 18:41:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}, {0x0, [], 0x88}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:16 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0xfeffffff00000000) 18:41:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:16 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040)={0x7a}, 0x2) 18:41:16 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x61010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:16 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r1, &(0x7f00000016c0)={&(0x7f0000000000)=@sco={0x1f, @none}, 0x80, &(0x7f0000001580)=[{&(0x7f0000000080)=""/41, 0x29}, {&(0x7f00000000c0)=""/4096, 0x1000}, {&(0x7f00000010c0)=""/214, 0xd6}, {&(0x7f00000011c0)=""/101, 0x65}, {&(0x7f0000001240)=""/158, 0x9e}, {&(0x7f0000001300)=""/73, 0x49}, {&(0x7f00000013c0)=""/32, 0x20}, {&(0x7f0000001480)=""/146, 0x92}, {&(0x7f0000001540)=""/23, 0x17}], 0x9, &(0x7f0000001640)=""/111, 0x6f}, 0x2000) 18:41:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x7, 0x89, 0x1}, 0x20) 18:41:16 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0xfffffffffffff000) 18:41:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x2, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:16 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x62000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:16 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x9, 0x89, 0x1}, 0x20) 18:41:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x3, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:16 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) accept(0xffffffffffffffff, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f00000000c0)=0x80) r2 = syz_open_dev$vcsu(&(0x7f0000000140)='/dev/vcsu#\x00', 0x74, 0x840) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) write$P9_RCLUNK(r4, &(0x7f0000000340)={0x7, 0x79, 0x2}, 0x7) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18}, 0x18) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r6, &(0x7f0000000300)={0x18}, 0x18) r7 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r7, &(0x7f0000000300)={0x18}, 0x18) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)={0x54, 0x1407, 0x9e91a69c4655bb54, 0x70bd29, 0x25dfdbfe, "", [@RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r3}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz1\x00'}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r5}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r7}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) 18:41:16 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x62010000, 0x0, 0x0, &(0x7f0000000040)) [ 2081.180468] misc userio: No port type given on /dev/userio 18:41:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0xa, 0x89, 0x1}, 0x20) 18:41:16 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040)={0x0, 0x2}, 0x2) [ 2081.304416] misc userio: No port type given on /dev/userio 18:41:17 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/net\x00') r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) r5 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) write$tcp_mem(r5, &(0x7f0000000200)={0x8, 0x20, 0x80000000, 0x20, 0x3ae1}, 0x48) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB='p\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000000000000000b00000008000300", @ANYRESHEX=r2, @ANYBLOB="0c00060003000000030000000c00060003000000000000000c000600000000000000000006000a00a1aa000006000a00000000002acf0600030000000000000006000a00a1aa00000c000600020000000000000008000300", @ANYRES32=r6], 0x78}}, 0x0) r7 = ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) r8 = getpgid(0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x64, 0x0, 0xa, 0x70bd27, 0x25dfdbfc, {}, [@NL802154_ATTR_NETNS_FD={0x8, 0x1d, r1}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r6}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_NETNS_FD={0x8, 0x1d, r7}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}, @NL802154_ATTR_PID={0x8, 0x1c, r8}, @NL802154_ATTR_NETNS_FD={0x8, 0x1d, r0}, @NL802154_ATTR_PID={0x8, 0x1c, 0xffffffffffffffff}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x64}, 0x1, 0x0, 0x0, 0x4c000}, 0xa72f2a50ebbdeb81) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:41:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x4, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:17 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x63000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:17 executing program 1: syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) 18:41:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x18, 0x89, 0x1}, 0x20) 18:41:17 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040)={0x0, 0x3}, 0x2) 18:41:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x63, 0x89, 0x1}, 0x20) [ 2081.920602] misc userio: No port type given on /dev/userio [ 2081.937178] netlink: 84 bytes leftover after parsing attributes in process `syz-executor.0'. 18:41:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x5, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:17 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040)={0x0, 0x4}, 0x2) 18:41:17 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x63010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:17 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0xcc, 0x14, 0x20, 0x70bd25, 0x25dfdbfc, {0xb, 0x7f}, [@INET_DIAG_REQ_BYTECODE={0x8d, 0x1, "9ee69b820aacc2545690cf2b268f0d455d8aafa8c5fe157ff7f21f1c83b4066ae3657949ef14e86632bdcfb679173edb0fd94a5d06ccb611c0f0251bdce9716ac9d06277e7123cf3d6c926f1823969ff49612ce05c969faea646b56e34120a56250d9ba02c0235985d314a57f601e10e5040d283ebf355a65a08631fd614193fa7446932b9a46c7413"}, @INET_DIAG_REQ_BYTECODE={0x25, 0x1, "809f2a460dc98e933ae56d0e08d7677431de0ce4d5f1e49ad51119d03c7d0c135c"}]}, 0xcc}, 0x1, 0x0, 0x0, 0x4008840}, 0x20000000) [ 2082.007335] netlink: 84 bytes leftover after parsing attributes in process `syz-executor.0'. 18:41:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x1000000, 0x89, 0x1}, 0x20) 18:41:17 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000740)={'wpan4\x00'}) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) r3 = accept(0xffffffffffffffff, &(0x7f0000000140)=@caif, &(0x7f00000001c0)=0x80) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r4, &(0x7f0000000340)={0x18}, 0x18) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r3, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x54, 0x0, 0x200, 0x70bd2d, 0x25dfdbfd, {{}, {@val={0x8, 0x1, 0x2e}, @void, @void}}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x3, 0x2c}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x75}, @NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_NETNS_FD={0x8, 0xdb, r4}, @NL80211_ATTR_WDEV={0xc, 0x99, {0xff, 0x5f}}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x5d}]}, 0x54}, 0x1, 0x0, 0x0, 0x1}, 0x24000000) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r2, 0x800, 0x70bd2b, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}, 0x1, 0x0, 0x0, 0x20008001}, 0xc000) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb701, 0x0) 18:41:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x6, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) [ 2082.070566] misc userio: No port type given on /dev/userio 18:41:17 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040)={0x0, 0x5}, 0x2) 18:41:17 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1, 0x0, 0x25dfdbfb}, 0x10}, 0x1, 0x0, 0x0, 0x48000}, 0x0) 18:41:17 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x64000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x7, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) [ 2082.222378] misc userio: No port type given on /dev/userio 18:41:17 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x64010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:17 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)=ANY=[@ANYBLOB="10000000021401008500000000000000"], 0x10}}, 0x0) 18:41:17 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040)={0x0, 0x6}, 0x2) 18:41:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xa, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:17 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') r1 = ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18}, 0x18) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r4, &(0x7f0000000300)={0x18}, 0x18) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r5, &(0x7f0000000300)={0x18}, 0x18) sendmsg$RDMA_NLDEV_CMD_SET(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x5c, 0x1402, 0x300, 0x70bd2c, 0x25dfdbfe, "", [@RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r3}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r4}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r1}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r5}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r0}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz1\x00'}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r0}]}, 0x5c}, 0x1, 0x0, 0x0, 0x240080a0}, 0xc0) ioctl$NS_GET_PARENT(r2, 0xb702, 0x0) [ 2082.397421] misc userio: No port type given on /dev/userio 18:41:18 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x65000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x5f5e0ff, 0x89, 0x1}, 0x20) 18:41:18 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040)={0x0, 0x7}, 0x2) 18:41:18 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)=ANY=[@ANYBLOB="1000"], 0x10}}, 0x0) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan3\x00', 0x0}) write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x3}, 0x2) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r1, 0x400, 0x70bd2d, 0x25dfdbfb, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x10) 18:41:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0xc, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:18 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) write$P9_RLERRORu(r0, &(0x7f00000000c0)={0x14, 0x7, 0x2, {{0x7, 'ns/uts\x00'}, 0x2}}, 0x14) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r1, 0xb701, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) write$P9_RATTACH(r2, &(0x7f0000000100)={0x14, 0x69, 0x1, {0x80, 0x0, 0x4}}, 0x14) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x2105c0, 0x0) 18:41:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x10, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) [ 2082.538827] misc userio: No port type given on /dev/userio 18:41:18 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040)={0x0, 0x48}, 0x2) 18:41:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x200000a6, 0x89, 0x1}, 0x20) 18:41:18 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0x0) r1 = accept(r0, &(0x7f0000000000)=@ll, &(0x7f0000000080)=0x80) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f00000000c0)={r2, 0x20}) 18:41:18 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x65010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:18 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) getresuid(&(0x7f0000000080)=0x0, &(0x7f00000000c0), &(0x7f0000000100)) write$P9_RGETATTR(r0, &(0x7f0000000140)={0xa0, 0x19, 0x2, {0x20, {0x8, 0x1}, 0x100, r1, 0xffffffffffffffff, 0x1, 0x8, 0x5, 0x1, 0xa9, 0x8, 0xffff, 0x90e, 0x100, 0x80000001, 0x4, 0x3d9, 0x2, 0x2, 0x3cf}}, 0xa0) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r2, 0xb701, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18}, 0x18) write$P9_RATTACH(r3, &(0x7f0000000040)={0x14, 0x69, 0x1, {0x0, 0x4, 0x4}}, 0x14) 18:41:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x18, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) [ 2082.654835] misc userio: No port type given on /dev/userio 18:41:18 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040)={0x0, 0x4c}, 0x2) 18:41:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x1a, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x2}, 0x20) 18:41:18 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x66000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:18 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x31, &(0x7f0000001400)={&(0x7f0000000000)=ANY=[], 0x10}}, 0x8001) 18:41:18 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') r1 = ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={r2, 0x10, &(0x7f00000002c0)={&(0x7f0000000280)}}, 0x10) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18}, 0x18) r4 = syz_open_dev$vcsu(&(0x7f00000001c0)='/dev/vcsu#\x00', 0xc48, 0x311e00) write$P9_RSTATFS(r4, &(0x7f0000000200)={0x43, 0x9, 0x1, {0xc5ba, 0x20, 0x3, 0x8, 0x0, 0x4, 0x1, 0x100000001, 0x4}}, 0x43) ioctl$NS_GET_NSTYPE(r3, 0xb703, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="600000000714000829bd7000ffdbdf250900020073797a32000000000900020073797a32000000000500540001000000050054000100000008000100020000000500540001000000050054000000000008004400", @ANYRES32=r1, @ANYBLOB="8800010036e881705fec9f88e9ebdb01000000"], 0x60}, 0x1, 0x0, 0x0, 0x40000}, 0x4001) pipe2$9p(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x40800) write$P9_RSTATFS(r5, &(0x7f00000003c0)={0x43, 0x9, 0x2, {0x6, 0x10001, 0x7, 0x3, 0x277c0fd6, 0x6c92, 0x1, 0xa4d, 0x1}}, 0x43) write$P9_RWALK(r4, &(0x7f0000000280)={0x3d, 0x6f, 0x2, {0x4, [{0x80, 0x0, 0x3}, {0x2, 0x0, 0x3}, {0x40, 0x2, 0x7}, {0x40, 0x3, 0x4}]}}, 0x3d) 18:41:18 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040)={0x0, 0x60}, 0x2) 18:41:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0xa}, 0x20) [ 2082.799839] misc userio: No port type given on /dev/userio 18:41:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x48, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:18 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0x0) write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x7, 0x1, {0x8, '}\\\\\xc7[{/('}}, 0x11) 18:41:18 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x66010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:18 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000040)={0x8001, 0x1000, 0x7, 0x6, 0x2, 0xe3, 0x100}, 0xc) ioctl$NS_GET_NSTYPE(r1, 0xb703, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000080)={0x0, 0x0, r1, 0x7fffffff, 0x80000}) 18:41:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x3ee}, 0x20) [ 2082.954009] misc userio: No port type given on /dev/userio 18:41:18 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040)={0x0, 0x68}, 0x2) 18:41:18 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1, 0xffffefff, 0x40000}, 0x10}, 0x1, 0x0, 0x0, 0x20000801}, 0x4000) 18:41:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x4c, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:18 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x67000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:18 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:41:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x3f3}, 0x20) [ 2083.094102] misc userio: No port type given on /dev/userio 18:41:18 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) sendmsg$SOCK_DIAG_BY_FAMILY(r1, &(0x7f00000010c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000001080)={&(0x7f0000000040)={0x1018, 0x14, 0x4, 0x70bd2b, 0x25dfdbfc, {0x0, 0x78}, [@INET_DIAG_REQ_BYTECODE={0x1004, 0x1, "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"}]}, 0x1018}, 0x1, 0x0, 0x0, 0x10}, 0x40) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)=ANY=[@ANYBLOB="10000000021400020000ef9fbd41f4ef"], 0x10}}, 0x0) 18:41:18 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x67010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:18 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040)={0x0, 0x6c}, 0x2) 18:41:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x68, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:18 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/time_for_children\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x6c}, @void, @val={0xc}}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x0, 0xf}}]}, 0x3c}}, 0x0) r2 = getpgid(0x0) sched_rr_get_interval(r2, &(0x7f0000000200)) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0)='nl80211\x00', r0) getpgid(r2) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x58, r1, 0x800, 0x70bd29, 0x25dfdbfc, {{}, {@val={0x8, 0x1, 0x5f}, @void, @void}}, [@NL80211_ATTR_IFINDEX={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x7, 0x14}}, @NL80211_ATTR_PID={0x8, 0x52, r2}, @NL80211_ATTR_PID={0x8}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1d7, 0x59}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x0, 0x18}}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000}, 0x88) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18}, 0x18) r4 = syz_open_dev$vcsu(&(0x7f0000000740)='/dev/vcsu#\x00', 0x4, 0x400080) connect$vsock_stream(r4, &(0x7f0000000780), 0x10) ioctl$NS_GET_PARENT(r3, 0xb701, 0x0) 18:41:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x3f4}, 0x20) 18:41:18 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x68000000, 0x0, 0x0, &(0x7f0000000040)) [ 2083.260453] misc userio: No port type given on /dev/userio 18:41:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x6c, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x3f5}, 0x20) 18:41:19 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040)={0x0, 0x74}, 0x2) 18:41:19 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)=ANY=[@ANYBLOB="10000100"/16], 0x10}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000000000000000b00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00060003000000030000000c00060003000000000000000c000600000000000000000006000a00a1aa000006000a00000000000c000600030000000000000006000a00a1aa00000c000600020000000000000008000300", @ANYRES32=r4], 0x78}}, 0x0) sendmsg$NL802154_CMD_GET_SEC_DEVKEY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x64, 0x0, 0x21, 0x70bd25, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x64}}, 0x20000004) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000740)={'wpan4\x00'}) sendmsg$NL802154_CMD_SET_CHANNEL(r5, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, r3, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}]}, 0x2c}, 0x1, 0x0, 0x0, 0x24004005}, 0x4000800) 18:41:19 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x68010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:19 executing program 0: syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/pid\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:41:19 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x74, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:19 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x69000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:19 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x101000, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0x2, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18}, 0x18) ioctl$NS_GET_PARENT(r3, 0xb701, 0x0) 18:41:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x3f6}, 0x20) [ 2083.504968] misc userio: No port type given on /dev/userio 18:41:19 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x7a, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:19 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040)={0x0, 0x7a}, 0x2) 18:41:19 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x69010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:19 executing program 1: openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x101100, 0x0) r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) ioctl$NS_GET_PARENT(r1, 0xb702, 0x0) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0x0) 18:41:19 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000040)={0xc5, 0x29, 0x1, {0x4, [{{0x1, 0x0, 0x7}, 0xdd9f, 0x4, 0x7, './file0'}, {{0x10, 0x1, 0x4}, 0x8, 0xa9, 0x7, './file0'}, {{0x0, 0x3, 0x5}, 0x20, 0x6, 0x7, './file0'}, {{0x20, 0x0, 0x6}, 0x6, 0x3f, 0x7, './file0'}, {{0x1, 0x1}, 0x400, 0x3, 0x7, './file0'}, {{0x4, 0x3, 0x4}, 0x7, 0x3f, 0x7, './file0'}]}}, 0xc5) 18:41:19 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x88, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x3f8}, 0x20) [ 2083.696795] misc userio: No port type given on /dev/userio 18:41:19 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x6a000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:19 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x9, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:19 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x3) 18:41:19 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x0, 0x800}, 0x0) 18:41:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x3fe}, 0x20) 18:41:19 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x6a010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:19 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0xa, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:19 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') r1 = ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) r3 = getpgid(0x0) getpgid(r3) write$P9_RATTACH(r2, &(0x7f0000000240)={0x14, 0x69, 0x2, {0x10, 0x4}}, 0x14) syz_open_procfs$namespace(r3, &(0x7f00000001c0)='ns/mnt\x00') sendmsg$RDMA_NLDEV_CMD_SET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000000214080027bd7000fbdbdf25050054000000000008004400", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r0, @ANYBLOB='\b\x00D\x00', @ANYRES32=r0, @ANYBLOB="080001000100000008004400", @ANYRES32, @ANYBLOB="050054000000000008004400", @ANYRES32=r1, @ANYBLOB], 0x50}, 0x1, 0x0, 0x0, 0x4040014}, 0x8805) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r4, &(0x7f0000000300)={0x18}, 0x18) write$P9_RVERSION(r4, &(0x7f0000000280)={0x15, 0x65, 0xffff, 0x6, 0x8, '9P2000.L'}, 0x15) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r5, &(0x7f0000000300)={0x18}, 0x18) getsockopt$inet6_mreq(r2, 0x29, 0x1c, &(0x7f00000005c0)={@private2, 0x0}, &(0x7f0000000600)=0x14) sendmsg$nl_route(r5, &(0x7f0000000700)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)=@ipmr_newroute={0x54, 0x18, 0x400, 0x70bd2c, 0x25dfdbfe, {0x80, 0x14, 0x0, 0x6, 0x0, 0x0, 0xfe, 0x2}, [@RTA_GATEWAY={0x8, 0x5, @local}, @RTA_ENCAP={0x18, 0x16, 0x0, 0x1, @LWTUNNEL_IP6_SRC={0x14, 0x3, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}, @RTA_SRC={0x8, 0x2, @remote}, @RTA_DST={0x8, 0x1, @empty}, @RTA_OIF={0x8, 0x4, r6}]}, 0x54}, 0x1, 0x0, 0x0, 0x40804}, 0x10) [ 2083.881179] misc userio: Invalid payload size 18:41:19 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x9) 18:41:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0xffffff}, 0x20) 18:41:19 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0xb, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:19 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x6b000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:19 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan1\x00', 0x0}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r7, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r8, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="010000000000000000000b00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00060003000000030000000c00060003000000000000000c000600000000000000000006000a00a1aa000006000a00000000000c000600030000000000000006000a00a1aa00000c000600020000000000000008000300", @ANYRES32=r10], 0x78}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f00000001c0)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_GET_SEC_DEVKEY(r3, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x3c, r5, 0x400, 0x70bd26, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r10}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r11}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}]}, 0x3c}, 0x1, 0x0, 0x0, 0x81}, 0x885) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="010000000000000000000b00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00060003000000030000000c00060003000000000000000c000600000000000000000006000a00a1aa000006000a00000000000c000600030000000000000006000a00a1aa00000c000600020000000000000008000300", @ANYRES32=r6], 0x78}}, 0x0) sendmsg$NL802154_CMD_GET_INTERFACE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x58, r1, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r2}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r6}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) r12 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r12, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0x0) [ 2083.996311] misc userio: Invalid payload size 18:41:19 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x3e) 18:41:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x20000249}, 0x20) 18:41:19 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x6b010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:19 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') r1 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendmsg$802154_raw(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x8801) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:41:19 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x10, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) [ 2084.101689] misc userio: Invalid payload size 18:41:19 executing program 1: syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan4\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan3\x00', 0x0}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r7, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r8, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_GET_SEC_DEVKEY(r6, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x40, r8, 0x300, 0x70bd2a, 0x25dfdbfc, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r2}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="010000000000000000000b00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00060003000000030000000c00060003000000000000000c000600000000000000000006000a00a1aa000006000a00000000000c000600030000000000000006000a00a1aa00000c000600020000000000000008000300", @ANYRES32=r9], 0x78}}, 0x0) sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000100)={0x104, 0x0, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_SEC_DEVKEY={0x10, 0x24, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc, 0x2, {0xaaaaaaaaaaaa0002}}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r1}, @NL802154_ATTR_SEC_DEVKEY={0x68, 0x24, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_ID={0x40, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_IMPLICIT={0xc, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x3}]}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x1}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x7}, @NL802154_KEY_ID_ATTR_SOURCE_EXTENDED={0xc, 0x5, 0x3f}, @NL802154_KEY_ID_ATTR_MODE={0x8}, @NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0xc11f}]}, @NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc, 0x2, {0xaaaaaaaaaaaa0202}}, @NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc}, @NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc}]}, @NL802154_ATTR_SEC_DEVKEY={0x48, 0x24, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0x6}, @NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc, 0x2, {0xaaaaaaaaaaaa0202}}, @NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc, 0x2, {0xffffffffffff0303}}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0x1}, @NL802154_DEVKEY_ATTR_ID={0xc, 0x3, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0xffff}]}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8, 0x1, 0x6}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r2}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r9}]}, 0x104}, 0x1, 0x0, 0x0, 0x200000d5}, 0x20008800) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000000080)=ANY=[], 0x10}, 0x1, 0x0, 0x0, 0x40}, 0x4044980) 18:41:19 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x63) 18:41:19 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x6c000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0xffffff1f}, 0x20) 18:41:19 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)=ANY=[@ANYBLOB="100000000214544b0000000000000000"], 0x10}}, 0x0) setns(0xffffffffffffffff, 0x8000000) 18:41:19 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x6c010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:19 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x1a, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) [ 2084.249715] misc userio: Invalid payload size 18:41:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x25) 18:41:19 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x3d5) 18:41:19 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x6d000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:19 executing program 0: openat$ocfs2_control(0xffffffffffffff9c, 0x0, 0x420300, 0x0) getpgid(0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:41:19 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) sendmsg$can_raw(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@can={{0x2, 0x0, 0x0, 0x1}, 0x8, 0x1, 0x0, 0x0, "c6fbf84c0d72380f"}, 0x10}, 0x1, 0x0, 0x0, 0xc00c}, 0x40000) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)=ANY=[@ANYBLOB="1000"/16], 0xfffffffffffffd56}, 0x1, 0x0, 0x0, 0x2004c014}, 0x4001) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000740)={'wpan4\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r6, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="010000000000000000000b00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00060003000000030000000c00060003000000000000000c000600000000000000000006000a00a1aa000006000a00000000000c000600030000000000000006000a00a1aa00000c000600020000000000000008000300", @ANYRES32=r9], 0x78}}, 0x0) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x64, 0x0, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@NL802154_ATTR_SEC_LEVEL={0xc, 0x22, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_FRAME={0x8}]}, @NL802154_ATTR_SEC_LEVEL={0x24, 0x22, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x1}, @NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x1}, @NL802154_SECLEVEL_ATTR_LEVELS={0x5, 0x1, 0x1}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x3}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r9}, @NL802154_ATTR_SEC_LEVEL={0xc, 0x22, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x7}]}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}]}, 0x64}, 0x1, 0x0, 0x0, 0x48010}, 0x10000091) write$P9_ROPEN(r5, &(0x7f0000000300)={0x18}, 0x18) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r3, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYRESOCT, @ANYRES16=r1, @ANYRES16=r5, @ANYRES32=0x0, @ANYRES64, @ANYRESDEC=r5], 0x1c}, 0x1, 0x0, 0x0, 0x4000004}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_GET_SEC_KEY(r2, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x54, r4, 0x8, 0x70bd29, 0x25dfdbfc, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r10}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x54}, 0x1, 0x0, 0x0, 0x8044}, 0x4040820) 18:41:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x2f) 18:41:20 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x2f, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) [ 2084.405129] misc userio: Invalid payload size 18:41:20 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x6d010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:20 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x20000042) 18:41:20 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00', 0xffffffffffffffff) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) r4 = ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000280)='mptcp_pm\x00', r3) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)={0x0, 0x0}) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r6, &(0x7f0000000300)={0x18}, 0x18) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r7, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00082bbd7000ffdbdf253100000008000300", @ANYRES32=0x0, @ANYBLOB="0c00990001010000160000000800db00", @ANYRES16, @ANYBLOB="a60e756d97b667f3fcfd612d38e9fade62ba5415fb95845576cfb538db855aa4ef87b4ebeb78eb6cf0b5f93da3db05dc0c4d8859cae8537901e89c82345e5497727bcfa6bec6946abe236ec83cb0ea1c3fa650ee0bcda44a6aefb4a9516baf756e80e0a9559bbc9268243bcdd53edbc7bd9f8c1e9b2cfbb2d17f1eb225e4579c2f414a5c2cb4f13cd9ba5c92ce1d8842", @ANYRES32=r4, @ANYBLOB="08005200e8d8b7ff38b6c49ec51e082b9545f3e8bc548184a8653ed010f0f7726070d7ba91399b6ba150c20e42ef9b80572d7170e4431f34387aa454100e99869e3a1d759104bf01a05a56d30538d10f8ff6e1ad64bbd90b42f8", @ANYRES32=r5, @ANYBLOB="0800db00", @ANYRES64, @ANYBLOB="08000300", @ANYRES32=0x0, @ANYBLOB], 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x80440c0) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:41:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x48) 18:41:20 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x32, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:20 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x6e000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:20 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x10, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20000160) 18:41:20 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x63, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) [ 2084.602154] misc userio: Invalid payload size 18:41:20 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x72e05cd2) 18:41:20 executing program 0: shmctl$SHM_STAT(0xffffffffffffffff, 0xd, &(0x7f0000000000)=""/48) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x5, 0xffffffbf, 0x7f, 0x71, 0x1}) r1 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/time\x00') ioctl$NS_GET_PARENT(r1, 0xb701, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000100)) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ocfs2_control\x00', 0x2001, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000001c0)='mptcp_pm\x00', r2) getgid() 18:41:20 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x6e010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:20 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') r1 = ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18}, 0x18) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r4, &(0x7f0000000300)={0x18}, 0x18) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r5, &(0x7f0000000300)={0x18}, 0x18) sendmsg$RDMA_NLDEV_CMD_SET(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x5c, 0x1402, 0x300, 0x70bd2c, 0x25dfdbfe, "", [@RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r3}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r4}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r1}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r5}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r0}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz1\x00'}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r0}]}, 0x5c}, 0x1, 0x0, 0x0, 0x240080a0}, 0xc0) ioctl$NS_GET_PARENT(r2, 0xb702, 0x0) 18:41:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001807000000000000080000000c000000020000000000000000000006000000000000"], &(0x7f00000001c0)=""/126, 0x8, 0x89, 0x1}, 0x20) 18:41:20 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r1, &(0x7f00000016c0)={&(0x7f0000000000)=@sco={0x1f, @none}, 0x80, &(0x7f0000001580)=[{&(0x7f0000000080)=""/41, 0x29}, {&(0x7f00000000c0)=""/4096, 0x1000}, {&(0x7f00000010c0)=""/214, 0xd6}, {&(0x7f00000011c0)=""/101, 0x65}, {&(0x7f0000001240)=""/158, 0x9e}, {&(0x7f0000001300)=""/73, 0x49}, {&(0x7f00000013c0)=""/32, 0x20}, {&(0x7f0000001480)=""/146, 0x92}, {&(0x7f0000001540)=""/23, 0x17}], 0x9, &(0x7f0000001640)=""/111, 0x6f}, 0x2000) 18:41:20 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x5f5e0ff, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:20 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x6f000000, 0x0, 0x0, &(0x7f0000000040)) [ 2084.820242] misc userio: Invalid payload size 18:41:20 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x212946, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:20 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x200000, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) write$P9_RREADDIR(r1, &(0x7f00000000c0)={0xb, 0x29, 0x1, {0x3}}, 0xb) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000040)) 18:41:20 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000740)={'wpan4\x00'}) sendmsg$NL802154_CMD_DEL_SEC_KEY(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)={0x94, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@NL802154_ATTR_SEC_KEY={0x80, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_CMDS={0x24, 0x3, "eb8d9ae18d1f3f10ea6d19c9af3abcd2d29efc6c90478c6d7a9b853597fc874f"}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "1d9f1b36c0aa18a317e4a787d86f38f2"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x6}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "f377aefa4247d963055ccfc786bd17c3"}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "7bae4572beb0a116c08be94bee0c9c47"}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "99a9a146f58c6061deded4d210db7274"}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x10}, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@var={0xb, 0x0, 0x0, 0xe, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x5}}]}}, &(0x7f00000001c0)=""/137, 0x31, 0x89, 0x1}, 0x20) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000440)={'wpan4\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r2, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r3, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000340)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_INTERFACE(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x77c1cba2c7d15b18}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r3, 0x300, 0x70bd28, 0x25dfdbff, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x8c0) 18:41:20 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) write$USERIO_CMD_REGISTER(r1, &(0x7f0000000080)={0x0, 0x80}, 0x2) 18:41:20 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:20 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x6f010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:20 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) ioctl$NS_GET_NSTYPE(r1, 0xb703, 0x0) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:41:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000)='nl80211\x00', r0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x9044040}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv6_newnexthop={0x40, 0x68, 0x1028, 0x70bd2d, 0x25dfdbfd, {0xa, 0x0, 0x0, 0x0, 0x26}, [@NHA_ID={0x8, 0x1, 0x2}, @NHA_ID={0x8, 0x1, 0x2}, @NHA_GROUP_TYPE={0x6}, @NHA_ENCAP={0x10, 0x8, 0x0, 0x1, @LWTUNNEL_IP_ID={0xc, 0x1, 0x3a}}]}, 0x40}, 0x1, 0x0, 0x0, 0x20040004}, 0x0) 18:41:20 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) [ 2085.226338] misc userio: No port type given on /dev/userio [ 2085.233520] misc userio: No port type given on /dev/userio 18:41:21 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x10, 0x1402, 0x1}, 0x10}}, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r1, &(0x7f00000016c0)={&(0x7f0000000000)=@sco={0x1f, @none}, 0x80, &(0x7f0000001580)=[{&(0x7f0000000080)=""/41, 0x29}, {&(0x7f00000000c0)=""/4096, 0x1000}, {&(0x7f00000010c0)=""/214, 0xd6}, {&(0x7f00000011c0)=""/101, 0x65}, {&(0x7f0000001240)=""/158, 0x9e}, {&(0x7f0000001300)=""/73, 0x49}, {&(0x7f00000013c0)=""/32, 0x20}, {&(0x7f0000001480)=""/146, 0x92}, {&(0x7f0000001540)=""/23, 0x17}], 0x9, &(0x7f0000001640)=""/111, 0x6f}, 0x2000) 18:41:21 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_NSTYPE(r0, 0xb703, 0x0) r1 = ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r3, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r4, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x58, r4, 0x4, 0x70bd2a, 0x25dfdbff, {}, [@NL802154_ATTR_NETNS_FD={0x8, 0x1d, r1}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x2}, @NL802154_ATTR_NETNS_FD={0x8, 0x1d, r1}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PID={0x8, 0x1c, 0xffffffffffffffff}]}, 0x58}, 0x1, 0x0, 0x0, 0x2300335d4924184b}, 0x8000000) 18:41:21 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x70000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:21 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) r0 = ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) sendmsg$RDMA_NLDEV_CMD_SET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x44, 0x1402, 0x200, 0x70bd26, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r0}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz1\x00'}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x8000}, 0x1) 18:41:21 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x79, 0x79, 0xc, [@datasec={0x4, 0x8, 0x0, 0xf, 0x1, [{0x1, 0x7, 0x1}, {0x4, 0x9d88, 0x4}, {0x2, 0x9, 0x200}, {0x1, 0x800000, 0x8}, {0x1, 0x400, 0x200}, {0x1, 0x7, 0x7}, {0x3, 0x3, 0x3}, {0x4, 0x100, 0x9}], '1'}, @ptr={0xd, 0x0, 0x0, 0x2, 0x5}]}, {0x0, [0x2e, 0x61, 0x0, 0x61, 0x30, 0x30, 0x30, 0x5f, 0x30, 0x30]}}, &(0x7f0000000140), 0xa0}, 0x20) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:21 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x3, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:21 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x70010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:21 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) [ 2085.756556] misc userio: No port type given on /dev/userio [ 2085.790936] misc userio: No port type given on /dev/userio 18:41:21 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000080)={0x1, 0x2}, 0x2) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:21 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) ioctl$IMDELTIMER(r1, 0x80044941, &(0x7f0000000040)) 18:41:21 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x90, 0x90, 0x3, [@struct={0x0, 0x0, 0x0, 0x6}, @struct={0xe, 0x7, 0x0, 0x4, 0x1, 0x400, [{0x7, 0xffffffff, 0x100}, {0xb, 0x0, 0xf8ef}, {0x1, 0x2, 0x9}, {0x3, 0x4, 0x5}, {0x0, 0x0, 0xe82}, {0x2, 0x0, 0x122c0}, {0x6, 0x1, 0x9}]}, @enum={0xa, 0x3, 0x0, 0x6, 0x4, [{0x10, 0x7ff}, {0xc, 0x67a1}, {0x0, 0x2000}]}]}, {0x0, [0x61]}}, &(0x7f00000001c0)=""/137, 0xab, 0x89, 0x1}, 0x20) 18:41:21 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x71000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:22 executing program 1: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000080)={0x1, 0x2}, 0x2) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:22 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x5, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:22 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) 18:41:22 executing program 0: ioctl$sock_bt_cmtp_CMTPGETCONNLIST(0xffffffffffffffff, 0x800443d2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{}]}) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) write$P9_RRENAMEAT(r0, &(0x7f00000000c0)={0x7, 0x4b, 0x2}, 0x7) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r1, 0xb701, 0x0) 18:41:22 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x71010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:22 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f00000000c0)={0x7, 0x7f, 0x2}, 0x7) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:22 executing program 1: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000080)={0x1, 0x2}, 0x2) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:22 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:22 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x72000000, 0x0, 0x0, &(0x7f0000000040)) [ 2086.687015] misc userio: No port type given on /dev/userio [ 2086.702590] misc userio: No port type given on /dev/userio 18:41:22 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:22 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x5080, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:22 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/cgroup\x00') ioctl$NS_GET_NSTYPE(r0, 0xb703, 0x0) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:41:22 executing program 1: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000080)={0x1, 0x2}, 0x2) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:22 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x8800, 0x0) 18:41:22 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x72010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:22 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:22 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000080), 0x2) 18:41:22 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x20000, 0x0) ioctl$TIOCGPTPEER(r0, 0x5441, 0x800) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/user\x00') ioctl$NS_GET_PARENT(r1, 0xb701, 0x0) 18:41:22 executing program 1: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:22 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) openat$nullb(0xffffffffffffff9c, &(0x7f0000000280)='/dev/nullb0\x00', 0x6020c0, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0xffffffff, 0x0}, 0x8) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r0, 0x4) socketpair(0x5, 0x6, 0x1ff, &(0x7f00000000c0)={0xffffffffffffffff}) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f0000000100)={0x2, 0x7ff, 0x1842, 0x7, 0x0, 0x1, 0x70}, 0xc) ioctl$IOCTL_STATUS_ACCEL_DEV(0xffffffffffffffff, 0x40046103, &(0x7f0000000180)={0x2, 0x7, 0x5, 0x4, 0x9, 0x5, 0x71, 0x0, 0x4, 0x1, 0x5, "68eeb8432b6456271abdaf3a3c4f7810c957fd661e567bd4164568c6bef412a6"}) 18:41:22 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x73000000, 0x0, 0x0, &(0x7f0000000040)) [ 2086.973329] misc userio: No port type given on /dev/userio 18:41:22 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xa, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:22 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000000100)={0x5, 0x10, 0xfa00, {&(0x7f0000000340), r2, 0x1}}, 0x18) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18}, 0x18) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, 0x1407, 0x400, 0x70bd25, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz0\x00'}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) [ 2087.051756] misc userio: No port type given on /dev/userio 18:41:22 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) sendmsg$RDMA_NLDEV_CMD_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x1402, 0x4, 0x70bd28, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz1\x00'}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004000}, 0x40804) 18:41:22 executing program 1: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:22 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x73010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:22 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000740)={'wpan4\x00'}) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="010000000000000000000b00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00060003000000030000000c00060003000000000000000c000600000000000000000006000a00a1aa000006000a00000000000c000600030000000000000006000a00a1aa00000c000600020000000000000008000300", @ANYRES32=r6], 0x78}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_GET_INTERFACE(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x7c, r2, 0x1, 0x70bd2b, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r6}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r7}]}, 0x7c}}, 0x40000) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:22 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xc, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:22 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) timerfd_gettime(r0, &(0x7f0000000080)) r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r1, &(0x7f0000000040), 0x2) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) [ 2087.180374] misc userio: No port type given on /dev/userio [ 2087.193589] misc userio: No port type given on /dev/userio [ 2087.203472] misc userio: No port type given on /dev/userio 18:41:22 executing program 1: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:22 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18, 0x71, 0x0, {{0x0, 0x1}, 0x1}}, 0x18) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x4c, 0x1407, 0x100, 0x70bd28, 0x25dfdbfd, "", [@RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r2}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz1\x00'}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz1\x00'}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r3}]}, 0x4c}, 0x1, 0x0, 0x0, 0x80}, 0x40) 18:41:22 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x74000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:22 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x10, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:23 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYRESHEX=0x0], &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0), 0x2, 0x6}}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={r0, 0x10, &(0x7f0000000180)={&(0x7f0000000080)=""/176, 0xb0}}, 0x10) [ 2087.354712] misc userio: No port type given on /dev/userio [ 2087.377505] misc userio: No port type given on /dev/userio [ 2087.378693] misc userio: No port type given on /dev/userio 18:41:23 executing program 1: write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, &(0x7f0000000080)={0x1, 0x2}, 0x2) write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000040), 0x2) 18:41:23 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x2, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:23 executing program 0: connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x2710, @local}, 0x10) shmctl$SHM_LOCK(0x0, 0xb) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') read$alg(0xffffffffffffffff, &(0x7f0000000080)=""/28, 0xffffffffffffff96) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:41:23 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x18, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:23 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x74010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:23 executing program 3: timerfd_create(0x9, 0x80000) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:23 executing program 1: write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, &(0x7f0000000080)={0x1, 0x2}, 0x2) write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000040), 0x2) [ 2087.529561] misc userio: No port type given on /dev/userio 18:41:23 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080)={0x2, 0x7f}, 0x2) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ttyS3\x00', 0x200483, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f00000000c0)={0x1, 0x80}, 0x2) ioctl$KDGKBLED(0xffffffffffffffff, 0x4b64, &(0x7f0000000100)) 18:41:23 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1a, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:23 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/ipc\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:41:23 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={r0, 0x10, &(0x7f0000000000)={&(0x7f0000000340)=""/148, 0x94, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=r1, 0x4) 18:41:23 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x75000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:23 executing program 1: write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, &(0x7f0000000080)={0x1, 0x2}, 0x2) write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000040), 0x2) [ 2087.677444] misc userio: No port type given on /dev/userio [ 2087.684407] misc userio: The device must be registered before sending interrupts [ 2087.729233] misc userio: No port type given on /dev/userio [ 2087.748287] misc userio: The device must be registered before sending interrupts 18:41:23 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) write$P9_RLINK(r0, &(0x7f0000000040)={0x7, 0x47, 0x2}, 0x7) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r1, 0xb701, 0x0) 18:41:23 executing program 1: r0 = openat$userio(0xffffffffffffff9c, 0x0, 0x102, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000080)={0x1, 0x2}, 0x2) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:23 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x48, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:23 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000100)={'wlan0\x00'}) r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000000)='mptcp_pm\x00', r2) pkey_free(0xffffffffffffffff) write$USERIO_CMD_REGISTER(r1, &(0x7f0000000040), 0x2) socketpair(0x0, 0x2, 0x1, &(0x7f0000000140)) 18:41:23 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x75010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:23 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x57, 0x57, 0x2, [@datasec={0xd, 0x6, 0x0, 0xf, 0x3, [{0x1, 0x1, 0x20}, {0x1, 0x20, 0x7fff}, {0x5, 0xa46, 0xfffffcbe}, {0x2, 0x10001, 0x3}, {0x1, 0x2, 0x200}, {0x1, 0x615, 0x5}], "020086"}]}}, &(0x7f0000000280)=""/138, 0x72, 0x8a, 0x1}, 0x20) write$P9_RLCREATE(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0xf, 0x1, {{0x8, 0x3, 0x2}, 0x2}}, 0x18) 18:41:23 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0x8, &(0x7f0000000040)=[{0xfff, 0x6b, 0x7, 0x57c}, {0x1, 0xff, 0x2, 0x9}, {0xfbff, 0xc5, 0x27, 0x6}, {0x8, 0x12, 0x5, 0x4}, {0x5, 0x2, 0x5, 0x1}, {0x6, 0x6, 0x3, 0x1}, {0x4, 0x18, 0x0, 0x7}, {0xd0, 0xfa, 0x1f, 0xdd89}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000000140)={r2, 0xfffffffffffffffa, 0x8}) syz_open_dev$char_usb(0xc, 0xb4, 0x1) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:41:23 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:23 executing program 1: r0 = openat$userio(0xffffffffffffff9c, 0x0, 0x102, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000080)={0x1, 0x2}, 0x2) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:23 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x76000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:23 executing program 3: r0 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x4, 0x10400) write$P9_RLERROR(r0, &(0x7f0000000040)={0xc, 0x7, 0x1, {0x3, '[!3'}}, 0xc) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9f62d33f30000000000000000c0000000c000000020000000000000000000006000000000000"], &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:23 executing program 2: syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x2, 0x0) r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:23 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x68, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:23 executing program 1: r0 = openat$userio(0xffffffffffffff9c, 0x0, 0x102, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000080)={0x1, 0x2}, 0x2) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:23 executing program 0: write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000040)={0x43, 0x9, 0x2, {0x8, 0x80000000, 0x48, 0x7, 0x4, 0x40000, 0x6, 0x100000000, 0x1}}, 0x43) r0 = getpgid(0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) r2 = getpgid(0x0) getpgid(r2) r3 = getpgid(0x0) getpgid(r3) r4 = getpgid(0x0) getpgid(r4) getpgid(r1) r5 = syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/net\x00') ioctl$NS_GET_PARENT(r5, 0xb701, 0x0) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r6, &(0x7f0000000300)={0x18}, 0x18) write$P9_RREADDIR(r6, &(0x7f0000000140)={0xa6, 0x29, 0x1, {0x83, [{{0x0, 0x4, 0x7}, 0xf51, 0x4, 0x7, './file0'}, {{0x40, 0x2, 0x1}, 0x7, 0x77, 0x7, './file0'}, {{0x4, 0x4, 0x7}, 0xc0000, 0x0, 0x7, './file0'}, {{0x40, 0x4, 0x4}, 0x7a, 0x3, 0x7, './file0'}, {{0x4, 0x3, 0x5}, 0x1, 0x0, 0x7, './file0'}]}}, 0xa6) socket$nl_route(0x10, 0x3, 0x0) 18:41:23 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x76010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:23 executing program 3: openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ocfs2_control\x00', 0x4000, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:23 executing program 1: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x0, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000080)={0x1, 0x2}, 0x2) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) [ 2088.194555] misc userio: No port type given on /dev/userio 18:41:23 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x77000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:23 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) r0 = accept(0xffffffffffffffff, &(0x7f0000000000)=@nfc, &(0x7f00000000c0)=0x80) r1 = accept(r0, &(0x7f0000000280)=@ipx, &(0x7f0000000180)=0x80) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) sendmsg$RDMA_NLDEV_CMD_SET(r1, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x34, 0x1402, 0x4, 0x70bd29, 0x25dfdbff, "", [@RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x200088c1}, 0x40) accept$alg(r0, 0x0, 0x0) r3 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x6) r4 = syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r4, 0x541c, &(0x7f0000000300)) ioctl$TIOCL_GETMOUSEREPORTING(r3, 0x541c, &(0x7f0000000100)) 18:41:23 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) [ 2088.240591] misc userio: No port type given on /dev/userio 18:41:23 executing program 2: openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) 18:41:23 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x77010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:23 executing program 1: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x0, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000080)={0x1, 0x2}, 0x2) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:23 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) r3 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ocfs2_control\x00', 0xe00, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@getstats={0x1c, 0x5e, 0x4, 0x70bd28, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x5}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000080}, 0x800) ioctl$IOCTL_GET_NUM_DEVICES(r2, 0x40046104, &(0x7f0000000100)) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) write$P9_RLERRORu(r1, &(0x7f0000000080)={0x11, 0x7, 0x1, {{0x4, ':/$['}}}, 0x11) 18:41:24 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') r1 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8970, &(0x7f0000000140)={'wlan1\x00'}) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:41:24 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x9, [@struct={0x0, 0x0, 0x0, 0x6}]}, {0x0, [0x61, 0x5f, 0x30, 0x2e, 0x2e, 0x30, 0x30]}}, &(0x7f00000001c0)=""/137, 0x2d, 0x89, 0x5}, 0x20) 18:41:24 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x74, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:24 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x78000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:24 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x800, 0x0) r0 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x9, r0) [ 2088.481608] misc userio: No port type given on /dev/userio 18:41:24 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:24 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x78010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:24 executing program 1: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x0, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000080)={0x1, 0x2}, 0x2) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:24 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000000)={0x0, 0x80000}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0xa302, 0x2, 0x3, 0x5, 0xffffffffffffffff}) 18:41:24 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') r0 = ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) [ 2088.542834] misc userio: No port type given on /dev/userio 18:41:24 executing program 2: openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040)={0x0, 0x5}, 0x2) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="210000000702001400405b5c2d7b7b5c232f22387b5b5c2a2f2d3a295d740d0000"], 0x21) 18:41:24 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x88, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:24 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x79000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:24 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x300, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:24 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@setneightbl={0x3c, 0x43, 0x800, 0x70bd29, 0x25dfdbff, {0x7}, [@NDTA_THRESH3={0x8, 0x4, 0x9}, @NDTA_GC_INTERVAL={0xc, 0x8, 0x7}, @NDTA_THRESH3={0x8, 0x4, 0x400000}, @NDTA_NAME={0xb, 0x1, 'ns/uts\x00'}]}, 0x3c}}, 0x10) syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') r0 = syz_genetlink_get_family_id$gtp(&(0x7f0000000180)='gtp\x00', 0xffffffffffffffff) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x1c, r0, 0x20, 0x70bd2a, 0x25dfdbfc, {}, [@GTPA_FLOW={0x6}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x20000040) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) ioctl$NS_GET_PARENT(r2, 0xb701, 0x0) 18:41:24 executing program 1: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, &(0x7f0000000080)={0x1, 0x2}, 0x2) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:24 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x79010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:24 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00d921020000000000000000000006000000000000"], &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) r0 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0xfffffffffffffffe, 0x7c3300) write$P9_RATTACH(r0, &(0x7f0000000040)={0x14, 0x69, 0x2, {0x40, 0x3, 0x6}}, 0x14) 18:41:24 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x6982, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:24 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x500, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) [ 2088.838011] misc userio: No port type given on /dev/userio 18:41:24 executing program 1: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, &(0x7f0000000080)={0x1, 0x2}, 0x2) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:24 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x7a000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:24 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x2, 0x0) timerfd_create(0x1, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000240)={@remote, 0x0}, &(0x7f0000000280)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=@newlinkprop={0x28, 0x6c, 0x200, 0x70bd2b, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, 0x1, 0x1000}, [@IFLA_OPERSTATE={0x5, 0x10, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x4040000}, 0x801) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18}, 0x18) ioctl$IOCTL_STATUS_ACCEL_DEV(0xffffffffffffffff, 0x40046103, &(0x7f00000003c0)={0x6, 0x800, 0x4e3f, 0xf7, 0x0, 0x1, 0x6, 0x7, 0x5, 0x1f, 0x3, "a83a5562e28e3a9a18012e61ff2f4e03a99029b430aca3d99ba2d9bb103be232"}) sendmsg$RDMA_NLDEV_CMD_SET(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x44, 0x1402, 0x4, 0x2, 0x25dfdbff, "", [@RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r0}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r0}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz0\x00'}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000000}, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r1, 0x541c, &(0x7f0000000080)) 18:41:24 executing program 2: openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) write$USERIO_CMD_REGISTER(r2, &(0x7f0000000100)={0x0, 0x6}, 0x2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18}, 0x18) r4 = getpgid(0x0) getpgid(r4) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r5, &(0x7f0000000300)={0x18}, 0x18) sendmsg$nl_route(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="84000000120026002bbd7000fbdbdf2500000000", @ANYRES32=0x0, @ANYBLOB="000002000000000008000f000000000008001b000700000008001300", @ANYRES32=r4, @ANYBLOB="140003006970360400000000000000000000000005001000150000000800280072e5000008002000020000001800128008000100707070000c00028008000100", @ANYRES32=r5, @ANYBLOB="08001300", @ANYRES32=0x0, @ANYBLOB], 0x84}, 0x1, 0x0, 0x0, 0x4000880}, 0x10008000) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r6, &(0x7f0000000300)={0x18}, 0x18) ioctl$TUNGETDEVNETNS(r3, 0x54e3, 0x0) sendmsg$RDMA_NLDEV_CMD_SET(r6, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[], 0x64}}, 0x40000) write$USERIO_CMD_SET_PORT_TYPE(r3, &(0x7f0000000080)={0x1, 0x3}, 0x2) 18:41:24 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x600, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:24 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18, 0x71, 0x2, {{0x20, 0xffffffff}}}, 0x18) r2 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$sock_ifreq(r2, 0x8927, &(0x7f0000000000)={'ipvlan0\x00', @ifru_map}) read$alg(r0, &(0x7f0000000280)=""/241, 0xf1) [ 2088.994422] misc userio: No port type given on /dev/userio 18:41:24 executing program 1: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, &(0x7f0000000080)={0x1, 0x2}, 0x2) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:24 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x700, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:24 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x7a010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:24 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/time\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:41:24 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xa00, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) [ 2089.129688] misc userio: No port type given on /dev/userio 18:41:24 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r1, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="0100ebffff00000000000000000000000300", @ANYRES32=0x0, @ANYBLOB], 0x1c}}, 0x0) sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280)={0x24, @none={0x0, 0x3}}, 0x14, &(0x7f0000000340)={&(0x7f0000000300)="b9e37848995a4c47a34364b9f066dfc31e3f7db1894399cd1b973b3cd8120edf2241f52ecaedba0aa63ccd77", 0x2c}, 0x1, 0x0, 0x0, 0x4}, 0x4008004) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="010000000000000000000b00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00060003000000030000000c00060003000000000000000c00060000000058b961a2d865ae3dbbb6dfb7000006000a00a1aa000006000a00000000000c00060003000000002a3bab46000a00a1aa00000c00060002000000000000006cae5934ba23fff7740129080003007418ff5f3e528f2d769262a8886ca63d8bad00c6f27a694b49786b1aa94572855f2a89d1c3babfa5549c5e85a1cfc90571c5c8d7d0b8cfa97d6fe5470e151eebf937d8249e11439ebf4950c73052872b8b1eee1a8c769d37986c01c53c6c9fa6436099ed02b97a7ad812016bccb4d3aac6a325697d3f9d55c0f895e99dc1d338ebc88b798ab0b2a4b3e96568ef", @ANYRES32=r7], 0x78}}, 0x0) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r8, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r9, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r10, @ANYBLOB="010000000000000000000b00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00060003000000030000000c00060003000000000000000c000600000000000000000006000a00a1aa000006000a00000000000c000600030000000000000006000a00a1aa00000c000600020000000000000008000300", @ANYRES32=r11], 0x78}}, 0x0) sendmsg$NL802154_CMD_GET_INTERFACE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x54, r2, 0x10, 0x70bd26, 0x25dfdbff, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r3}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r7}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r11}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x24000000) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) r12 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) write$USERIO_CMD_REGISTER(r12, &(0x7f00000000c0)={0x0, 0x5}, 0x2) 18:41:24 executing program 3: getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0xc) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:24 executing program 1: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, 0x0, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:24 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x7b000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:24 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xc00, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:24 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) getpgid(0xffffffffffffffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000180)) r1 = getpgid(0x0) getpgid(r1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000280)) r3 = getpgid(r2) r4 = timerfd_create(0x0, 0x800) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timerfd_settime(r4, 0x1, &(0x7f00000000c0)={{0x0, 0x3938700}, {r5, r6+60000000}}, &(0x7f0000000100)) syz_open_procfs$namespace(r3, &(0x7f0000000140)='ns/user\x00') 18:41:24 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb010018000000070000000c0000000c00000002000000000001000000db86777e9f8fc45eeff04b64173af0f3cc3aa2df1634e96f3a39f967d16cc259ac6bfa9851fb5fba65579bbb4f67131978cd97c654fac65249bea0ab2e4f77de5940db6ca565131d6cfe4d444bd5dd34c53786df98b229898e843e2ec1dbd184d7647a25e56ae53e3628fdbdc671daa829f5258650774f9a22b27573f5e274f60940522c6fd54af25263d600"/183], &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x3, 0x5, 0xe4, 0x4}]}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f00000000c0)={0x0, 0x1, r0, 0x68c, 0x80000}) 18:41:24 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x7b010000, 0x0, 0x0, &(0x7f0000000040)) [ 2089.311543] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2089.325221] misc userio: Invalid payload size [ 2089.336967] misc userio: No port type given on /dev/userio [ 2089.348591] misc userio: No port type given on /dev/userio 18:41:25 executing program 1: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, 0x0, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1800, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:25 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) read$char_usb(0xffffffffffffffff, &(0x7f0000000040)=""/25, 0x19) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r2, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r3, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_SET_CHANNEL(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r3, 0x2, 0x70bd27, 0x25dfdbff, {}, [@NL802154_ATTR_PAGE={0x5, 0x7, 0x1}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_CHANNEL={0x5, 0x8, 0x14}]}, 0x30}}, 0x4000801) [ 2089.395790] netlink: 56 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2089.431804] misc userio: No port type given on /dev/userio 18:41:25 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x7c000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:25 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000100)={r1, 0x10, &(0x7f00000000c0)={&(0x7f0000000080)=""/57, 0x39}}, 0x10) [ 2089.506343] misc userio: Invalid payload size [ 2089.526692] misc userio: No port type given on /dev/userio 18:41:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1a00, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:25 executing program 1: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, 0x0, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:25 executing program 3: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x38, 0x0, 0x1, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r0}, @NL802154_ATTR_SEC_DEVKEY={0x10, 0x24, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc, 0x2, {0xaaaaaaaaaaaa0302}}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x11}, 0x20000000) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000740)={'wpan4\x00'}) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000380)='nl802154\x00', 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000000000000000b00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00060003000000030000000c00060003000000000000000c000600000000000000000006000a00a1aa000006000a00000000000c000600030000000000000006000a00a1aa00000c000600020000000000000008000300", @ANYRES32=r5], 0x78}}, 0x0) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r6, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="010000000000000000000b00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00060003000000030000000c00060003000000000000000c000600000000000000000006000a00a1aa000006000a00000000000c000600030000000000000006000a00a1aa00000c000600020000000000000008000300", @ANYRES32=r9], 0x78}}, 0x0) sendmsg$NL802154_CMD_SET_ACKREQ_DEFAULT(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000340), 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x58, r1, 0x400, 0x70bd25, 0x25dfdbfb, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r5}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_ACKREQ_DEFAULT={0x5}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_ACKREQ_DEFAULT={0x5}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r9}]}, 0x58}, 0x1, 0x0, 0x0, 0x80}, 0x40000) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r10, &(0x7f0000000300)={0x18}, 0x18) write$P9_RRENAMEAT(r10, &(0x7f00000002c0)={0x7, 0x4b, 0x1}, 0x7) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000000)) 18:41:25 executing program 0: setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000040)={0x6, 0x3f, 0x2890, 0x3f, 0x9, 0x81, 0x7}, 0xc) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) [ 2089.632406] misc userio: No port type given on /dev/userio [ 2089.663599] misc userio: No port type given on /dev/userio [ 2089.673894] misc userio: Invalid payload size 18:41:25 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x7c010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2000, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) [ 2089.689063] misc userio: No port type given on /dev/userio 18:41:25 executing program 1: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000080), 0x2) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:25 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) write$USERIO_CMD_SEND_INTERRUPT(r1, &(0x7f0000000080)={0x2, 0x9}, 0x2) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4800, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:25 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={0x0, @generic={0x11, "779372caef1f013b8e13f37b2c6f"}, @sco, @xdp={0x2c, 0x2, 0x0}, 0x3, 0x0, 0x0, 0x0, 0x5, &(0x7f00000000c0)='hsr0\x00', 0x1, 0x8}) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000100)={&(0x7f0000002900)=ANY=[@ANYBLOB="802200001300000125bd7000fddbdf25090009074e224e22ff7f000001feffff090000000300000001000000010100000800000003000000", @ANYRES32=r0, @ANYBLOB="05000000030000007f00000000000000cd0001003846c4bc991019047bd71c941d8c753966db83135675bfe77a4cee30c95c4e35f60417069c90283c7fc5c55d49f6d0a501134f8b7f5c2652201ae6f2b0033e3df70e3b1b49caeef71512f44482f43a5f4e6a50868bbd8d7c47e3a0ed23f59b18f60eba296085ae02098e827b071bd0238dbae9af8405162414e1c05fb7c34261e791122e201e44b70618c14a19d8569f14c5889fa75c27cec29d1a26617d2f44914eb7c3ab89e10b8621c4ad4b0ab16883fd552e7e787f5d811cf32717e12dc9a174a10f6928d61ff8000000041001006a43f7a979492a2fb89a50c129ff5d6f6a056def0d1103031cd4a673cb75a6fcb665db5eb9a499ffa8816284a013a8168d51cc5d9f33804276c3695cee904fd66ed95552329948ba2b0f1074bb22992987e3cd483a0160f508d163050e39a68d0beed0e950e0990d8265028c108ffc42194e38d6622ab0b9da9be51af9e452f8e0d436d0d82de69fa9757c9da4444525e1caeb97b09687aa8f1954996b4eb652755e2c7a64b0ac37e085811bd4241589c3ee78354f67a415eafc06475cf253a344cdcbe6fd422d74e1c48770acbeb8354c4dd5b398a729b6e9036beac118c75674961c3aa9c4c82c11fa78ef431d7ee2ec87dc1e7ff9ba8f6a759371e16c0b5032586367c96ac636beb8b794848b8cebf35812cd481fd4973ea6c0b95b580c55f84e0200e5f3b26ef3a8da3dd1a040d1efec400c43d10ca2ea05069d904a8b3b885840ec5fdac29335f1efd91b625d509e7620da3784553e280462a2a4510345bc6afbc37a929f27dfd629e9dc412cf19334ff1bce8254560d7da1d49738f1fbd429d1975c06fdf3bcee1f717e71861b312798f269e947ea1b819111ba30b97e8cbd4efeed25566f25dc088563c89ceb4879763317f5d8e9b6a64bdf65cbf5bb8bd63e04b5ac8ef63605e2f8f76030909a5308e630c8302489f3b8ccf2a0f91783b79e5b3e5534a6fdcca3590eb7b4e04c8250459b2e72cb369f7cf3f75eeea170a6708ba3850fdfa44c35f328a5ae6d37c36b9287e8af7d3dd67902ad5de12cffb9e1b175a547a359dcc1e61ad98850e64705c6ac6ed4bef4146c8888dc51a954ec426f8abb50692407f82db5717754ddfdfa505587b1e18c5a8eb3f0a2d8c89396209a2361b40dd878c68ca202c06d4a295a09d47d96bcfe854af55f823de3576e92b9c06881fcd86f0141e73f4e7f4ca18670cbdc4873b6264a0e02ce48f4f48679cb8cb2a372f92cf54d33545a41615a0689004e1a5e4088e216bf0a56a7da1863c714b1035b4fb9325b6e610d0e09c3ada02e656568921b1fdcdc49591165d024e1131668da9906905d1137c6dae26f4e4ef2c600c4c052660fa7c409293f79fdb5f547655350b7bb51180ce8b190e9dcc0f3489afadbaa9392e57b49f33a02a968d5b55c9042c44626c066922e79d56c79599f5b30a6c5c682fee22ffce70282ae8a759be6b96c03b0a506bf3e30300bc169444bbbdfb878da9ac0c2aaad4064c4bb1bbe6f9943ee123f7d8ecc20a66468b9f8f9f2b4983122e4ae57b9bc4d2a3ffd87ec8964d9c21b96a0542ccf987ad68acc0a6c02df0d928b727ad7d88d8de64b8d6f7d65a6ff6570601ee76b1560b04fe1f1cb775ccf9a9f369917ab5d1d801ba076f9346a72be57ecfbe9dcda34314a680811d8f08dca93605de238da5b09a62c592256b18d9e4d63658a38fec38dca5a01835b2b174b8ecab55298306d3c73483525a0c8d8cad844b052a3b5ac15abce301cfa9b96201c0ec87388ceee916c813fd1ffbea38bf3160ce44743e8d93105dae684fb9138c7b97d16e51731abcf8d4559fd4a1ed43ab2c37c7f38481dddfd40d1853560fa0e94a830e5a1bcaf467924ef0715aba17f482efa6d18d3ecac6a99fc4513469c6f21a98d860258da0d009b52ce757f4cfb6dff3e01c113d7aed145e09dd1614bf8e84aa81912070492db362e74fb0dc20403c758d4d2dee26dfc6efcd8f359f0074828b17d8bb0831204efca443ee9729c5fa4e4410566f1feb25c747f7e60d24195cf53576f93f499cc65e081da327409e2dfaa83be4b26e5eea01048a0bf906c96585910b1c950406dcdfaaf50794a9fe80c17ad9fb96e8a8ea676ae82df97d42eec8a6a067dc0c6ae297fd52df705822a1dd136356f1df7d2e9d1ec1f9a80d54d2771b46b24fcf099df74ec1558a2708d94608534662371d05106ab645ac69944dc02f57ced3e654351918841877807f6453919c161b0f7e173ff9a9ba8911dc83c68fd1781a8a109fbdbc08c3a0603024f2363f27cb1796831421895f87e2f2b6ae74183709e4c49b7fe4da1810752b7267ad925d47049dd9615e7edd5a783c6ad7499399699fe2c6b0840c706986e95154958e2f36a7c0bf7a4637660ce21f31960316b456378ea3bc04e429af67295c29febd2451ec1a43867c08e6dbee784bab73710a497b4556c05b648062ff18a7dc36f70621931313944577feb188039ffb774ca1fd50e0087dbe020403784d018c8659e38c829cfbf026f62f78b66df0c55ac913f154950f540837abde8e33ad75f7078f9ee57f11d3b9f0360e66d25e02c90f370d96ca7f6f2cf842e320b49967fb8a191980d955f4b2d1f61a386cf6ace080752ce3236b273bd3d269ca729ac83abe6f0b2ae7bf080d652c501c08018353b949d4b3ebfc12f8d376a3230f2a7e91f89a14d9c8d1a3d34ad9b8f9bfbe70b1b96d51ae96ecd9e2a928e55efb1c11b8d6c2543049728b11c866375b918239b4bb0bc016b175ec619e2c25c3b20321a224543f335bdcbd991af8d92debc3edcb2f3d7d8f9f7d3ac63cd5171c1afdd8f8a15f31293235144f80f380d78193cfb4f1ff4751d21fb7d8240f18778241d40bddbbb1e886a75075941f382cc54236f38f993d2948eb040dda1d7016d45899013f7b82504e9603de1430a297e3c94e81039c8395c24eccd8b194d00cf793d8dcc4a61fa67131da474ae1c0361f7d4008635625847371434782425e3cda4a1a003772449a01c089f9358befbe9ce9b61eecfe2e14c8eefdc952ef4358e54e19d69a1b80f1c90c56d93e7fd03760df49c650cc80690ed1fa37ebb26a386e13401cc7d46ccfc5d6d6739d324ac1e2c1abe320e15c74d0072e93e568d6777093b878ec76135699c5a765b1160f287a508739e92e38f3dedbc197a12b7e04a05371701866420b5900dba9a3874d5386f2476c821aff13fff2c910bffa8a6a38e6394dd428a708014c55ef3e30e127b91854fac023f3409c32bc349f43765178ef40f427e175476cdf670cf4a5fbe8628fdc1a0b88e6d7a71ee1685e773fcb4fbff03597352fa6b9669434c7631ce3acf30b257ec206ffbefeefec5b5e5a0d379c0399fbffd8b27063984976faf8bc2daf94d32428d6e9a955c8c1a5140a235c12d0bdae7be3ad269c98fe0f615615b6f817190d97b25b6128294f1c21a084c0c8dac3ef7a5d59bef394cc2e05ead72f0af3c081f4b7803afd12ba55f6fccd6cbafc5a423c1c3433d80493b03574de7903e771b2c13a0f52bcce7adc54391e42e8e27fc3fe0801c572bf0c616a252db321053add6a14e8e822e384d288e6487f98ab1e3ee65b38967b148186f7461bec72aae449943f588dfdadf41b6404933adaca795eff575f2d59dbc73d7871622566aa6031956104b497a593d21bc216d63b787d794cb2291ccb6e726bef5ec15f0f74e234ee86f1c6713ec843dfeaaf35810ed8d130aa8da70f74840b838b1f4f7e9f8323392911ad74717266e711dd14c6a0c45eb689157fad33dcf257bbedec9a93e45a3211b5ebe3755a82ef7e5da99fd4dbcf2d3e338d4b7f7420dc57b00200d14e2a04fec0cb024b171e8c42c511491b3b42d69ec940c4f6483645b589a722c9e9587040e51321a16782f39e6a2c92ea718d43b2f31ba9860cfabc8ba9ed9cbf434c545706d3cfbaaabedb928341034ddd1f4a39dacfcea670b71d4ac90a1b7bcc0f8b5b2b3fc51ef9fa5d6ec6afa4eb876a6cfad92e35636f0a1a8c7ef3b204a3a787f3363aeee17cf2bb7d21b5a6d6c2c673a0ba159031492b2f6f49191d97fa986860a21bd5ec1e6ce65997a7984d491adbf6984e1c607cf9250793c78a7bdf0cc48146c0534403d771e4f40e8072b764a87085f11481762862df746ce0d0bc5d459e2034611592543212fbadecd03b2979e8cb1c70283cbdafc31b50b4b5439dc61ced327d37dad28ae98f4c05aadd3df2c77f34634bc21217387074a61c4f6419b0482f09869b5c4069019c87d078654c1d7771ac2fa0c8e919556233abf8094f9f242b44f8a22e9b415c72b850aebd99be160a688be8a0a9b2c19e44d3dfd1c6ca74d7d2890c77a3dab7717129fcb3cc183d23461599840675ce082bbf8ef34458df3f7f2be7da9716ae58947c5d95eca03fb34328df67e631d8a1af99c8a8e9fb52e717e93052cad1b43cdb6c88ecf91513c20167eed1c43bc6e0e3a0f72d20677315b302460a527c96ed5a247485ec107be10dc8326e8203cade6423be909c2a818c48e40a6aa8f0a44cc5bd352d96b85391ea89b5afd56e49f90f6eaafb92e38181a2f371fb12df0519a07baf3c5b486c1ca84f089c5f9d86844843c3fcb6f1335e5d9a290ddb98de06571474e3b5e5a2a923e44d37257a7af5ed3f3ff562e688e3083e55ac307c3aaa76f2096af6f6a2804736c2e5371f6b1547831c7faab9298e764b436d43f68aa3bc6a8918558faa64f37ec40ab97016a670901b39ce1acf422d2d81da4defce4e4900d2b094abdbd2dde9487ab508a3e21b9798071be9aafc4efd166c27297e2cf8b66d886394aa2e79ab2a3390a7e10e76b62c579379cc211cda71fa5d904b423c0ed0bc3c2a51c08489b1eaf5d9e703e83352a9e94b1a867d8cbbf47335bb52c19a5e9d72191d3cf96aa9a1317bb727ed8fc2c56edfe383012392d347dff6a259b18a70e7b15077db3aab0a486bf9e10038b9cb9cc83191143c1683182e9a5b158f041730cac8b5435198b97092fd7686ed0599652c0e158898513e07d1d7b0941d73a10af53acb0603dc327c7b95a493420e898323b452536287779a8abd313234b589b7758ba4680587591821347d7b2b9efc641791b19d63e37a16f8d43066b8bf24c069770fbb3eca19aac6451a6bb0827ed04574b4ec234b8c26bd11f3813fc2dcffce18363dab6fdeccc5e717eb1ec0d6144c4553e13b496f076089b7c8eb8dfee09ff1600bc45e88702b986701cb0225050b59d0fc6c64490194328b8035c94f5a290e6dbf5ce4a2264bdc8a434898c4f0351629bd6482f5a89284767cbbea72a1f4fae005670f0eb0ea4350debae85ac7137a1144fd86df49440584cea5dc18b94f5956aa9896d30cfe8ec42fa041c24711995dbc41aa24dfc323cc1a9c41c8bde89f3e4826ac51dad72f3f1906949c86edbe77feff0171954620327e69c1ff305ca15bfee715211f0574f6216c8aead3e94e810362e1e6379b91e01f44d216c0c5a5ea9b08f481feb17fa6be120b495c8f4e00db0a95e570cc0c652b797582c5bbfbaf1882ab91d269769dbf6d86294c8e718108a3c54779937264372655bea138c2a535f2df2e16fa47d4155c19afe21e9d9d9eac683e69e167d48ba6c0e0ee27ba44e71951a5864e23183ce538f5155d5ad5b91bcba478d0115a12a6dd32f379e0406d5e1c73f42f48b0de0035b6a3cecf6cea62f74a50fce9241d1ad54a2b4bad2bfc3ad76de33177683eb7f0e69f36cc154b2dde4235ce88dd61a1c95eff407c430efdcd614ccd52e691797c254bcf1c32018006a3043488a9bff0b7f50452186972376b0b52958ee9fe1b3203805498b7ef1705af8c2494891d622753a0173ae74a83f5ef5cbe88a7798470d02c496df728a2eacc4282cee347b917460452832a4347762b9a040e1aeebe9d39d5292e7326b30d58c3049e3c2766e311cda49408da10d509c4e4cf11509b3df7604e9cb62f5cebb35e8da306f8e5b590bfad5d67a74962bd48c5a1ea535bec45a5ca5af5c10dd66399078de5e53ca3413b52f8baa485d1a2bc63eed23026e32296d4a529bf64ce962ee00010002726af832de55a8e8fa162c7fb4922163f1b17b80174fddf19e9636730a798d10f545e83a0b77179a5ad2258dc25fa66b994157a39a781e375f3d143cfa27bfc1e2a46af2199109ec78d57856764985b8f087e735d66f916a44f682a4d9fca23eb42e9bb435085ea12ae0af8b4295f247e754964e738f4a8d5b2808a9343cb4d3eb8cb87a62dd4f4b5a361c1d7e9ec459e23c2ca821954c91b71ba368c74b0addd8686851d5a3be41c5e380acfa8b251b6fb1c35a77bcc070c9566d4de6622b20ecd063937bf13eeea74de245129043f021ffdae28623d3ed379553acd63c8eeb1f1917963786c9fa8d0000041001005ffdfacd4016e79cd4b463ec825f885d5945b5989eb1c8e92d59073a12022d95e9245b43d21ca5d98e871194743921a030456c55c9f2ac6a365580c7ba425d08df65caf344ccc8315e275be7c6b73033d6a337455d797c3f5e7954c9211cfe8229fdcf9a38984805affb4767b927239d276cab5aa7f984e5709e5c6d058f580b0c3120efef6612ec82fd136e85a55e2be23bee18c63d4f655f5a305671c1cbff098fdd4fd89362477f8ea3c1b71d8a1d159f04c3c4cb974502ba0f0a43497a6b42e322f3e74246feb6040e2c12831d015f1de25f3802b71ab63cb1e0e5e62e6f2ee582afd61daa9e0216d43b17c0a305a3364a317e17fe868c8d78760197c00f2c3db2004902685c552ad7b4bdc94368d23a463b5be1233739230055028b1368d35d2f80fa9380841e163337aaa05e86a1e3fa32be47b2d1ae1be13039aaf7e5fa8ceb1cb2dacf13a4c7cd5e260d0c921b9595569d8c29e35d2466490ac826625c44ed8ae053c565a21a4901341c0601f494f601798e403100c628c61c4b49878ed8e82b71f7d7758306d5d0777f1d690152195bfb677dad475422a030e54ccac5249292b23f5c86c59c6e6c5198808de1adfacf68699d4ec05407f93701a2420e9d863a9a345d0289f93db3e340ecb91f707ed729efa1e72996b39a6fa87664e8b3b331d3c74d4575de445b15229a015bba9dfd11b36cf5f83932f2bab585fde7e063f25313648f3da731e03e4ca19de894a603d6edc0aa2239ab84ae49ee5fd883fda1b317a293018f914e3b64b73455a3c0c2fcecd26e2b6bf879493ae34fa8a0bedcb9e21aa009436e8d067638e20513a4815339a3caa075c121345dc26b8f1662d56c8429fe97c011e8a993257fa711dc8c3ca93cf3bea9555c0362b2ef2550d8c91d1f67cfb8125a9cff3eec79ccfb2eb11d1d610dcb04cd8f12d587fdcecc455d27c398dcd4a23ce9586018226dfd69ef0b2f7fbaff196590884f1baa8ab0483267b06f4c4a07bcc0205b9fcaafb9f72d331e19cda0e66643433c4cf9ea40606e3d3cdc24e53c05393fced4599fd7cb7a6e222dac9fa535b51ce021a4913909769174faec839bfaea0f44d39a9deca427beea58664a4db2752ab8b8e4810b888d461cec76ae3165bd07cb4a4e7cbae336a36a3258cfb370763469d4e519d85396dfa68ad485ffa71039ed3f8785f3d23cf4b869a62e81ba6f25c6866520b714ed84bc95f9f4772a7feb78c595a5d652beb790bc622198151374bdfcf9ddd692d720bc2e5b09f2e1fffc61e953d31f829710d0f115ea99429347f723e705b717e08bed3106d49863f39c1f67a3926322e2ea51a6f5013bec47b17ec274675b874a43d19521d5491b9aac8f50103f81b2c2c0a8e2701272cdd90c6ae22ea297e469240a939dd476b7dec260a54d4b049b5bd5bbe9237908dd351e8c98997d316a7eb9caa9f3480e12864e9d6e03528b0871df2ec3ba418b9532ebb286e13723263e5b1bede25f880095b51672d75500e2b17de804150d62cbd5667e30330130ebb6fef0afa836130e8599cf6b309fb7d6654a4c9c820db8f161c6beeb2768e8e525505847a74e6062f8bcc6646ff9c7bbeadb4466b833a0fcd9c8dad79d18a37705d65924bdf2b3e651782bf1519d9e988fc4f22b59c7026b2a3ae0b091f491fc3b792b70fa585827480a80da28faaa396b192fb7d17c96ba97515f8bf7baf5398f67134f3eb6132395dbd7fe6a8643e8c3f480c453cb2aa51efc5f7f7660174acfe228779b826d0fcd17f9e3af29d149028786185ea1a205c9b34a5d741a9062c31f6d98bec6b5f1359536ae0697e62176ad3985a80dae9e9ad56a48f8b49bbd70224f7b0dc2fd4bb68d8a7c369a2f515a5c75e98ec9c6cb44d202105c18b66e20ed590de952129b0ba33ad7cf0accab5ad92b9c4e4e6bc92b66ba74fc69a92d67da4538201e08a201a5995988130c10a310a9bf92f400d58cb174abe57a82550207c7ba14e9995e03a512285458fcda1a6f08b1f371622a1bbb4c110b2af03578364ec7b0596e12a5187a673685c6cef1f3e2d29e7c13c84c0e90e5fae00f98bd27af29ac49a615a50f16f431cd0cb3f020237671d6cb269853d7d0db40191b088022dcce46ac29a180e5b35296e3ae5b9fd33d6234c50056c43be0e96741b1d5f0b88cecf70495a2e91beef0d83c734c14c56399f9b2fca3b458ab16621f316447425a5af128484b29267a8779665d7e1905c08e8090d7582070b91fcd7f987664f013bd0480a48da4774f5b61b31144dcd77d86f12f47b9973bd45401744b6525821fe55c60f117c9d4bec687721b0d969d0079abb33a8eb32c7b91ac3a4b6cbffd8c1e1af5968ba3234c01e55d34d2eb0cdcc877b46ec481d545298544b3d80b1fb1e8077fe8c3eb267db0c200567fc4d2d1d4684ad0d96403a1d01e6aec1e493b8921fede0b851373ffdfc29bf973028e675d4d457fde7fe7b40dd44412894944e16824bd1d9ec344296d79d9a9dffaac7ca3d1b2d763823177a8e3931f288610ce96ba5c0d0ad79e63db93a1acca05a7890883b19ce7017412a8e511ccdb60630319ac1d48d77ab2c232594ae325e50c962685974744aaa99ddb9ec4363fa691a043fb8f5dee520320e2f017811ffc7c4fb55f0a4a57d702ec69ecc37630b17495433be365ddf046426b3b23eaf89eaa2a2d93fafac78211cd726145e33e5c11aac277f669c819306315c0fe94a7e1a98c55e4e639688db38064b7547e222cf8f52fda12c011fe59a550f6309e8c04a86eff53d1ab4e7e5f22e65aef6730c4fcf2f0dc0b4c7573bd8cb5dd2f0efcc708ce7e22d46bbdfabf587a61179d013bbca350f6ab4925f0a83c0d0aaf5f8292fb3852cb4fd9d8ebd54f535eae51df2ec15cd512e457efdee967fc6fb284130a59af4ba983a81c9bbc9944ea2b5fd4792e54d3af9957abfdf6a5dfb59802ecfed6d5dae5d3b59baf4b8d024c75526348c1daddd2af39c82a5efb33be4d1fd513e4f3d508fce6212932ed8723a1ec71d8896947baf5ac3373c6f2c5a6600f8bf6150e8ff6388619359c5ca48a6c88323bf8051c55dc4624eefc9847d8bfc3fc431d9f2a524e4f8938d25030955974f998f56791d68873dee0dd0fe118c8985af9a97ee75e22cb574dd2ada7c44196c40e238dca5f45e974233c26a95975fdfdcdc4767ea3179900a2ee4e39f0289bcefa5427e973b85f0ee147c03ed895e9880d18851a04656fcbfa36d2c151bd876aa143e340d2b312c4fe69861253b42d15b20096c520e2bdbcf37fba86675bd0ce4f947aad29b409bc8f9b9b5bdfe49f6162e08ca1192e77d793b2047a24c7224b31e03ffa97027279e0d9b807dcf5554d0fc465ab8fa913bbfaa106dfc6dd75a6e6e17aae311606bdc08d0e8029d06cf1196291edf956dcaea8856ed7d6733b70effa2ebbac3f1001ccf8cfb6ef6d926d3ed21f8ab49d21f0ce8bd7370b0eff6a8de3609ab9af3da18d58b5404716797176e8aac69b20e04be1cc47fba58ff94ace8eecbacbc300bc9d903ee8caaf3a346e395021c55a0d6b85f0af87ee3cb3940ddfb23005040f3784d07d7787a90ccfac21ecc261ab779256b715810347602cc4776e24a087c9f2f0498b130f4236117d029023204fe002bbe5f212a4f073d06c58307a803597b6765898d61d139c829572037be815fd727de6da1e0530834c62546880cfbf0e29834ab44669320a4970da5e4e302c17b52dd5830f6c997890e799f1a5619e75914bf180ff952c2332da33a27959d2f8ac88a4e6206d3541865102daa54d652470d85f3a46c4d4138e62dac04c5afb1c2b41d1db2f19aff13aed664b4fc9bf96842ae4134e81b96896a0d167d47be0d9e2348851fadf2f64bc47545411d391ee5cb51af05fdc1ee3f351dd3659fa34c85552e1762d7456a6fe0b7ffb671e378847b239f677aea2d93ce497188480369968ac7d6873df187f95438b01cad143c4402ab0b1beffeba583f81cc440d2474c0b88b458afa1daa17cfaf225cd49caa955ffb8b2b68942948a696cfa1ec8b926bf514453ecfe078655e1a4534a3b26ed935c06f3f2a31f35e8bc2d4e9e529111ccb0eeebf729a905be5b34d8c7d44280cbe3438784a631ba5b4da48c715fe805d162194015794356d83b96c23d15b5b2dd4bea06c6ac0e4e6ffd28968da9c889ec9224911a85be6c1501dbba990561d712808fe09f95c53f9b4da860ed55a98574fad0cbf4c82fea7e9d5d91f5e2fc09a94e25a2b38ccd29bb99f5fcda80ab6861972509eb8d97ca220452aa2e28b02336e8c01f484cfe0a441ffc4d873f564397461dc7dad7495c897a86257039c17eb0e11df3511da5b3a0758f6cce11cce8533a757f40abbab66983b4ba547fba12fb45bd2391ffc3a0fc896678167cd1b8e50859c72a3d77d6a16a1b9d0022d8f1aa8fcfbcda960ad63376ce66b4f6b3b9444b7288f739034bfa5f2a52ef261c8402153c01fa3a60bb82c1ec58f917b5443bb0d5552c74190226b37d1e0ca7f69e7c2afbef5d2815c5ec4a3e11ab5213282fc325080bf72f5bb2c465a8654db8f20d36476bfa4d9007dcf05f2aeac51c1704e7049f4d390d5527353e4dc28bcb3bd1657ad06021ec61c5b13fd7ebc7dba8924d35460fe8cd537abd749a4a3fa51c41c1d16bcebfa1262cfcc49e042a44dc6507c3f039f73e38f7aa6b4c1746d6db6e7b5a6b489340dffc5ae15aa05112a3b2383318d3818262faf5caa1406000299d6e2bd45c5e8ead0747ba0eb489471064ddbbea97e8a6c1ac7b85ce964e04186b1effd175cc17b4bb3982a01e36bc409d28f8429bf2169f1abf779837f7baf3e4f4fc3087e2df864417246b243672270db76eeba3d4dcdcb574e6baa1c3c00a44f3638cde6e09a46c93ae9ce7c6cd09000000e8ee65af6aa6909e894dd240a68436b718ab2b2d1817df1204fbf75f84a3fb213f95a4524f6311c826fe2d46e8fb486f88457ff368a2cbc1afacaa919d9eeaa58f49a378c49c5c747deca079b9f47c54fbf21e373d50a354014413c992af6652ecf18c2bb72708b75da36601565df5e86385fe37d9869f0a59a1c0cc4ad53f474e34787ebf7d59ecd73d9c5bbcf2d8dbe6a4a0aa3efbf0f1a421ecc861c0c2771662f428b0b15af1e93665ad7df825fd043796f2eae1a8c80c0dec919c5f88e5daa8be29a02e415ef3dadfb46c22ba1b496041a6b615a92b46aa04e00e2d59743cdc4299490af9d179eadf486e6dcada00eb6674d8661cedfd36737ca6139ebb8dca5545aa0f8830aebfbfb77745c07d577ef83be2e175f6527f008b85f1f6beaf52af7728784131022a177b619adffd1c79f65fd4104f69c23eb4728198d19d9bfd5e811a1c20e9ce57a2490dc799da03b85f69640fdb6e20d000c8a97d198460f3227ae801b64cb94efc05d7c8f6d14d39819408a78632a223c07e063e6194359d93535e0ec4edcde46dfc9db0500fa77020d94471bd31d79e1944ed09271eeacf71f424fb6f8b3ce4c7080a23922d46d5041a55ad76f8f6137b411385bc1536fb75cfea954df4df53e4c80017b9f42e6ee89e25fa109cfe44ed8267a555d3efcae2a4a0abdf4a6ca6aa2d7d7c582ed09a6af0a090c407860331efad4b29b572e891282053ebea834b3b8ce7c5136f315ae10900e491284ee47b00549f3d02194a949756a1590e2e4a3af3707aed2746923136bb409cac56389d3e891808caa1f155d21549f70a0b85ffbeb675fc5d7c0a0603edadcabdd09524583a6b000100c910f5ad64bbf211a64ddf3532308b213a91c714ba47b1ad81a8d3ea3567f18bd1f81970ad31cf69a8794eadead9b491fbf629d0749978760b9a8755e0584be9e576a0e53a1e7718d238695e23110907af44c84f71cf50ad59b771757f1ed301bb425d64d39c5c000000000000"], 0x2280}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000027c0), &(0x7f0000002800)=0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002740)={0xffffffffffffffff, 0xc0, &(0x7f0000002680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x1aa, 0x0, 0x0, 0x0, &(0x7f0000002580)={0x2, 0x5}, 0x0, 0x0, &(0x7f00000025c0)={0x2, 0xd, 0x1, 0x5}, &(0x7f0000002600)=0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002640)=0x9}}, 0x10) socketpair(0x1d, 0x800, 0x4, &(0x7f0000000300)={0xffffffffffffffff}) sendmsg$SOCK_DIAG_BY_FAMILY(r2, &(0x7f0000000580)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000540)={&(0x7f0000000380)={0x1a0, 0x14, 0x0, 0x70bd2a, 0x25dfdbff, {0xf, 0x2}, [@INET_DIAG_REQ_BYTECODE={0xa7, 0x1, "b1628b8d29cb2053740c3224aa104cdc12acf872af3d28412cc7ba94ceb48542d22d5aafe6d7244c3a666fe51a2927d249ae890d76c5206c1ab6053a893edc47c295fa23137419bda7a217c06cfce3fe83e9752171f14911128c43d2b45476f5d6f6a2329cde900ccadc1ce377cfc2cd59d66457a19abc38f1cc88dd67d60769eda74d62377ae67547ea17b42b24aaadbb035ccb25246e85f32a1068c9a79ae1686229"}, @INET_DIAG_REQ_BYTECODE={0xa2, 0x1, "e0bfdc457f4954d07f078a7aee2accb0de56602cfa91c3bd42d731be527c2fb3cd049e5a1bdd1c7230f5f30eef9b2b80ed380725a8a0268f794823ff18e53ff56f535466dcb2f31266e2b91975a0a35e681431e6bad1ffdeb6ded1168bf21d78504913b8393ebbeb6fbd4e77d91f44bf25107d064de846fee2fd5e547b32ed42d6c5f746d2b51f33d6486abff39132c50c981eed981ce47c21ca87ab4c39"}, @INET_DIAG_REQ_BYTECODE={0x31, 0x1, "8e9938ffa131cb01d01c58947ea5a12adc68019096910127693d0aabbae497428b41d378e2e4780d24a2803bf6"}, @INET_DIAG_REQ_BYTECODE={0xb, 0x1, "9e39d7d9c524ae"}]}, 0x1a0}, 0x1, 0x0, 0x0, 0x24000000}, 0x40040) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000002780)=r1, 0x4) r3 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000002840)={0x1f, 0x0, @none}, &(0x7f0000002880)=0xe, 0x100000) setsockopt$bt_l2cap_L2CAP_OPTIONS(r3, 0x6, 0x1, &(0x7f00000028c0)={0x2, 0xffff, 0x4, 0x3, 0x4f, 0x4, 0x400}, 0xc) 18:41:25 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x7d000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:25 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, 0x0, 0x1, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_LINK={0x8}, @GTPA_TID={0xc, 0x3, 0x1}, @GTPA_O_TEI={0x8, 0x9, 0x3}, @GTPA_I_TEI={0x8, 0x8, 0x1}]}, 0x38}, 0x1, 0x0, 0x0, 0x20048022}, 0x800) 18:41:25 executing program 1: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000080), 0x2) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) [ 2089.843298] misc userio: No port type given on /dev/userio [ 2089.876910] misc userio: No port type given on /dev/userio [ 2089.925174] misc userio: No port type given on /dev/userio 18:41:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c00, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:25 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) openat$nullb(0xffffffffffffff9c, &(0x7f0000000100)='/dev/nullb0\x00', 0x2, 0x0) write$P9_RLERRORu(r1, &(0x7f00000000c0)={0x19, 0x7, 0x2, {{0xc, '/dev/userio\x00'}, 0x1c1b}}, 0x19) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000080)={0x30, 0x6f, 0x1, {0x3, [{0x10, 0x1, 0x100000005}, {0x1, 0x4, 0x2}, {0x8, 0x4, 0x7}]}}, 0x30) [ 2089.969721] can: request_module (can-proto-4) failed. 18:41:25 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x7d010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:25 executing program 0: r0 = getpgid(0x0) getpgid(r0) sched_rr_get_interval(r0, &(0x7f0000000040)) r1 = syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/ipc\x00') ioctl$NS_GET_PARENT(r1, 0xb701, 0x0) [ 2089.996852] misc userio: No port type given on /dev/userio [ 2090.014368] can: request_module (can-proto-4) failed. 18:41:25 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000000)={@loopback}, &(0x7f0000000040)=0x14) 18:41:25 executing program 1: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000080), 0x2) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6800, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) [ 2090.047733] misc userio: No port type given on /dev/userio [ 2090.068501] misc userio: No port type given on /dev/userio 18:41:25 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ocfs2_control\x00', 0x0, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) openat$userio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/userio\x00', 0x12000, 0x0) inotify_init() write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000100), 0x2) bind$802154_raw(0xffffffffffffffff, &(0x7f0000000080), 0x14) 18:41:25 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x7e000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:25 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/pid\x00') sendmsg$RDMA_NLDEV_CMD_SET(0xffffffffffffffff, &(0x7f0000001100)={&(0x7f0000001040)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000010c0)={&(0x7f0000001080)={0x40, 0x1402, 0x114, 0x70bd29, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}]}, 0x40}, 0x1, 0x0, 0x0, 0x44000}, 0x20000000) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) r1 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_LOCK(r1, 0xb) shmctl$SHM_STAT(r1, 0xd, &(0x7f0000000040)=""/4096) [ 2090.198617] misc userio: No port type given on /dev/userio [ 2090.218166] misc userio: No port type given on /dev/userio 18:41:25 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100187939846bac8b25f861767299be6e2a000100000000000c0000000c00000002000000000000000040e02887b8f346958ef1569c42c17d2854139f2f8a36c9bbe6c05ede199bbc53d084fc557a844eaec6055d9a7ada"], &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c00, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:25 executing program 1: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000080)={0x1, 0x2}, 0x2) write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000040), 0x2) 18:41:25 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x7e010000, 0x0, 0x0, &(0x7f0000000040)) [ 2090.258469] misc userio: No port type given on /dev/userio 18:41:25 executing program 2: openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000080)={0x0, 0x9}, 0xffffffffffffffa9) 18:41:25 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') r1 = ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) sendmsg$RDMA_NLDEV_CMD_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x90204}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, 0x1402, 0x100, 0x70bd28, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz0\x00'}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz0\x00'}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r1}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000810}, 0x4041) ioctl$NS_GET_PARENT(r1, 0xb701, 0x0) 18:41:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0xa, [@const={0x9, 0x0, 0x0, 0xa, 0x5}]}, {0x0, [0x0, 0x0, 0x61, 0x5f, 0x0, 0x61, 0x61, 0x30]}}, &(0x7f0000000280)=""/244, 0x2e, 0xf4}, 0x20) 18:41:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7400, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:26 executing program 1: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000080)={0x1, 0x2}, 0x2) write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000040), 0x2) 18:41:26 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x7f000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:26 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000040)) 18:41:26 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f00000000c0), &(0x7f0000000100)=0xc) r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r1, &(0x7f0000000040), 0x2) 18:41:26 executing program 1: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000080)={0x1, 0x2}, 0x2) write$USERIO_CMD_REGISTER(0xffffffffffffffff, &(0x7f0000000040), 0x2) 18:41:26 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x7f010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a00, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:26 executing program 3: write$P9_RRENAMEAT(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x4b, 0x1}, 0x7) r0 = accept(0xffffffffffffffff, &(0x7f00000001c0)=@ax25={{0x3, @rose}, [@netrom, @rose, @netrom, @default, @default, @rose, @remote, @null]}, &(0x7f0000000240)=0x80) syz_genetlink_get_family_id$gtp(&(0x7f0000000180)='gtp\x00', r0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb0100480111dc00000000000000000000000003000000006100"], &(0x7f0000000080)=""/144, 0x1b, 0x90, 0x1}, 0x20) 18:41:26 executing program 0: syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') setns(r0, 0x80) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) [ 2090.601466] misc userio: No port type given on /dev/userio 18:41:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x8800, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) [ 2090.644657] misc userio: No port type given on /dev/userio 18:41:26 executing program 1: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000080)={0x1, 0x2}, 0x2) write$USERIO_CMD_REGISTER(r0, 0x0, 0x0) 18:41:26 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_GET_SEC_LEVEL(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, 0x0, 0x101, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000004}, 0x8000) 18:41:26 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x80010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:26 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r0, 0x800443d2, &(0x7f0000000100)={0x3, &(0x7f00000000c0)=[{}, {@none}, {}]}) r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r1, &(0x7f0000000040), 0x2) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000001240)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000080)='mptcp_pm\x00', r2) 18:41:26 executing program 0: r0 = getpgid(0x0) getpgid(r0) r1 = syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r1, 0xb701, 0x0) [ 2090.792525] misc userio: Invalid payload size 18:41:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xfffff, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="9fe3010004000000000000000c0000000c00ec6622762d10fe00d6000002000000000000000000000600"], &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/mnt\x00') [ 2090.816110] misc userio: No port type given on /dev/userio 18:41:26 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x81000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:26 executing program 1: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000080)={0x1, 0x2}, 0x2) write$USERIO_CMD_REGISTER(r0, 0x0, 0x0) 18:41:26 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x2b4601, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xffffff, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:26 executing program 0: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000040)={0x0, 0x0}) r1 = syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/mnt\x00') ioctl$NS_GET_PARENT(r1, 0xb701, 0x0) 18:41:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x800, 0x0, 0x0, 0x6}]}}, &(0x7f0000000180)=""/150, 0x26, 0x96, 0x1}, 0x20) ioctl$IOCTL_GET_NUM_DEVICES(0xffffffffffffffff, 0x40046104, &(0x7f0000000080)) r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) accept(r0, &(0x7f00000000c0)=@vsock, &(0x7f0000000240)=0x80) write$P9_RATTACH(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x69, 0x2, {0x20, 0x1, 0x5}}, 0x14) [ 2090.985734] misc userio: Invalid payload size 18:41:26 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x81010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:26 executing program 1: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000080)={0x1, 0x2}, 0x2) write$USERIO_CMD_REGISTER(r0, 0x0, 0x0) 18:41:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1000000, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:26 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) getsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000000c0)=0x48) 18:41:26 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') r0 = getpgid(0xffffffffffffffff) syz_open_procfs$namespace(r0, &(0x7f0000000040)='ns/ipc\x00') 18:41:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) ioctl$IOCTL_CONFIG_SYS_RESOURCE_PARAMETERS(0xffffffffffffffff, 0x40096100, &(0x7f00000000c0)={{&(0x7f0000000000)={'Accelerator1\x00', {&(0x7f0000000340)=@adf_hex={@bank={'Bank', '2', 'InterruptCoalescingEnabled\x00'}, {0x1}, {&(0x7f0000000280)=@adf_hex={@format={'Cy', '2', 'RingTx\x00'}, {0x4}}}}}}}, 0x3f}) 18:41:26 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x82000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:26 executing program 1: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x7d000000, 0x0, 0x0, &(0x7f0000000040)) [ 2091.150998] misc userio: Invalid payload size [ 2091.162917] misc userio: No port type given on /dev/userio [ 2091.186804] misc userio: No port type given on /dev/userio 18:41:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2000000, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:26 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) syz_mount_image$sysv(&(0x7f0000000080)='sysv\x00', &(0x7f00000000c0)='./file0\x00', 0x7, 0x6, &(0x7f0000000340)=[{&(0x7f0000000100), 0x0, 0x1}, {&(0x7f0000000140)="49cf71493280bd29171715b65d67b1de91a782101dec4775c06255eb6ed5aed929ab699ffa65dd0637a7c81ede0acd75b325bb15", 0x34, 0xfffffffffffffffd}, {&(0x7f0000000180)="b7aa3260e04a83b54582d1a29666547a8cad1400a07ed41ca396c12d412434b8522c63231510e158762df9", 0x2b, 0x3}, {&(0x7f00000001c0)="d75af7759cfb6dcec07537704616fab80f1145a772696edcbdb24c5265219ceb5e75d28894ffb9774c4aaf64c84a593309b44bb0f33b06cd8ee8936d7c7b9ee1ca576f47d01fef9063e974b842565d98ac32588480a851cdc00fff2367e843c3e9a98c2dc4fe64d69d5b55e4162534510dc610e8c88365c94b0ed6c2899d221bd0323d8d4ca1ea", 0x87, 0x6}, {&(0x7f0000000280)="ee4ab039af7bad63dc3dafc5474ba59153f8ddb6c4ea88501b210afd0d205b7dae5bad5f35b8fb689db92685c0703b615ba7fc38e262a444913ba28a0e831d8b43", 0x41, 0x7}, {&(0x7f0000000300)="ab4c9c48", 0x4, 0x8001}], 0x10d1c00, &(0x7f0000000400)=ANY=[@ANYBLOB="4e28262c3a242c2f6465762f75736572696f002c242c2f6465762f75736572696f002c2d2c2f6465762f75736572696f002c2c2f6465762f75736572696f002c126465762f75736572696f002c726f6f74636f6e746578743d73797374656d5f752c6f626a5f726f6c653d2f6465762f75736572696f002c686173682c0000000000000ac56f6f696f002c657569643c", @ANYRESDEC=0xee01, @ANYBLOB=',fsuuid=364e77d5-5fa7-15e8-c825-4842035a,fsname=/dev/userio\x00,\x00']) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:26 executing program 0: syz_open_dev$char_usb(0xc, 0xb4, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:41:26 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x82010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:26 executing program 1: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) write$USERIO_CMD_SEND_INTERRUPT(r1, &(0x7f0000000080)={0x2, 0x9}, 0x2) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="9febffffff7f0000000000000c0200000c0000000200000000000000000000060000000000009d4fc0442801d81746c7073e711edf98e19891ff2a4a629bc71e9aa0748d2cc6e9297cac5a9e8eaebf1b0f2ccd9c6bf82f6988fe7ee7321b4aec666912bf3f7f1a98c236fbd03ab9c061c425744d1196a15822325c3dff43a717d55f9040f046f4401391ab9071251f367ca5aac78785e7a0bcb1d2c748f5826950cc0e1b8a84b653c53de5f6f858df424e30cd4139f5396825ae82537f27bd56da83c8c71507291b5ead378e47c742122c348d76fe81793394"], &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x3000000, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:27 executing program 0: accept(0xffffffffffffffff, &(0x7f0000000180)=@tipc=@name, &(0x7f0000000200)=0x80) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000240)={0x68, 0x29, 0x2, {0x5, [{{0x2, 0x0, 0x7}, 0x80, 0x9, 0x7, './file0'}, {{0x0, 0x0, 0x1}, 0x7, 0x5, 0x7, './file0'}, {{0x10, 0x1, 0x6}, 0x0, 0x3, 0x7, './file0'}]}}, 0x68) openat$char_raw_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/raw/rawctl\x00', 0xd4441, 0x0) r1 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) openat$char_raw_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/raw/rawctl\x00', 0x4200, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8910, &(0x7f0000000140)={'wlan1\x00'}) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) openat$tcp_mem(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x800, 0x0) 18:41:27 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x83000000, 0x0, 0x0, &(0x7f0000000040)) [ 2091.409772] misc userio: No port type given on /dev/userio [ 2091.420462] misc userio: No port type given on /dev/userio 18:41:27 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000000b00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00060003000000030000000c00060003000000000000000c000600000000000000000006000a00a1aa000006000a00000000000c000600030000000000000006000a00a1aa00000c000600020000000000000008000300", @ANYRES32=r3], 0x78}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="010000000000000000000b00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00060003000000030000000c00060003000000000000000c000600000000000000000006000a00a1aa000006000a00000000000c000600030000000000000006000a00a1aa00000c000600020000000000000008000300", @ANYRES32=r7], 0x78}}, 0x0) sendmsg$NL802154_CMD_GET_SEC_KEY(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100088}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x54, 0x0, 0x1f39e3cfafca65c9, 0x70bd25, 0x25dfdbfc, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r3}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r7}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x54}, 0x1, 0x0, 0x0, 0x640040d5}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) [ 2091.451015] misc userio: No port type given on /dev/userio 18:41:27 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x242, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4000000, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:27 executing program 1: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) write$USERIO_CMD_SEND_INTERRUPT(r1, &(0x7f0000000080)={0x2, 0x9}, 0x2) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:27 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/time_for_children\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000180)='/dev/vcsu#\x00', 0x3ff, 0x1) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f00000003c0)={0x0, @xdp={0x2c, 0xa, 0x0}, @nfc={0x27, 0x1, 0x0, 0x6}, @l2={0x1f, 0x45, @none, 0x800, 0x1}, 0x1, 0x0, 0x0, 0x0, 0x8001, &(0x7f0000000380)='veth1_vlan\x00', 0x7, 0x524, 0x1000}) sendmsg$nl_route(r1, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)=@ipv6_newaddrlabel={0x40, 0x48, 0x10, 0x70bd28, 0x25dfdbff, {0xa, 0x0, 0x40, 0x0, r2, 0x747}, [@IFAL_ADDRESS={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @IFAL_LABEL={0x8, 0x2, 0x7}, @IFAL_LABEL={0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x20000895}, 0x44011) setns(r1, 0x10000000) sendmsg$RDMA_NLDEV_CMD_SET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x44, 0x1402, 0x100, 0x70bd28, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz1\x00'}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}]}, 0x44}, 0x1, 0x0, 0x0, 0x20004000}, 0x6008000) 18:41:27 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x83010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x5000000, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:27 executing program 3: inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x82) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) inotify_init() ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000000)=0x4) [ 2091.624762] misc userio: No port type given on /dev/userio [ 2091.636658] misc userio: No port type given on /dev/userio 18:41:27 executing program 1: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) write$USERIO_CMD_SEND_INTERRUPT(r1, &(0x7f0000000080)={0x2, 0x9}, 0x2) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:27 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000040)={0x9, 0x9, 0x47, 0x4, 0x3f, 0xf8, 0x800}, 0xc) 18:41:27 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x84000000, 0x0, 0x0, &(0x7f0000000040)) [ 2091.684944] misc userio: No port type given on /dev/userio 18:41:27 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) getsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000100)=0x48) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6000000, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) [ 2091.790251] misc userio: No port type given on /dev/userio 18:41:27 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x84010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:27 executing program 1: syz_open_dev$char_usb(0xc, 0xb4, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:41:27 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040)='gtp\x00', 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r2, 0x1}, 0x14}}, 0x0) sendmsg$GTP_CMD_DELPDP(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x44, r2, 0x10, 0x70bd25, 0x25dfdbfc, {}, [@GTPA_TID={0xc}, @GTPA_MS_ADDRESS={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x28}}, @GTPA_O_TEI={0x8, 0x9, 0x4}, @GTPA_TID={0xc}, @GTPA_MS_ADDRESS={0x8, 0x5, @broadcast}]}, 0x44}, 0x1, 0x0, 0x0, 0x8005}, 0x40) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) [ 2091.881843] misc userio: No port type given on /dev/userio [ 2091.903983] misc userio: No port type given on /dev/userio 18:41:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7000000, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:27 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0x9, 0x202001) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) r3 = getpgid(0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000640)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000040)={r4, 0x0, r0, 0x88}) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000240)={[], 0x82cd, 0xb76, 0xffff, 0x7, 0xa4, r3}) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r6, &(0x7f0000000300)={0x18}, 0x18) getsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000380)={@empty, 0x0}, &(0x7f00000003c0)=0x14) sendmsg$DCCPDIAG_GETSOCK(r6, &(0x7f0000000600)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000400)={0x4c, 0x13, 0x100, 0x70bd28, 0x25dfdbfb, {0x1f, 0x5, 0xf7, 0x0, {0x4e20, 0x4e20, [0x72, 0x4f2f, 0x3, 0x6], [0xafc9, 0x0, 0x6, 0x1], r7, [0xd62b, 0x9]}, 0x7, 0x2}}, 0x4c}, 0x1, 0x0, 0x0, 0x2000000}, 0x1) write$P9_ROPEN(r5, &(0x7f0000000300)={0x18}, 0x18) sendmsg$RDMA_NLDEV_CMD_SYS_SET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f0000000480)=ANY=[@ANYBLOB="8aa66710c562dcc504c703e1bbc30934eb796c8fa15bc4a1439f3ff50b803e09b6a938fb225708311cff4f5fd8f9e83e7048cae96dcfbe7d5a7fb1550c48048bf449055c31ef5dcd1241040de72391d9b4804695d4294eac13011ebd71e00318f984c87822464733bff3494a80e6a1037f599755c5b29d96c5f955e18f06488c1df4", @ANYRES64=r5, @ANYBLOB='\b\x00D\x00', @ANYRESDEC, @ANYRESDEC=r0, @ANYRES32=r0, @ANYBLOB='\b\x00D\x00', @ANYRES32=r1, @ANYBLOB="9814e1b5497466d9976cf7e4432fa75d792eef59b043f3a5e40097f3466db8dfd16cc7ba6a783336bab2b5dd32c5315c37e7daeb404b6d323503243baaf3c365af34cd52fbf3ce5f"], 0x3c}, 0x1, 0x0, 0x0, 0x48004}, 0x800) 18:41:27 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, 0x0, 0xeca58c52d3e16053, 0x70bd27, 0x25dfdbfb, {}, [@NL802154_ATTR_NETNS_FD={0x8, 0x1d, r1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x880}, 0x20004004) r2 = syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0x6a, 0x620001) write$USERIO_CMD_SEND_INTERRUPT(r2, &(0x7f00000000c0)={0x2, 0x9}, 0x2) 18:41:27 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x85000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:27 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) read$char_usb(0xffffffffffffffff, &(0x7f0000000040)=""/25, 0x19) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r2, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r3, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_SET_CHANNEL(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r3, 0x2, 0x70bd27, 0x25dfdbff, {}, [@NL802154_ATTR_PAGE={0x5, 0x7, 0x1}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_CHANNEL={0x5, 0x8, 0x14}]}, 0x30}}, 0x4000801) 18:41:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x12, [@int={0xe, 0x0, 0x0, 0x1, 0x0, 0x48, 0x0, 0xc, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x2a, 0x89, 0x1}, 0x20) 18:41:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xa000000, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:27 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000040)=0x9, 0x8) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r1, 0xb701, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x101) write$P9_RVERSION(r0, &(0x7f0000000080)={0x13, 0x65, 0xffff, 0x3c, 0x6, '9P2000'}, 0x13) [ 2092.063173] misc userio: No port type given on /dev/userio [ 2092.092395] misc userio: No port type given on /dev/userio 18:41:27 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x85010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:27 executing program 2: sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x1c, 0x0, 0x8, 0x70bd26, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x24000041) r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f00000001c0)={0x2, 0x9}, 0x2) openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x800, 0x0) 18:41:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1800, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:27 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040)='mptcp_pm\x00', 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x4c, r1, 0x1, 0x70bd29, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x30, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @ipv4={[], [], @empty}}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x9}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @empty}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x801}, 0x44884) 18:41:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xc000000, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:27 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x86000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:27 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40201a5}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=@newlinkprop={0x58, 0x6c, 0x400, 0x70bd2c, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0x50, 0x10}, [@IFLA_GSO_MAX_SIZE={0x8, 0x29, 0xcea}, @IFLA_BROADCAST={0xa, 0x2, @dev={[], 0x23}}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0x100}, @IFLA_NUM_TX_QUEUES={0x8, 0x1f, 0x550}, @IFLA_ADDRESS={0xa}, @IFLA_MASTER={0x8}]}, 0x58}, 0x1, 0x0, 0x0, 0x4054005}, 0x4008831) r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000500)='/dev/userio\x00', 0x200100, 0x0) write$USERIO_CMD_REGISTER(r1, &(0x7f0000000540)={0x0, 0x7}, 0x2) r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/cgroup\x00') r3 = accept(r0, &(0x7f00000001c0)=@nfc, &(0x7f0000000240)=0x80) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f00000002c0)={@initdev, 0x0}, &(0x7f0000000340)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000380)={@dev, 0x0}, &(0x7f00000003c0)=0x14) sendmsg$MPTCP_PM_CMD_GET_ADDR(r3, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x5c, 0x0, 0x4, 0x70bd29, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR={0x40, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e21}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r4}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r5}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x2}]}, 0x5c}, 0x1, 0x0, 0x0, 0x48000}, 0x20048044) ioctl$NS_GET_PARENT(r2, 0xb701, 0x0) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r6, &(0x7f0000000300)={0x18}, 0x18) write$P9_RRENAMEAT(r6, &(0x7f0000000180)={0x7, 0x4b, 0x1}, 0x7) [ 2092.280688] misc userio: No port type given on /dev/userio [ 2092.296287] misc userio: The device must be registered before sending interrupts 18:41:27 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) getpgid(0xffffffffffffffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000180)) r1 = getpgid(0x0) getpgid(r1) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000200)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000280)) r3 = getpgid(r2) r4 = timerfd_create(0x0, 0x800) ioctl$TIOCCBRK(0xffffffffffffffff, 0x5428) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) timerfd_settime(r4, 0x1, &(0x7f00000000c0)={{0x0, 0x3938700}, {r5, r6+60000000}}, &(0x7f0000000100)) syz_open_procfs$namespace(r3, &(0x7f0000000140)='ns/user\x00') 18:41:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x10000000, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:27 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x86010000, 0x0, 0x0, &(0x7f0000000040)) [ 2092.344509] misc userio: No port type given on /dev/userio [ 2092.369339] misc userio: The device must be registered before sending interrupts 18:41:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x40, 0x40, 0x8, [@func={0x5, 0x0, 0x0, 0xc, 0x5}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x2, 0x5}, {0x8, 0x4}, {0x7, 0x5}, {0xa, 0x1}, {0x6, 0x4}]}]}, {0x0, [0x5f, 0x2e, 0x61, 0x5f, 0x30, 0x0]}}, &(0x7f00000001c0)=""/137, 0x60, 0x89, 0x1}, 0x20) 18:41:28 executing program 2: openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) 18:41:28 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000040)='/dev/md0\x00', 0x400, 0x0) ioctl$BLKREPORTZONE(r1, 0xc0101282, &(0x7f0000000900)=ANY=[@ANYBLOB="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"]) setsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, &(0x7f0000000080)=0x1, 0x4) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:41:28 executing program 1: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x7b000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:28 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x87000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x18000000, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:28 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:28 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/time\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:41:28 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x2, 0x0) timerfd_create(0x1, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000240)={@remote, 0x0}, &(0x7f0000000280)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000200), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)=@newlinkprop={0x28, 0x6c, 0x200, 0x70bd2b, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, 0x1, 0x1000}, [@IFLA_OPERSTATE={0x5, 0x10, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x4040000}, 0x801) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18}, 0x18) ioctl$IOCTL_STATUS_ACCEL_DEV(0xffffffffffffffff, 0x40046103, &(0x7f00000003c0)={0x6, 0x800, 0x4e3f, 0xf7, 0x0, 0x1, 0x6, 0x7, 0x5, 0x1f, 0x3, "a83a5562e28e3a9a18012e61ff2f4e03a99029b430aca3d99ba2d9bb103be232"}) sendmsg$RDMA_NLDEV_CMD_SET(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x44, 0x1402, 0x4, 0x2, 0x25dfdbff, "", [@RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r0}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r0}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz0\x00'}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000000}, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r1, 0x541c, &(0x7f0000000080)) 18:41:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x60, 0x60, 0x7, [@const={0xe, 0x0, 0x0, 0xa, 0x2}, @union={0xa, 0x5, 0x0, 0x5, 0x0, 0x2, [{0x10, 0x2, 0x6}, {0xa, 0x3, 0x9}, {0xa, 0x0, 0x9}, {0x0, 0x2, 0x68fa}, {0x9, 0x0, 0x81}]}, @restrict={0xe, 0x0, 0x0, 0xb, 0x3}]}, {0x0, [0x2e, 0x30, 0x61, 0x61, 0x61]}}, &(0x7f00000000c0)=""/115, 0x7f, 0x73, 0x1}, 0x20) 18:41:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x1a000000, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:28 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x87010000, 0x0, 0x0, &(0x7f0000000040)) [ 2092.663945] misc userio: No port type given on /dev/userio [ 2092.690346] misc userio: No port type given on /dev/userio 18:41:28 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000003c0)={&(0x7f0000000100)=ANY=[@ANYRESDEC=r0], &(0x7f0000000000)=""/136, 0x56, 0x88}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0xc, [@enum={0xc, 0x1, 0x0, 0x6, 0x4, [{0x9, 0x4}]}]}, {0x0, [0x5f, 0x30, 0x0, 0x2e, 0x2e, 0x30, 0x0, 0x6f, 0x61, 0x30]}}, &(0x7f0000000340)=""/86, 0x38, 0x56, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000240)={r0, 0x10, &(0x7f00000000c0)={&(0x7f00000001c0)=""/111, 0x6f}}, 0x10) 18:41:28 executing program 1: openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040)={0x0, 0x5}, 0x2) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="210000000702001400405b5c2d7b7b5c232f22387b5b5c2a2f2d3a295d740d0000"], 0x21) 18:41:28 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000180)='ns/pid\x00') sendmsg$RDMA_NLDEV_CMD_SYS_SET(r2, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, 0x1407, 0x400, 0x70bd29, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r3}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz0\x00'}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x240000c0}, 0x20000080) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x3c, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x1, 0x6c}, @void, @val={0xc}}}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x2, 0x10}}, @NL80211_ATTR_PID={0x8}]}, 0x3c}}, 0x0) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:41:28 executing program 2: openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18, 0x71, 0x0, {{0x0, 0xfffffffc}, 0x1}}, 0x18) write$P9_RLERRORu(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0f0000000701008000002708000000"], 0xf) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:28 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x88000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x20000000, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:28 executing program 1: openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040)={0x0, 0x5}, 0x2) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="210000000702001400405b5c2d7b7b5c232f22387b5b5c2a2f2d3a295d740d0000"], 0x21) 18:41:28 executing program 3: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x9, &(0x7f0000000000)=[{0x1, 0x6, 0x1, 0x1}, {0x0, 0x2, 0x80, 0x1}, {0x101, 0x81, 0x1, 0x40}, {0x2, 0x0, 0xfc, 0x1}, {0x200, 0x0, 0x8, 0xd29}, {0x5, 0x24, 0x76, 0x7000}, {0x8000, 0xc8, 0x7f, 0x1}, {0x8, 0x2, 0x11, 0x10001}, {0x6755, 0x1, 0x80, 0x2}]}) r1 = inotify_init() ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000100)={0x0, 0x1, r1, 0x907}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:28 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x9, &(0x7f0000000080), 0x31f, 0x282a86edefc712b0}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180), 0x111, 0x2}}, 0x20) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000200)={'wpan3\x00', 0x0}) sendmsg$NL802154_CMD_SET_MAX_FRAME_RETRIES(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x44, 0x0, 0x8, 0x70bd2c, 0x25dfdbfc, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r1}]}, 0x44}, 0x1, 0x0, 0x0, 0x4040080}, 0x8000) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) r3 = syz_open_dev$vcsu(&(0x7f0000000380)='/dev/vcsu#\x00', 0x200, 0x8c802) write$USERIO_CMD_SET_PORT_TYPE(r3, &(0x7f00000003c0)={0x1, 0x42}, 0x2) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18, 0x71, 0x0, {{0x40}}}, 0x18) write$P9_RLCREATE(r2, &(0x7f0000000100)={0x18, 0xf, 0x1, {{0x80, 0x0, 0x6}, 0x5}}, 0x18) 18:41:28 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x88010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:28 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f00000000c0)={0x18, 0x71, 0x0, {{0x2, 0x100003, 0x9}}}, 0x18) r1 = syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0x3738a5f7, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000140)={0x14, 0x49, 0x1, {0x1, 0x2, 0x8}}, 0x14) socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$sock_ifreq(r0, 0x8920, &(0x7f0000000100)={'bridge0\x00', @ifru_data=&(0x7f0000000040)="d786a064c7b98150286cde3071c00f6b1683781df2c23152de490ee0b35d02a6"}) r2 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/net\x00') ioctl$NS_GET_PARENT(r2, 0xb701, 0x0) r3 = ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) setns(r3, 0x8000000) 18:41:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x48000000, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:28 executing program 1: openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040)={0x0, 0x5}, 0x2) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) write$P9_RLERRORu(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="210000000702001400405b5c2d7b7b5c232f22387b5b5c2a2f2d3a295d740d0000"], 0x21) [ 2093.009343] misc userio: Invalid payload size 18:41:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x2, 0x3}, {0x0, 0x5}, {0xa, 0x5}, {0x2, 0x2}, {0x2, 0x4}]}]}}, &(0x7f00000001c0)=""/130, 0x4e, 0x82, 0x1}, 0x20) 18:41:28 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x89000000, 0x0, 0x0, &(0x7f0000000040)) [ 2093.048066] misc userio: No port type given on /dev/userio [ 2093.086476] misc userio: Invalid payload size 18:41:28 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18, 0x71, 0x0, {{}, 0x2}}, 0x18) ioctl$IOCTL_GET_NUM_DEVICES(r0, 0x40046104, &(0x7f0000000040)) r1 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/time_for_children\x00') ioctl$NS_GET_PARENT(r1, 0xb701, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) 18:41:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x4c000000, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) [ 2093.109221] misc userio: No port type given on /dev/userio 18:41:28 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0xa4443, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:28 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x89010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000002000000008e000057c7f65384e500000006000000000000"], &(0x7f00000001c0)=""/132, 0x26, 0x84, 0x1}, 0x20) 18:41:28 executing program 1: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x78000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:28 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/user\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:41:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x68000000, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:28 executing program 3: r0 = socket$inet6(0xa, 0x3, 0x7) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYRES16], &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x9, 0x2}, 0x0, 0x0, &(0x7f00000000c0)={0x4, 0x1, 0x9, 0x2a2}, &(0x7f0000000100)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x4}}, 0x10) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000380)={0x0, 0x1, r0, 0x3}) 18:41:28 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x8a000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:28 executing program 1: syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x2, 0x0) r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:28 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@getnetconf={0x14, 0x52, 0x200, 0x70bd26, 0x25dfdbfb, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80000}, 0x8014) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:29 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') r1 = syz_open_dev$vcsu(&(0x7f0000000040)='/dev/vcsu#\x00', 0x3ff00000000000, 0x2) write$P9_RLERRORu(r1, &(0x7f0000000080)={0x14, 0x7, 0x1, {{0x7, 'ns/uts\x00'}, 0x44e}}, 0x14) setns(r0, 0x20000000) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:41:29 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x8a010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:29 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x6c000000, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) [ 2093.431045] misc userio: No port type given on /dev/userio [ 2093.438622] misc userio: No port type given on /dev/userio 18:41:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) sendmsg$GTP_CMD_DELPDP(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x58, 0x0, 0x800, 0x70bd27, 0x25dfdbfb, {}, [@GTPA_TID={0xc, 0x3, 0x4}, @GTPA_TID={0xc, 0x3, 0x4}, @GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_MS_ADDRESS={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0xd}}, @GTPA_MS_ADDRESS={0x8, 0x5, @rand_addr=0x64010102}, @GTPA_LINK={0x8}, @GTPA_TID={0xc}]}, 0x58}, 0x1, 0x0, 0x0, 0x80}, 0x40) 18:41:29 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x8b000000, 0x0, 0x0, &(0x7f0000000040)) [ 2093.481777] misc userio: No port type given on /dev/userio 18:41:29 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000740)={'wpan4\x00'}) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000100)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r1, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x2004c001}, 0x44004) r2 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x143, 0x0) write$USERIO_CMD_REGISTER(r2, &(0x7f0000000040)={0x0, 0xf6}, 0xff8e) write$USERIO_CMD_REGISTER(r2, &(0x7f0000000080)={0x0, 0xff}, 0x2) 18:41:29 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) timerfd_gettime(r0, &(0x7f0000000080)) r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r1, &(0x7f0000000040), 0x2) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) 18:41:29 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) sendmsg$GTP_CMD_DELPDP(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='`\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010028bd7000fedbdf250100000008000748", @ANYRES32=r2, @ANYBLOB="0800050000000000080004000a010102060006000200000008000700", @ANYRES32=r0, @ANYBLOB="08000400ac1e01010c000300010000000000000006000600040000000800050064010102"], 0x60}, 0x1, 0x0, 0x0, 0x48000}, 0x240080c0) r3 = fanotify_init(0x2, 0x400) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r4, &(0x7f0000000300)={0x18}, 0x18) fanotify_mark(r3, 0x92, 0x2, r4, &(0x7f00000001c0)='./file0\x00') ioctl$RAW_CHAR_CTRL_GETBIND(r2, 0xac01, &(0x7f0000000200)={0x0, 0x7, 0x0}) ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb701, 0x0) 18:41:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000afd50000000000000000000006000900000000000000cdbbf784dd6efc914f0a47ae27e0bef1e223837b52f3806899fd013f698ca738e859a971f5ad1aaff238aa0300000000000000f1592bf5b79815f9ebfa2a63c3b82a2e7fb0d0ed07af706fe819b39d23775c9ba082d028b0b000000000"], &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:29 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x74000000, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:29 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x8b010000, 0x0, 0x0, &(0x7f0000000040)) [ 2093.657611] misc userio: No port type given on /dev/userio 18:41:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6, 0x0, 0x3}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:29 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040)='gtp\x00', 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r3, 0x1}, 0x14}}, 0x0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r4, &(0x7f0000000300)={0x18}, 0x18) sendmsg$GTP_CMD_DELPDP(r4, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010029bd7000fbdbdf250100000008000400ac1414bb0800020000000000080002000000000008000400ac1414270800090000000000080009000400000008000500ac1414aa"], 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4008c60) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r5, &(0x7f0000000300)={0x18}, 0x18) r6 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ocfs2_control\x00', 0x800, 0x0) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x60, r3, 0x400, 0x70bd27, 0x25dfdbfb, {}, [@GTPA_MS_ADDRESS={0x8, 0x5, @rand_addr=0x64010102}, @GTPA_NET_NS_FD={0x8, 0x7, r5}, @GTPA_I_TEI={0x8}, @GTPA_TID={0xc, 0x3, 0x2}, @GTPA_I_TEI={0x8, 0x8, 0x1}, @GTPA_FLOW={0x6, 0x6, 0x3}, @GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_PEER_ADDRESS={0x8, 0x4, @multicast2}, @GTPA_NET_NS_FD={0x8, 0x7, r6}]}, 0x60}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) ioctl$NS_GET_PARENT(r1, 0xb702, 0x0) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:41:29 executing program 1: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000000100)={0x5, 0x10, 0xfa00, {&(0x7f0000000340), r2, 0x1}}, 0x18) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18}, 0x18) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, 0x1407, 0x400, 0x70bd25, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz0\x00'}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) 18:41:29 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x8c000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:29 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000080), 0x2) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r1, 0xc0182101, &(0x7f0000004280)={0x0, 0x7, 0x20}) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) ioctl$NS_GET_NSTYPE(r1, 0xb703, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) accept$alg(r2, 0x0, 0x0) r3 = syz_open_dev$vcsu(&(0x7f0000000180)='/dev/vcsu#\x00', 0x0, 0x16000) sendmmsg$alg(0xffffffffffffffff, &(0x7f00000041c0)=[{0x0, 0x0, &(0x7f0000001640)=[{&(0x7f0000000340)="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", 0x1000}, {&(0x7f0000000240)="6def9b842e33a754484f50a7a3f9231cd356b220b3afb98a4c51fb74b7426dc9281107e8e92ab79bdb3311ee8b9729d22230ce29eb981cf629e6703a9334491027ee6b7f9f636afa1382af105b653a765c6799b238e19d3a2552bf6ac765d67bf8029c9fbff2c515c49c7502b55a405373159d024207fdc48448bda022740a756a99c82ef6024c0373074a12b38bcb2d753f7f768b0742edabf4d2704bcd", 0x9e}, {&(0x7f0000001340)="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", 0xfe}, {&(0x7f0000001440)="ed804cf3fbdeea5ef16882ab2d665caf8fc72174d6b71a7acf375b145710a5e6cd97c152d6b597586fa7e84f4452960bbe2cb6c3df3e62ded0d8ecede0dbf4fe0aae4d7450fec7d33228ea2aae1ffb488c9269631ccc567e0fdb7647cf75460dbbe5082a53a9697d4b1d34fd0775c03f81e01948ae667e14bcef807f6e62746939d1d629db2eb3b8321c2d22f931dd5d233c6f0c548131978d0e6dda13acaf1da8df15d2bcb2bb1cc1438e09d37a377915e1dabdde218142f59d680d3810d6865c424e406caeb92fb5979f15feb5719efb7f647cf09621a478e188b66233c8", 0xdf}, {&(0x7f0000001540)="0cd76e50b603ed136f5025bfda976721e805d0fef8870c6da363b448e0c23b40dee5e4c2a06e181be7c60e45c0ac922562e92e2030aac8b8ce58272669f94e4eb9e7899a53907c84929c67ca2542e80f9ebf175bfe54f9911bf3c4aeec5f3ab52e02c65245adf18363b71a551b747596b69061fcf39a447ef581ddadf000dcea70619e8a0eb8d2c5fe1c76b977c6c81dd13373875d1cad463f6a6501686361caaa774d940045912b9b64ec82de6b1ae8bd4c33f6c28d711986a276c0554acfa411b642b3ef9bad20a8c104e54f03bd5c8a0c7ea30cdb2aabd9730bb39d06d5776b50c85d06", 0xe5}], 0x5, &(0x7f00000016c0)=ANY=[@ANYBLOB="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"], 0x120, 0x800}, {0x0, 0x0, &(0x7f0000002a40)=[{&(0x7f0000000140)="7d197c40e181e919685c0d4bfbc9f5b65c4334c27208e1dd39082e8299", 0x1d}, {&(0x7f0000001800)="236878374af30ae8c587ddb5e72058f85ea8e0e8cbf21ee6efc019b74671c2c7c356f2aa1eddf3bfa3c7ab1f4f7ec8270e17b82411a9f720b59efb04493fa453fb8f507d696b6524959a0a39a04910e1bd4095c330a1de5003bce02fbefe01bacc693f5721257e372b16c6f308f3842cb31ffa7f5397", 0x76}, {&(0x7f0000001880)="d17c42da7c9e3b78c8b30dd8b9704ae8468f7e217f88efd9f3fdef20c8707d7ad7b971cab53a456777ea85c6dea6ceb999849fc0f3712017432892d0dac72e57abb9d29ef6239dd01f51495133aace80e6e8e26c4a816281ca4120525e8954fc488704e75fd95ede8a5932a95b46dcbe1a54dcfb5d6453813533d25c55f77fd0f8be093f950e73abde20e1b273e5cc4e9ba7b9905104c4753fde32ae11bc28baf9fa641204ce9e38c90de1502e53e990660daeb78b02ee62284375898af7dc7cf0faa1e2dcf0", 0xc6}, {&(0x7f0000001980)="8e78795c789c326be1aef4e4ecc5fcbc9336cc6c29c2aea218ae467c73bbba304b4861367655bb54853d359641d83e1413b3110ff21c071cb18c8913d479eba753465337ddaeb249ea24591f095378498101cb1d3a3998702bbbcdbfaebeb122ed25b78ff16f7e8814767de718964dadc389a7bbbb7c28fee8486f54077c1de12522b35c3c1c91036490f7f8e634eeaa2fbea0b50f19f0af51647c48b32439b1107129aef15b046f1ab431bf22ed941b70", 0xb1}, {&(0x7f0000001a40)="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", 0x1000}], 0x5, &(0x7f0000002ac0)=[@iv={0xe8, 0x117, 0x2, 0xd4, "83819ce27942ca651345aa0aa277999a59077dec5c908690c7bbe9830e728b9b235869699e851843c3fb622ca01bbf169034eff510b6f02a1b787854075e2d17eb34b4a152231182973f0065a3816d1a87aaad69fb3d0e89e041bd6c6ac0a5d6478bfcf110ed376f073e55f6be831476e0e6f74a9df0b32fea4a843c1af761b2834ec6555869f0cae5459bd514fb867505d430c581ee0e657f8b74735c1b3a14740273de7af62548a4961e0a7c3b55106e94aa13cf35695bdab4d98e0371d0271a2e0267f60933eae42290e87a683b77659fbff0"}, @assoc={0x18, 0x117, 0x4, 0x8}, @iv={0x90, 0x117, 0x2, 0x76, "9502210200400968cf33697ee6474092356e47035cd25dd5cf9c68404defb81a1369bcd65aac7f3aea8aa43f334360e41a881b6567a0ca38c70b4474c95e8a2d2583d9551e99d3c7e5f024125392db3600d07b7acf5b9063e8cf3f51628b026266344929b0b13253c634964e020e1cb08e1adc179608"}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0x68, 0x117, 0x2, 0x52, "68c99b194461aeb8958e9fe047c884f3682fdf6e6c7f09aebffc49c58c44383d6458d7338cd5de4b28ca62732d999d112177d4b8f214960597f9d94c25c8fba0db060f13ff1f078ec2ac7df870193650f34e"}, @assoc={0x18, 0x117, 0x4, 0x6}], 0x240, 0x40801}, {0x0, 0x0, &(0x7f0000004100)=[{&(0x7f0000002d00)="7a7f6eeb33835f5abafb270602d43ce6d39a5fa5c2ff49abd0b374d658", 0x1d}, {&(0x7f0000002d40)="6356e1de3779bb1ad1dbf4b97ec81df8fe87c84dae32cc9529f599c7c8e59c6d4aa670cfe3e9c098cdfa2bc1b6de9b0cd07dbe77bb6f0c28aa8f1e8c7bba08862620bb7f81a6646710164eb644f2bb74e3d1592a852570c5ca198fe9a8182940d8c30f5f53294929425a7e8e640f3e089e9d9ee40f12caee609933ea1392ccd3207a7ee16a26410dab6f468776d4e83e80507722eeba542017c198480df1974d71ba5f7565a8044ecd9947cc4442c50867a042b77b8cc6b4fd562b750a1626189cd6f93ef0a636162886b3780f3d2e916e0469e96331bf0c977e4af8b4421f20c5", 0xe1}, {&(0x7f0000002e40)="3f61508ecd556256f46bcc0b07c503aa062be511de09c27d5f6bc506cb183634babd86beb0a4e4395847fa4c61efca543a52b4cf8ed34fd23375ed659c95a6d2caea88dd04bd9fad96fd4ff747ff80fed254bae7b3fcfd92b7bf1185f0f30da7f224aa838e494e0f0bb3994167d6ae311583c766675020b786775b395a2b12ec5ff46c74219c7665b94580698ec87b2a72bde51f84efdab979efb37e3ce2fe82ff972e30560163", 0xa7}, {&(0x7f0000002f00)="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", 0x1000}, {&(0x7f0000003f00)="6208bd267f9213c8f64a8d657061442428d89a20e19ca9e27a11fbc6f3d33f9c2595389804dd6a8809b4ce3923352b592a35b50e86687ac1bfc56dfee96425eba00c9e84955772d85f9bac9ae5c4d71a7557ae9740df5fdd29b645d0b78f202ed5d827b1e3ce45e65b59d167d8b7dd86875df52b83d9d1531d9d37014cd7b5b0c932c7c1f330ef70a8de58515ab497f0987a3dee9f5ac9a79b5aa6bd2acb5f29f558a9b88b2ae0cf22927c15f7696195674e9a3f0fa1826d6abd40c58c4644795e7193817dfd79", 0xc7}, {&(0x7f0000004000)="f11a419c6796bbadf64579b76a022f129d2ee076ce833a97d45f1bfb5000b9ad3a70680c9fd2ca75a30b22fb71c48010a7c4b8d587c7612429816201c5626552b59042ec84b0b8d47395772aa81961191d05d6100dc17ead826e6e0dac292a22da9fb580787ed01d44dca6e98bd4a2ac6b357ac58d387cee67caf6bfef4c184375071bb01711a28c7159d9b2dd145d601d3ab8d5f1c8458da52dc679f11c297dbb3a65a7", 0xa4}, {&(0x7f00000040c0)="0efd6b", 0x3}], 0x7, &(0x7f0000004180)=[@iv={0x30, 0x117, 0x2, 0x19, "eeab247229fdc407bc9653f08850edaf7650eb0b0eefdf33a8"}], 0x30, 0x1}], 0x3, 0x8000) write$USERIO_CMD_SEND_INTERRUPT(r3, &(0x7f00000001c0)={0x2, 0x8c}, 0x2) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f00000000c0), &(0x7f0000000100)=0xc) 18:41:29 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x7a000000, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0100c03bdbb5ff99d54c18000000000000000c0000000c000000020040a67300000000000006000000000000"], &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:29 executing program 1: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000000100)={0x5, 0x10, 0xfa00, {&(0x7f0000000340), r2, 0x1}}, 0x18) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18}, 0x18) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r3, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, 0x1407, 0x400, 0x70bd25, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz0\x00'}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) [ 2093.840729] misc userio: No port type given on /dev/userio 18:41:29 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/ipc\x00') r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000040)='ns/user\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) r2 = syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0x1, 0x0) ioctl$NS_GET_PARENT(r2, 0xb702, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18}, 0x18) sendmsg$GTP_CMD_NEWPDP(r3, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x0, 0x4, 0x70bd28, 0x25dfdbfc, {}, [@GTPA_MS_ADDRESS={0x8, 0x5, @remote}, @GTPA_O_TEI={0x8, 0x9, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000001}, 0x4000000) [ 2093.949281] misc userio: No port type given on /dev/userio [ 2093.959555] misc userio: No port type given on /dev/userio [ 2093.969986] misc userio: The device must be registered before sending interrupts 18:41:29 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x8c010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:29 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x88000000, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb017f9dd78405041826006d32a80c0000000c00000002000000000000000000000600000021"], &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) [ 2094.002838] misc userio: No port type given on /dev/userio [ 2094.036090] misc userio: The device must be registered before sending interrupts 18:41:29 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0xc382, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:29 executing program 1: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x5080, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018001c0000000e000c00c6000c000000020000000000000000000006000000000000f78f3bd4bb84c1fb87e2d714746137a178311f0edc73a4b59458085db9d7f3db2155609a68a1c2f23147f2bd99c078e84be695bbe431c11fe8b4479b5af6aea3698df805cd"], &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) openat$char_raw_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/raw/rawctl\x00', 0x101000, 0x0) 18:41:29 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xffff0f00, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:29 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) write$P9_RCLUNK(0xffffffffffffffff, &(0x7f0000000040)={0x7, 0x79, 0x1}, 0x7) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000080)={0x18, 0x71, 0x0, {{0x0, 0x2}}}, 0x18) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000000000000000b00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00060003000000030000000c00060003000000000000000c000600000000000000000006000a00a1aa000006000a00000000000c000600030000000000000006000a00a1aa00000c000600020000000000000008000300", @ANYRES32=r5], 0x78}}, 0x0) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="010027bd7000fcdbdf251400000008000100000000000c0006000300000003000000080001000200000008001d00", @ANYRES32=r0, @ANYBLOB="080001000300000008000300", @ANYRES32=r5, @ANYBLOB="4f00000000010000008ec8fae5efd48bec1ed12d4fc8673b3e016e0917d45550024c221f519b9360fc692b93ee492c7b79136467cc060d0b3608008d18e193c940809eae5752bb5944e170e2370b4f8585f77e8742914ff37eef5b81db8bd43fd7396f09009bf8ef6b89c920"], 0x48}}, 0x80) 18:41:29 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x8d000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:29 executing program 2: openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18, 0x71, 0x80, {{0x0, 0x0, 0x7}}}, 0x18) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000080)={0x0, 0x3f}, 0x2) 18:41:29 executing program 1: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x5080, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:29 executing program 3: sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x40, 0x0, 0x8, 0x70bd29, 0x25dfdbfb, {}, [@GTPA_TID={0xc, 0x3, 0x3}, @GTPA_I_TEI={0x8, 0x8, 0x4}, @GTPA_TID={0xc, 0x3, 0x1}, @GTPA_TID={0xc, 0x3, 0x3}]}, 0x40}, 0x1, 0x0, 0x0, 0x400}, 0x60000000) r0 = syz_genetlink_get_family_id$gtp(&(0x7f0000000280)='gtp\x00', 0xffffffffffffffff) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x2c, r0, 0x300, 0x70bd27, 0x25dfdbfc, {}, [@GTPA_O_TEI={0x8, 0x9, 0x3}, @GTPA_MS_ADDRESS={0x8, 0x5, @loopback}, @GTPA_O_TEI={0x8}]}, 0x2c}}, 0x48080) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) r1 = syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$TIOCGPTPEER(r1, 0x5441, 0x983c) 18:41:29 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0xffffff00, 0x18, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:29 executing program 0: sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x984df3490db33791}, 0xc, 0xfffffffffffffffd, 0x1, 0x0, 0x0, 0x8000}, 0x4000844) syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:41:29 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x8d010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:30 executing program 1: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x5080, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000000000006000000000000"], &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) r0 = syz_open_dev$vcsu(&(0x7f00000000c0)='/dev/vcsu#\x00', 0xd2f6, 0x20000) r1 = getpgid(0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000280)) r2 = getpgid(r1) write$P9_RGETLOCK(r0, &(0x7f0000000180)={0x22, 0x37, 0x2, {0x0, 0x3, 0x6, r2, 0x4, '\x00\x00\x00\x00'}}, 0x22) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000000)={0x43, 0x9, 0x1, {0x3, 0x8, 0x200, 0x7f, 0x0, 0x10000, 0x8001, 0x8, 0x1ff}}, 0x43) write$P9_RRENAMEAT(r0, &(0x7f0000000100)={0x7, 0x4b, 0x1}, 0x7) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8) [ 2094.448542] misc userio: Invalid payload size 18:41:30 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x21c000, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f00000000c0)={0x0, 0x0, r2}) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x9, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:30 executing program 1: openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x5080, 0x0) 18:41:30 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x8e000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:30 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x201, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) ioctl$sock_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, @l2tp={0x2, 0x0, @remote, 0x1}, @l2tp={0x2, 0x0, @remote, 0x1}, @nfc={0x27, 0x1, 0x0, 0x2}, 0x8000, 0x0, 0x0, 0x0, 0x2, &(0x7f00000000c0)='macvlan1\x00', 0x9, 0x2, 0xfe01}) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) r3 = syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0x7, 0x52000) ioctl$NS_GET_PARENT(r3, 0xb701, 0x0) [ 2094.554162] misc userio: No port type given on /dev/userio 18:41:30 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x0, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c0000000200f1ffffff000100010006000000000000"], &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x2, 0x3}}, 0x20) 18:41:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:30 executing program 1: openat$userio(0xffffffffffffff9c, 0x0, 0x5080, 0x0) 18:41:30 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x8e010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:30 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:30 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/pid_for_children\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:41:30 executing program 3: sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000040)={&(0x7f00000000c0)={0x44, 0x0, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@NL802154_ATTR_SEC_DEVKEY={0x20, 0x24, 0x0, 0x1, [@NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8}, @NL802154_DEVKEY_ATTR_EXTENDED_ADDR={0xc}, @NL802154_DEVKEY_ATTR_FRAME_COUNTER={0x8}]}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x44}}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:30 executing program 1: openat$userio(0xffffffffffffff9c, 0x0, 0x5080, 0x0) 18:41:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:30 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x8f000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:30 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x41c000, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040)='gtp\x00', 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r3, 0x1}, 0x14}}, 0x0) sendmsg$GTP_CMD_GETPDP(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r3, 0x20, 0x70bd25, 0x25dfdbfc, {}, [@GTPA_VERSION={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40080}, 0x0) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) [ 2094.858208] misc userio: No port type given on /dev/userio 18:41:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9f00000000000000000006000000000000000000000000000000000050000000000003000000"], &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000340)={@none, 0x9, 0xffff, 0x1ff}) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18, 0x71, 0x0, {{0x40}}}, 0x18) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000380)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000400)={r1, 0xfffffffffffff801, 0x7}) write$P9_RMKDIR(r0, &(0x7f0000000000)={0x14, 0x49, 0x1, {0x0, 0x0, 0x4}}, 0x14) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0}) write$P9_RSTATFS(r0, &(0x7f0000000280)={0x43, 0x9, 0x1, {0x2, 0x5ae, 0x4, 0x9, 0x100, 0x5, 0x81, 0x4, 0x3}}, 0x43) ioctl$sock_ifreq(r0, 0x8947, &(0x7f0000000440)={'gre0\x00', @ifru_names}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, &(0x7f0000000040)=r2) 18:41:30 executing program 2: openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x80142, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x800, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) write$P9_RLERROR(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="09000000000005020000"], 0xa) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000200)=0xffffffffffffffff) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ocfs2_control\x00', 0x521c40, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/userio\x00', 0x8000, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r1, &(0x7f0000000180)={0x2, 0x6}, 0x2) 18:41:30 executing program 1: openat$userio(0xffffffffffffff9c, 0x0, 0x5080, 0x0) 18:41:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1a, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:30 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x8f010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb01001800000000002b340af600000c000000020000000000e4ffffff000600ffff000000"], &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) ioctl$IOCTL_GET_NUM_DEVICES(r1, 0x40046104, &(0x7f0000000280)) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) write$P9_RWALK(r0, &(0x7f0000000000)={0x30, 0x6f, 0x1, {0x3, [{0x1, 0x1, 0x1}, {0x10, 0x2, 0x5}, {0x0, 0x4, 0x3}]}}, 0x30) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) write$P9_RWSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x7, 0x7f, 0x2}, 0x7) write$P9_RRENAMEAT(r2, &(0x7f0000000040)={0x7, 0x4b, 0x2}, 0x7) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r3, &(0x7f0000000300)={0x18}, 0x18) syz_genetlink_get_family_id$gtp(&(0x7f00000000c0)='gtp\x00', r3) 18:41:30 executing program 1: openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x0, 0x0) 18:41:30 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/userio\x00', 0x80200, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) prctl$PR_GET_FPEMU(0x9, &(0x7f00000001c0)) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ocfs2_control\x00', 0x509000, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) bind$802154_raw(r2, &(0x7f0000000200)={0x24, @none={0x0, 0x3}}, 0x14) write$USERIO_CMD_SEND_INTERRUPT(r1, &(0x7f0000000180)={0x2, 0x3}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4}, 0x2) write$tcp_mem(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x20, 0x7, 0x20, 0x9}, 0x48) syz_open_dev$ptys(0xc, 0x3, 0x1) 18:41:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2f, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:30 executing program 0: r0 = getpgid(0x0) getpgid(r0) r1 = getpgid(0x0) getpgid(r1) r2 = getpgid(0x0) getpgid(r2) r3 = getpgid(0x0) getpgid(r3) getpgid(0x0) r4 = getpgid(0x0) r5 = syz_open_procfs$namespace(r4, &(0x7f0000000200)='ns/user\x00') r6 = ioctl$NS_GET_PARENT(r5, 0xb701, 0x0) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r7, 0x8933, &(0x7f0000000740)={'wpan4\x00'}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r8, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c000001", @ANYRES16=r9, @ANYBLOB="010000000000000000000b00000008000300", @ANYRES32=0x0, @ANYBLOB], 0x1c}}, 0x0) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r10, &(0x7f0000000300)={0x18}, 0x18) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r7, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x50, r9, 0x20, 0x70bd26, 0x25dfdbfe, {}, [@NL802154_ATTR_NETNS_FD={0x8, 0x1d, r10}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_PID={0x8}, @NL802154_ATTR_NETNS_FD={0x8, 0x1d, r6}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x50}, 0x1, 0x0, 0x0, 0x48090}, 0x4) 18:41:30 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x90000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:30 executing program 1: openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x0, 0x0) 18:41:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@const={0xb}]}, {0x0, [0x5f, 0x0, 0x5f, 0x61, 0x5f]}}, &(0x7f00000001c0)=""/125, 0x2b, 0x7d, 0x1}, 0x20) accept(0xffffffffffffffff, &(0x7f0000000080)=@isdn, &(0x7f0000000100)=0x80) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) timerfd_gettime(r0, &(0x7f0000000000)) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) sendmsg$can_raw(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)=@can={{0x1, 0x0, 0x1, 0x1}, 0x5, 0x1, 0x0, 0x0, "f5a856deca670719"}, 0x10}, 0x1, 0x0, 0x0, 0x8000}, 0x20000040) 18:41:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x32, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:30 executing program 2: openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) r1 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x20100, 0x0) write$USERIO_CMD_REGISTER(r1, &(0x7f00000000c0), 0x2) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8000) 18:41:30 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x90010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:30 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/pid\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:41:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x63, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:31 executing program 1: openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x0, 0x0) 18:41:31 executing program 2: openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x202f9b62d1138e0c, 0x0) 18:41:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000001000c0000000c0000000200000007f7ffffff000006000000000048"], &(0x7f0000000280)=""/142, 0x26, 0x8e, 0x1}, 0x20) 18:41:31 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x91000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x5f5e0ff, 0x18, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:31 executing program 0: r0 = getpgid(0x0) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000200)=ANY=[@ANYBLOB="250000003701000202000000000000000800000000000000", @ANYRES32=r0, @ANYBLOB="07006e732f899693ae41764a573b0c8e2efdf34f28251b8e63f371c4c3c3e4510a04272d99244f0f232d7806d0faa6012e7147fcb70000986b787b1a0a3c40af68f6e58e0393f28eee1f86d7b681ce83bad717926079a3bdeef3818dffec12ae314b090dc9e6d0100d2d279dda77a8a932a6d00b87d228eacff7684d6c0caa26ae725b59af05f23582e58810cf598bea76950bbd1bd62720a88bae95ab0207d79925bad0b7e1ac6df219a623ff620f6f9d5e4ed486a0e93d512ea853d56941235c2bb1c6f7678ddb153ed3a75f1dfd291fdd9706ebef25cbc4ec24dc9d84f74ce238698142c8cf01ee153c0ebf04ac3e3e9f9a565125328b7cf7dc31c259a190571266f500d7e3e767793c7af45a2b070bd8bc17cb844bf42f5346a565f2680d6ad9cc009008eba115e40b329e41b63c62883422398425d920e4dabdebcc9832bd9ed46092ee31fcc384e158c3208b99100a24a6374b78991029a553198206f382c4cadec50e"], 0x25) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r1, 0xb701, 0x0) 18:41:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0xff800, 0x200000) 18:41:31 executing program 1: r0 = getpgid(0x0) getpgid(r0) r1 = getpgid(0x0) getpgid(r1) r2 = getpgid(0x0) getpgid(r2) r3 = getpgid(0x0) getpgid(r3) getpgid(0x0) r4 = getpgid(0x0) r5 = syz_open_procfs$namespace(r4, &(0x7f0000000200)='ns/user\x00') r6 = ioctl$NS_GET_PARENT(r5, 0xb701, 0x0) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r7, 0x8933, &(0x7f0000000740)={'wpan4\x00'}) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r8, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c000001", @ANYRES16=r9, @ANYBLOB="010000000000000000000b00000008000300", @ANYRES32=0x0, @ANYBLOB], 0x1c}}, 0x0) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r10, &(0x7f0000000300)={0x18}, 0x18) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r7, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x50, r9, 0x20, 0x70bd26, 0x25dfdbfe, {}, [@NL802154_ATTR_NETNS_FD={0x8, 0x1d, r10}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_PID={0x8}, @NL802154_ATTR_NETNS_FD={0x8, 0x1d, r6}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x50}, 0x1, 0x0, 0x0, 0x48090}, 0x4) 18:41:31 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x91010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:31 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000010c0)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x4, [@fwd={0x7}]}, {0x0, [0x2e, 0x30]}}, &(0x7f00000000c0)=""/4096, 0x28, 0x1000, 0x1}, 0x20) r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:31 executing program 0: ioctl$IOCTL_STATUS_ACCEL_DEV(0xffffffffffffffff, 0x40046103, &(0x7f0000000040)={0x2, 0x6e, 0x6, 0x6, 0x8, 0x9, 0x8d, 0x5, 0x0, 0x1, 0x80, "6def28ec576a523f02d58685090d07242cea9ff2d354baa811e5df28055709dc"}) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:41:31 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x92000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) r0 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040)='gtp\x00', 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r0, 0x800, 0x70bd28, 0x25dfdbfb, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @local}, @GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_MS_ADDRESS={0x8, 0x5, @empty}, @GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_O_TEI={0x8, 0x9, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x10800}, 0x426822a3b200e0dc) syz_genetlink_get_family_id$nl80211(&(0x7f0000000340)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(0xffffffffffffffff, 0x800443d2, &(0x7f0000000300)={0x9, &(0x7f0000000380)=[{@fixed}, {@none}, {@none}, {}, {}, {@fixed}, {}, {@fixed}, {@none}]}) 18:41:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x9, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) [ 2095.757527] misc userio: No port type given on /dev/userio [ 2095.793656] misc userio: No port type given on /dev/userio 18:41:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9f00000000000000000006000000000000000000000000000000000050000000000003000000"], &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000340)={@none, 0x9, 0xffff, 0x1ff}) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18, 0x71, 0x0, {{0x40}}}, 0x18) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000380)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r0, 0xc0182101, &(0x7f0000000400)={r1, 0xfffffffffffff801, 0x7}) write$P9_RMKDIR(r0, &(0x7f0000000000)={0x14, 0x49, 0x1, {0x0, 0x0, 0x4}}, 0x14) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000000c0)={0x0}) write$P9_RSTATFS(r0, &(0x7f0000000280)={0x43, 0x9, 0x1, {0x2, 0x5ae, 0x4, 0x9, 0x100, 0x5, 0x81, 0x4, 0x3}}, 0x43) ioctl$sock_ifreq(r0, 0x8947, &(0x7f0000000440)={'gre0\x00', @ifru_names}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, &(0x7f0000000040)=r2) 18:41:31 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040)={0x0, 0x89}, 0xfffffffffffffed5) 18:41:31 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') r0 = socket$nl_generic(0x10, 0x3, 0x10) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x2c, 0x0, 0x2, 0x70bd2a, 0x25dfdbfe, {}, [@GTPA_I_TEI={0x8}, @GTPA_PEER_ADDRESS={0x8, 0x4, @private=0xa010102}, @GTPA_I_TEI={0x8, 0x8, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000854}, 0x4000040) r1 = socket$can_raw(0x1d, 0x3, 0x1) accept(r1, &(0x7f0000000040)=@ieee802154={0x24, @long}, &(0x7f00000000c0)=0x80) 18:41:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0xa, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:31 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x92010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:31 executing program 3: r0 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x200, 0x0) ioctl$TIOCL_GETMOUSEREPORTING(r0, 0x541c, &(0x7f0000000040)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000000000000000006000000000000"], &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) write$P9_RLERROR(r0, &(0x7f00000000c0)={0x14, 0x7, 0x2, {0xb, '/dev/vcsu#\x00'}}, 0x14) 18:41:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0xb, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) r0 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040)='gtp\x00', 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r0, 0x800, 0x70bd28, 0x25dfdbfb, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @local}, @GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_MS_ADDRESS={0x8, 0x5, @empty}, @GTPA_VERSION={0x8, 0x2, 0x1}, @GTPA_O_TEI={0x8, 0x9, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x10800}, 0x426822a3b200e0dc) syz_genetlink_get_family_id$nl80211(&(0x7f0000000340)='nl80211\x00', 0xffffffffffffffff) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(0xffffffffffffffff, 0x800443d2, &(0x7f0000000300)={0x9, &(0x7f0000000380)=[{@fixed}, {@none}, {@none}, {}, {}, {@fixed}, {}, {@fixed}, {@none}]}) 18:41:31 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x26682, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) openat$userio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/userio\x00', 0x2000, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=@ipv6_newroute={0x1c, 0x18, 0x20, 0x70bd2d, 0x25dfdbff, {0xa, 0x20, 0x10, 0x22, 0xfe, 0x0, 0xc8, 0x7, 0x200}}, 0x1c}, 0x1, 0x0, 0x0, 0x400}, 0x11) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) r2 = socket$nl_generic(0x10, 0x3, 0x10) accept$alg(r1, 0x0, 0x0) r3 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040)='gtp\x00', 0xffffffffffffffff) sendmsg$GTP_CMD_DELPDP(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r3, 0x1}, 0x14}}, 0x0) sendmsg$GTP_CMD_NEWPDP(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r3, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@GTPA_FLOW={0x6, 0x6, 0x3}, @GTPA_TID={0xc, 0x3, 0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x4020000) 18:41:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01008a65cb68632ff0184d96b371b91800007a3ecb55000c00a68784bcf26b5b8e2db04e1fefe3bc6bfb8bbe267e91ce3094f62253f73016404318dca348d7f8dbf1fc080d65c5e3e37d8b7657bd41863e222a63edfd8147bfb3"], &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) 18:41:31 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x93000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:31 executing program 0: r0 = getpgid(0xffffffffffffffff) r1 = syz_open_procfs$namespace(r0, &(0x7f0000000040)='ns/pid\x00') ioctl$NS_GET_PARENT(r1, 0xb701, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) syz_open_procfs$namespace(r0, &(0x7f00000001c0)='ns/user\x00') r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000200)='nl802154\x00', r4) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r2, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0e", @ANYRES16=r3, @ANYBLOB="010000000000000000000b00000008000300", @ANYRES32=0x0, @ANYBLOB], 0x1c}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x58, r3, 0x8, 0x70bd29, 0x25dfdbfd, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}, @NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r5}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x2}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}]}, 0x58}, 0x1, 0x0, 0x0, 0x4040000}, 0x854) 18:41:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x10, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) [ 2096.098088] misc userio: No port type given on /dev/userio 18:41:31 executing program 3: shmctl$SHM_INFO(0x0, 0xe, &(0x7f0000000000)=""/111) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000020000000000000000000006000000000000a9651781fa20c70e3d9e05d5074e360e4abf1a2fa05e6d24bcf1771772e54edb18fc8ca229353ec690088bcef112e4500ff3"], &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_SET_CHANNEL(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x200, 0x70bd2a, 0x25dfdbff, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_PAGE={0x5, 0x7, 0xd}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x1800}, 0x24000880) fanotify_init(0x20, 0x0) 18:41:31 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x93010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:31 executing program 1: syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x201, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) ioctl$sock_SIOCADDRT(r2, 0x890b, &(0x7f0000000100)={0x0, @l2tp={0x2, 0x0, @remote, 0x1}, @l2tp={0x2, 0x0, @remote, 0x1}, @nfc={0x27, 0x1, 0x0, 0x2}, 0x8000, 0x0, 0x0, 0x0, 0x2, &(0x7f00000000c0)='macvlan1\x00', 0x9, 0x2, 0xfe01}) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) r3 = syz_open_dev$vcsu(&(0x7f0000000080)='/dev/vcsu#\x00', 0x7, 0x52000) ioctl$NS_GET_PARENT(r3, 0xb701, 0x0) [ 2096.153085] misc userio: No port type given on /dev/userio 18:41:31 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x0, @can, @phonet={0x23, 0x8, 0x89, 0x1}, @qipcrtr={0x2a, 0x38763d456ef05df5, 0x7fff}, 0x3, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000080)='bridge_slave_1\x00', 0x0, 0x6, 0xff}) 18:41:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x1a, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:31 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) r2 = ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) ioctl$NS_GET_PARENT(r2, 0xb701, 0x0) ioctl$RAW_CHAR_CTRL_SETBIND(0xffffffffffffffff, 0xac00, &(0x7f0000000040)={0x0, 0x7, 0x0}) 18:41:31 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x94000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000000000006000000000000"], &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) r0 = syz_open_dev$vcsu(&(0x7f00000000c0)='/dev/vcsu#\x00', 0xd2f6, 0x20000) r1 = getpgid(0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000280)) r2 = getpgid(r1) write$P9_RGETLOCK(r0, &(0x7f0000000180)={0x22, 0x37, 0x2, {0x0, 0x3, 0x6, r2, 0x4, '\x00\x00\x00\x00'}}, 0x22) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000000)={0x43, 0x9, 0x1, {0x3, 0x8, 0x200, 0x7f, 0x0, 0x10000, 0x8001, 0x8, 0x1ff}}, 0x43) write$P9_RRENAMEAT(r0, &(0x7f0000000100)={0x7, 0x4b, 0x1}, 0x7) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x8) 18:41:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f00000001c0)=""/123, 0x1a, 0x7b, 0x1}, 0x20) 18:41:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x2f, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) [ 2096.352885] misc userio: No port type given on /dev/userio [ 2096.372615] misc userio: No port type given on /dev/userio 18:41:32 executing program 1: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000080)={0x1, 0x2}, 0x2) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0x2) 18:41:32 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18, 0x71, 0x2000}, 0x18) setns(r1, 0x80) 18:41:32 executing program 2: openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040), 0xfffffffffffffda9) r1 = syz_open_dev$vcsu(&(0x7f00000000c0)='/dev/vcsu#\x00', 0x2, 0x400) write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000100)={0x1, 0x8}, 0x2) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140)=0xffffffffffffffff, 0x4) 18:41:32 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x94010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) syz_open_dev$char_usb(0xc, 0xb4, 0x3) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={r0, 0x10, &(0x7f0000000280)={&(0x7f0000000180)=""/37, 0x25}}, 0x10) fanotify_init(0x40, 0x40000) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb01001800000000000000481000004800000007000000070000000000000a0200005a5bec4bb62bda75b47f000b00004006000006040000000300000000800000070000000900000007000000feffffff0b00000005000000060000000500010003000000bb"], &(0x7f00000000c0)=""/36, 0x67, 0x24, 0x1}, 0x20) 18:41:32 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/time\x00') r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r2, &(0x7f0000000300)={0x18}, 0x18) sendmsg$can_raw(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=@can={{0x3, 0x1}, 0x8, 0x0, 0x0, 0x0, "ef03ba126b416685"}, 0x10}}, 0x0) 18:41:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x32, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:32 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) ioctl$NS_GET_NSTYPE(r1, 0xb703, 0x0) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) 18:41:32 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x0, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000040)={0x0, 0x3}, 0x42) openat$userio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/userio\x00', 0x42200, 0x0) connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000000)={0x28, 0x0, 0x2710, @host}, 0x10) 18:41:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@struct={0x800000, 0x0, 0x0, 0x6}]}, {0x0, [0x61]}}, &(0x7f00000001c0)=""/137, 0x27, 0x89, 0x1}, 0x20) 18:41:32 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x18810}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="780000001400080026bd7000fcdbdf2502018000", @ANYRES16=r1, @ANYBLOB="08000200ac1e010108000100ac14142f080008000c0400001400060004000000090000000101000005000000140006000000005b079409000300000003000000080002000a01010008000200e00000020800080000000000080002007f000001"], 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x408d1) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x100, 0x70bd26, 0x25dfdbfe, {}, [@GTPA_O_TEI={0x8, 0x9, 0x4}, @GTPA_FLOW={0x6, 0x6, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x24004004}, 0x800) 18:41:32 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x95000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x63, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:32 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000740)={'wpan4\x00'}) sendmsg$NL802154_CMD_DEL_SEC_KEY(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)={0x94, 0x0, 0x8, 0x70bd25, 0x25dfdbfc, {}, [@NL802154_ATTR_SEC_KEY={0x80, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_CMDS={0x24, 0x3, "eb8d9ae18d1f3f10ea6d19c9af3abcd2d29efc6c90478c6d7a9b853597fc874f"}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "1d9f1b36c0aa18a317e4a787d86f38f2"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x6}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "f377aefa4247d963055ccfc786bd17c3"}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "7bae4572beb0a116c08be94bee0c9c47"}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "99a9a146f58c6061deded4d210db7274"}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x10}, 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@var={0xb, 0x0, 0x0, 0xe, 0x1}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x1, 0x3, 0x5}}]}}, &(0x7f00000001c0)=""/137, 0x31, 0x89, 0x1}, 0x20) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000440)={'wpan4\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r2, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r3, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000340)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_INTERFACE(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x77c1cba2c7d15b18}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r3, 0x300, 0x70bd28, 0x25dfdbff, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x8c0) 18:41:32 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x95010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:32 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) r1 = getpgid(0x0) getpgid(r1) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)=0x0) r3 = getgid() shmctl$IPC_SET(0xffffffffffffffff, 0x1, &(0x7f0000000240)={{0x1, 0x0, 0x0, r2, r3, 0x4, 0x1f}, 0xb585, 0x9, 0x1, 0x200020000, r1, r1, 0x40}) r4 = ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) sendmsg$RDMA_NLDEV_CMD_SET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x18, 0x1402, 0x0, 0x70bd2d, 0x25dfdbfc, "", [@RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r4}]}, 0x18}, 0x1, 0x0, 0x0, 0x4040}, 0x80) syz_open_procfs$namespace(r1, &(0x7f0000000040)='ns/pid_for_children\x00') 18:41:32 executing program 2: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/userio\x00', 0x102, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000740)={'wpan4\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f00000002c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000000000000000b00000008000300", @ANYRES32=0x0, @ANYBLOB="0c00060003000000030000000c00060003000000000000000c000600000000000000000006000a00a1aa000006000a00000000000c000600030000000000000006000a00a1aa00000c000600020000000000000008000300", @ANYRES32=r5], 0x78}}, 0x0) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x40, 0x0, 0x20, 0x70bd28, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r5}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_SHORT_ADDR={0x6}, @NL802154_ATTR_SHORT_ADDR={0x6, 0xa, 0xaaa2}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x40}}, 0x220080c0) write$USERIO_CMD_REGISTER(r0, &(0x7f00000001c0)={0x0, 0x4}, 0x5b) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r6, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r7, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_DEL_SEC_DEV(r3, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x20, r7, 0x2, 0x70bd2d, 0x25dfdbfd, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x20}}, 0x4004800) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, &(0x7f0000000080)=0x3) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040)='nl802154\x00', 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r8, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r9, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_DEL_SEC_KEY(r2, &(0x7f0000000500)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000440)={&(0x7f0000000380)={0x2c, r9, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x2c}}, 0x40090) 18:41:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x5f5e0ff, 0x2, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x0, 0x6}]}}, &(0x7f00000001c0)=""/137, 0x26, 0x89, 0x1}, 0x20) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340), 0x4) r3 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040)='gtp\x00', 0xffffffffffffffff) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f00000002c0)={0x0, @rc={0x1f, @fixed={[], 0x11}, 0xcf}, @llc={0x1a, 0x10e, 0x0, 0x40, 0x9, 0x4, @random="45519839b8c0"}, @llc={0x1a, 0x207, 0xff, 0x4, 0x1, 0x81}, 0x3, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x10000, 0x0, 0x1}) sendmsg$GTP_CMD_DELPDP(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r3, 0x1}, 0x14}}, 0x0) sendmsg$GTP_CMD_DELPDP(r0, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x3c, r3, 0x10a, 0x70bd2a, 0x25dfdbfd, {}, [@GTPA_PEER_ADDRESS={0x8, 0x4, @multicast2}, @GTPA_PEER_ADDRESS={0x8, 0x4, @loopback}, @GTPA_MS_ADDRESS={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @GTPA_I_TEI={0x8, 0x8, 0x4}, @GTPA_MS_ADDRESS={0x8, 0x5, @rand_addr=0x64010101}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8050}, 0x10000010) write$P9_RRENAMEAT(r1, &(0x7f0000000040)={0x7, 0x4b, 0x1}, 0x7) 18:41:32 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x96000000, 0x0, 0x0, &(0x7f0000000040)) 18:41:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[], &(0x7f00000001c0)=""/135, 0x26, 0x87, 0x1}, 0x20) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) sendmsg$nl_route(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@getnetconf={0x14, 0x52, 0x8, 0x70bd26, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000001}, 0x4008040) 18:41:32 executing program 0: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={r1, 0x10, &(0x7f0000000340)={&(0x7f00000002c0)=""/9, 0x9}}, 0x10) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) r2 = syz_genetlink_get_family_id$gtp(&(0x7f0000000080)='gtp\x00', 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, r2, 0x400, 0x70bd28, 0x25dfdbfb, {}, [@GTPA_LINK={0x8}, @GTPA_FLOW={0x6}, @GTPA_O_TEI={0x8, 0x9, 0x3}, @GTPA_NET_NS_FD={0x8, 0x7, r0}]}, 0x34}, 0x1, 0x0, 0x0, 0x4080}, 0x8001) r3 = getpgid(0xffffffffffffffff) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x28, 0x0, 0x2, 0x70bd2a, 0x25dfdbfd, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_PID={0x8, 0x1c, r3}]}, 0x28}, 0x1, 0x0, 0x0, 0x840}, 0x48810) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) [ 2097.036406] misc userio: Invalid payload size [ 2097.067910] kasan: CONFIG_KASAN_INLINE enabled [ 2097.081489] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 2097.105634] general protection fault: 0000 [#1] PREEMPT SMP KASAN 18:41:32 executing program 1: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/uts\x00') r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x18810}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="780000001400080026bd7000fcdbdf2502018000", @ANYRES16=r1, @ANYBLOB="08000200ac1e010108000100ac14142f080008000c0400001400060004000000090000000101000005000000140006000000005b079409000300000003000000080002000a01010008000200e00000020800080000000000080002007f000001"], 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x408d1) ioctl$NS_GET_PARENT(r0, 0xb701, 0x0) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x100, 0x70bd26, 0x25dfdbfe, {}, [@GTPA_O_TEI={0x8, 0x9, 0x4}, @GTPA_FLOW={0x6, 0x6, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x24004004}, 0x800) 18:41:32 executing program 4: pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) socketpair(0x96010000, 0x0, 0x0, &(0x7f0000000040)) 18:41:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0xa, [@struct, @restrict]}}, &(0x7f00000001c0)=""/137, 0x32, 0x89, 0x1}, 0x20) 18:41:32 executing program 3: sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x6c, 0x13, 0x200, 0x70bd29, 0x25dfdbfd, {0x28, 0xc5, 0x8, 0x9, {0x4e24, 0x4e23, [0xffff8001, 0x1000, 0x3, 0x7], [0x1, 0x7, 0x3, 0x401], 0x0, [0x8004, 0x2]}, 0x8}, [@INET_DIAG_REQ_BYTECODE={0x1d, 0x1, "7161b17336f576043b983a0028d39abc4c9503ae54309758dd"}]}, 0x6c}, 0x1, 0x0, 0x0, 0xc000}, 0x8040) socket$bt_cmtp(0x1f, 0x3, 0x5) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r1, &(0x7f0000000300)={0x18}, 0x18) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYRESOCT, @ANYRESOCT], &(0x7f00000002c0)=""/137, 0x26, 0x89, 0x1}, 0x47) write$P9_RATTACH(r0, &(0x7f0000000000)={0x14, 0x69, 0x2, {0x0, 0x4, 0x6}}, 0x14) [ 2097.112028] CPU: 1 PID: 28320 Comm: syz-executor.2 Not tainted 4.19.177-syzkaller #0 [ 2097.119918] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2097.129312] RIP: 0010:nl802154_del_llsec_key+0x16d/0x340 [ 2097.134873] Code: 00 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 b5 01 00 00 48 8b 93 28 01 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 d1 48 c1 e9 03 <0f> b6 0c 01 48 89 d0 83 e0 07 83 c0 01 38 c8 7c 08 84 c9 0f 85 13 [ 2097.153946] RSP: 0018:ffff88806aa575e0 EFLAGS: 00010246 [ 2097.159323] RAX: dffffc0000000000 RBX: ffff8880b2454080 RCX: 0000000000000000 [ 2097.166606] RDX: 0000000000000000 RSI: ffffffff87c53067 RDI: ffff8880b24541a8 [ 2097.173884] RBP: 1ffff1100d54aebe R08: 0000000000000001 R09: ffff88806aa57920 [ 2097.181158] R10: 0000000000000005 R11: 0000000000000000 R12: ffff8880ab6168c0 [ 2097.188437] R13: ffff8880ab4b9150 R14: ffff8880b2454080 R15: ffffffff89cf57c0 [ 2097.195721] FS: 00007f9fbcf39700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 [ 2097.203960] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2097.210239] CR2: 000000000056c000 CR3: 000000008d354000 CR4: 00000000001406e0 18:41:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[], &(0x7f00000001c0)=""/135, 0x26, 0x87, 0x1}, 0x20) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) write$P9_ROPEN(r0, &(0x7f0000000300)={0x18}, 0x18) sendmsg$nl_route(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@getnetconf={0x14, 0x52, 0x8, 0x70bd26, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000001}, 0x4008040) [ 2097.217522] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2097.224933] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2097.232207] Call Trace: [ 2097.234819] ? nl802154_set_llsec_params+0x470/0x470 [ 2097.239943] ? nl802154_pre_doit+0xf8/0xcd0 [ 2097.244281] ? validate_nla+0x270/0x820 [ 2097.248406] ? nl802154_dump_wpan_phy_done+0x40/0x40 [ 2097.253616] ? nla_parse+0x1b2/0x290 [ 2097.257349] ? nl802154_dump_wpan_phy_done+0x40/0x40 [ 2097.262558] genl_family_rcv_msg+0x642/0xc40 [ 2097.266981] ? genl_rcv+0x40/0x40 [ 2097.270575] ? genl_rcv_msg+0x12f/0x160 [ 2097.274553] ? __mutex_add_waiter+0x160/0x160 [ 2097.279302] ? __radix_tree_lookup+0x216/0x370 [ 2097.283878] genl_rcv_msg+0xbf/0x160 [ 2097.287677] netlink_rcv_skb+0x160/0x440 [ 2097.291981] ? genl_family_rcv_msg+0xc40/0xc40 [ 2097.296565] ? netlink_ack+0xae0/0xae0 [ 2097.300733] ? genl_rcv+0x15/0x40 [ 2097.304179] genl_rcv+0x24/0x40 [ 2097.307541] netlink_unicast+0x4d5/0x690 [ 2097.311604] ? netlink_sendskb+0x110/0x110 [ 2097.315856] ? __check_object_size+0x17b/0x3e0 [ 2097.320578] netlink_sendmsg+0x6bb/0xc40 [ 2097.324688] ? nlmsg_notify+0x1a0/0x1a0 [ 2097.328782] ? kernel_recvmsg+0x220/0x220 [ 2097.332927] ? nlmsg_notify+0x1a0/0x1a0 [ 2097.336906] sock_sendmsg+0xc3/0x120 [ 2097.340616] ___sys_sendmsg+0x7bb/0x8e0 [ 2097.344584] ? lock_acquire+0x170/0x3c0 [ 2097.348559] ? copy_msghdr_from_user+0x440/0x440 [ 2097.353316] ? __fget+0x32f/0x510 [ 2097.356761] ? lock_downgrade+0x720/0x720 [ 2097.360904] ? check_preemption_disabled+0x41/0x280 [ 2097.365984] ? check_preemption_disabled+0x41/0x280 [ 2097.371110] ? __fget+0x356/0x510 [ 2097.374554] ? do_dup2+0x450/0x450 [ 2097.378089] ? debug_object_active_state+0x254/0x330 [ 2097.383184] ? debug_object_init_on_stack+0x20/0x20 [ 2097.388462] ? __fdget+0x1d0/0x230 [ 2097.391995] __x64_sys_sendmsg+0x132/0x220 [ 2097.396317] ? __sys_sendmsg+0x1b0/0x1b0 [ 2097.400526] ? __se_sys_futex+0x298/0x3b0 [ 2097.404678] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 2097.410038] ? trace_hardirqs_off_caller+0x6e/0x210 [ 2097.415045] ? do_syscall_64+0x21/0x620 [ 2097.419013] do_syscall_64+0xf9/0x620 [ 2097.423067] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2097.428244] RIP: 0033:0x465ef9 [ 2097.431435] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2097.450325] RSP: 002b:00007f9fbcf39188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2097.459451] RAX: ffffffffffffffda RBX: 000000000056bf60 RCX: 0000000000465ef9 [ 2097.466780] RDX: 0000000000040090 RSI: 0000000020000500 RDI: 0000000000000006 [ 2097.474049] RBP: 00000000004bcd1c R08: 0000000000000000 R09: 0000000000000000 [ 2097.481316] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf60 [ 2097.488575] R13: 00007fff55d2145f R14: 00007f9fbcf39300 R15: 0000000000022000 [ 2097.495837] Modules linked in: [ 2097.511786] ---[ end trace 0c16491248e62e50 ]--- [ 2097.526538] RIP: 0010:nl802154_del_llsec_key+0x16d/0x340 [ 2097.546441] Code: 00 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 b5 01 00 00 48 8b 93 28 01 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 d1 48 c1 e9 03 <0f> b6 0c 01 48 89 d0 83 e0 07 83 c0 01 38 c8 7c 08 84 c9 0f 85 13 [ 2097.582791] RSP: 0018:ffff88806aa575e0 EFLAGS: 00010246 [ 2097.590977] RAX: dffffc0000000000 RBX: ffff8880b2454080 RCX: 0000000000000000 [ 2097.607794] RDX: 0000000000000000 RSI: ffffffff87c53067 RDI: ffff8880b24541a8 [ 2097.616101] RBP: 1ffff1100d54aebe R08: 0000000000000001 R09: ffff88806aa57920 [ 2097.623732] R10: 0000000000000005 R11: 0000000000000000 R12: ffff8880ab6168c0 [ 2097.631941] R13: ffff8880ab4b9150 R14: ffff8880b2454080 R15: ffffffff89cf57c0 [ 2097.639836] FS: 00007f9fbcf39700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 [ 2097.648711] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2097.655308] CR2: 000000000052a670 CR3: 000000008d354000 CR4: 00000000001406e0 [ 2097.662633] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2097.670714] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2097.678389] Kernel panic - not syncing: Fatal exception [ 2097.684663] Kernel Offset: disabled [ 2097.688301] Rebooting in 86400 seconds..