bc, r1, 0x2, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x38, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xffffffff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7ff}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xfffffff8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x9}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xdc9}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x800}, @TIPC_NLA_PUBL_UPPER={0x8}]}, @TIPC_NLA_BEARER={0x44, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xe, 0x1, @l2={'eth', 0x3a, 'veth0\x00'}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}]}]}, 0xbc}, 0x1, 0x0, 0x0, 0x4040051}, 0x10) 18:45:37 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r0, 0x0, 0x0) 18:45:37 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LIST_PHY(r0, &(0x7f0000000c80)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000c00)={0x14}, 0x14}}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYRESHEX=r0], &(0x7f0000000180)=""/203, 0x1a, 0xcb, 0x1}, 0x20) 18:45:37 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) openat$cgroup_devices(r0, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) 18:45:37 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) 18:45:37 executing program 3: connect$unix(0xffffffffffffffff, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) 18:45:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_timeval(r0, 0x1, 0x43, &(0x7f0000000100), &(0x7f0000000140)=0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_CSUM]}, 0xfffffffffffffe61}}, 0x0) 18:45:37 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r0, 0x0, 0x0) 18:45:37 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) r1 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000007c0)=ANY=[@ANYBLOB="1c0000000714010000000000000000000902020073797a3200000000"], 0x1c}}, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r1, &(0x7f0000000440)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x38, 0x140d, 0x10, 0x70bd28, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_RES_MRN={0x8}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x3}, @RDMA_NLDEV_ATTR_RES_MRN={0x8, 0x3e, 0x3}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x3}]}, 0x38}, 0x1, 0x0, 0x0, 0x44000}, 0x4000004) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x3, [@union={0xa, 0x2, 0x0, 0x5, 0x1, 0x1, [{0x9, 0x2, 0x4e5}, {0xd, 0x3, 0x3}]}]}, {0x0, [0x2e]}}, &(0x7f0000000100)=""/220, 0x3f, 0xdc, 0xfffffffe}, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000002c0)=@bpf_lsm={0x1d, 0x8, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000568300000000f7ff0100000017510400fff7ff85000000a100000085100000077f983d77f50000468b3200000200000000000000000069009500001000246214d0d3531ed9b04a027459a719ab9699e4cbb7ee56114208d1828cbcb85d8137c95026ae835f0a30bb2e6aaef31f95f161b3dd76383c098114188a8202cb792788c2865448e23975c4d436a62996a5ccac99a3ff231afabf8fcb"], &(0x7f0000000340)='syzkaller\x00', 0x9, 0x0, 0x0, 0x41000, 0x0, '\x00', r0, 0x1b, r2, 0x8, &(0x7f0000000240)={0x3f, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x3, 0x1, 0x400, 0x80000000}, 0x10, 0xffffffffffffffff}, 0x78) 18:45:37 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = openat$cgroup_devices(r1, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) openat$cgroup_devices(r1, &(0x7f0000001680)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r2, &(0x7f00000016c0)={'a', ' *:* ', 'r\x00'}, 0x8) r3 = openat$cgroup_devices(r0, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r4) sendmsg$TIPC_NL_MON_SET(r3, &(0x7f0000001640)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000001600)={&(0x7f0000001700)=ANY=[@ANYBLOB="f4140000", @ANYRES16=0x0, @ANYBLOB="01002dbd7000fbdbdf251100000084000280080001000000000008000200c8080000240003800800010002000000080002000300000008000100e4ea0000080001000000010004000400040004004400038008000100000000000800020007000000080002007f000000080001008000000008000200ff07000008000200dbf4937f08000100c70000000800010007000000580006804c00040067636d286165732900000000000000000000000000000000000000000000000024000000184ee7b2ab2731c31edb577284d13d24cdd3a3b75e0f60a2e32a63e5e647500623fd4bdf0800010000100000a0000680040002004200040067636d28616573290000000000000000000000000000000000000000000000001a000000785136f05356166533c3587987d2f65e44ebd213ba4c33a710ad000008000100a20000004b00040067636d286165732900000000000000000000000000000000000000000000000023000000314f8971582692dd38bf406b520a8e2a0d72fad5e3d4ddbbef07421c8b897b5339ac5f000c100680040002000410030045c01ddae9acd776cc85c06a803b3149f7d026e8d208a8dc618cb85dd29c63829febc66924db1572e5bb13d8ae66efa937850dab38571dff0298e2ccdd52571d93e973698395cb51158bc312d442ed274240411ea947a2f582f6a241c9b4c7928d369c6163b796157438ce07734d55064d65daeb6368388b3c6188a3b00fb1bd6f35b717651b0cb7654b1cc094d5df4c05f2dade7c94c0f05380674a7dfa64b2cc55106dc12a8dba23fd98b3a542e114ef41911aae1ed18e6c60ebab6d94f7bdc37524f393c1cf3e4aeed2474d0c34c3a427432bae21aaa4bcfe7c3e83b979a00066622ea98839d3e498caaf4ef1d3a2d82612fc028e5f4a733929bb3606c389037465c2602ef930e279b641bf55fcbb19aa19879b712ecbc43f03b113827e35305c90ea0a7513f5305efa30f1140ba25d5bb142dceed4bb54f8d1e1744a80bef7198944b65165aa4cc92649909e3864bdcd4c366673b93feb8e5e34d181234755e19ef9947a4f90c42d27df7b5e8c7fc1c12621748d9e7a7b8eeb0f3abecf4b321b8a5028e182d2783729c74b047055614de5f417b0ee360ffdb0a93bae778a2d397a98d3cc4377c9cdfecc4a011520db0c8d123c1ea779d5dfffedcbf42a94bf167355388a7543133d9e0f784138af1bd2d5c6d6bd24b424923fd86b4b58147241faa840d9a41179a80c376a70678cb454c31d63156dbdb8cfe24c707d6925d9c979681267c223a2ecc0fbb2954aae5c172eb1f5083fa63b504dd39cb8188661b3486a720b87be21bc70533a85daa4c70e944f2a75c81e845b6c6d2ac6f7df80184ab984f97a5e37a8327e41fe0321d3521fa5547750a20e3877f9e3b40c7e24daa835e23ee985c4acf9de7003ca1a177bca71023d57b11d7d8bfa7bdee02b6a872a4afc890084368e669a76296807d040c6c3a846e1846a5a03071aa321043fd5b7698ae30104c2d31085ec29d6bacb6e5724df75c1c66e6c0fc7811293a357786df1c9d2341bb2a3e6723b21fa77f99901d6bd7015b2a49be14e1f2affa7e4d3ea3ae2e27589004152d4ae4b985d064d1f773d00caf791e1f28a32cf2233e2c5c18548f1cf90ba5082888e519259666be32886e3f62e838d972e90a9520e24810bc172c54789950d989be0d17cbcaea5def78c1db044bd9dfaf40cb426db0a2a3c3dd86348acb64e0aba5efe69d00592154d48e443ed97606468840488079538147fd44ea8331cc57a374fdf7026293e6244a7100aaec5c85e0d61ef38fb77a865d4e71533870f17ad7d0e86813d861cc90738d145547c0770dbe4f6e85f2059847d140ef02d4e90a394a55207dfd28b0b1edc4322ed932008e10610702b9b6a68ec9e2e0686f4954b8b250d9155647d99e27e674cafaa9eb221310b6c2d9384ea2ab840438de9ce632d53908061f5cac702ead1198487b0ea8e8225d6c59780e5f343817794c590ad3d8c48f0fd4070d7fda4f06ba570ba3e4e7cb8e6526fdac01cb2fc27096b229d1070c8596ee0f948e17f967a6b1bd4e604e738e6effda94e1ed1302e29ecc9d564647340db30ce48a0534620007b999b7a37c72342997ffb27b40a07e6da585b16fdceb2e51fc4e90a8813f5e4836a9917f06766d1d972a9d5502ece2b6a351b99933c9300090bf88f49af33b7e27b84d84306660156d1d54e00b22f7cfcaf85b1d9e817bbb13fffd9f565b1ff66c6898748b1d02cb97ac1ee5cc6c9e79a8dff78e5d12b88a766db6a29f5e023038090c76a0539fbdc8ec7966c7fec823e1038294a99123c6d5a48937099c4ade8edd67dd07594bf36ac3352e5ecd6db589736d7b858e0a234efa5c4680547e500d4572f5020eb4775ae61a0d0d80c1d48562d7a6f7630dfeb71b17d8dc7aecca44c70bc3b70703d41cb342bc4f4207aac6ea8954f7f96ec3c1d208c1f9c28c00adf53083487a722a0f254909123d7db51fe212accc9208aad7ca7820baa388b747287ebc050dcd7662a865cd0cf9d8af21b0579e96d241577b86935f200728cc8652a274db9189e2a4649d0f3925bea06ed35e2d6add66b946b1e1e3244a0c7dd601709b561efadf4c6bfd3289d98cdc5e1fdd967b8d7f96b1cbf68ff66758eaff89a60681dcda2300c3bc2805d7def3ab1fd9f4eeb43bf17a5960067b1d36989afeb1d1f33f93295f2d75ca161c7123d8c817bcfd854674b42ca109607d969fc60793de728847b0c9cdb43f36e8b3c7b4c5f7d3ce17550c40f90df081c88b6bbfb775e85dca3c464d69c69bdd055989a0779c44cbcd1650809cd1efcde79a72b97fc2aba26452d6d2110640d9730ed51b81de0502485e79377f0f881fcc84795904d9de3b21b90646d995a7e33b3a4ad1182f7b419bfbdd0ae0c05f34a3ab95ed920ecb1cf5c22bec5d73b65212a5f559eca8f9b8e94486c73e69d161493d783a1686daafaef6feb8f93d2283a2b7a1f387715d868460f71ddd147e71d821b375ef8ee40cd8ab16b14f10f97cd91dfc4ca922d9cfb1ed7ae289c8472b414606abf8941a5b4ed9991edf496b3972dd0180f60c50537efab7195ccccc253602ed8c713ca2d9f050ee10c3026d65fef74f6fbd95e0e12b12be2e8060539d3928fbc0c14ca8275dc51de8ca5fc5ff49fc7c7f424c2f89718111eac6a0d02827d3e8671854a39e17b07123b5bb30bd2bad13f626fb4839ac8791c13e67969557c31c1a8e76d003b6bfa95f417c0d18d1a119dc20abc131492070215eb26222dff58f01ecebe672457018904d9d0fa13c5e727076e706c48bc983fdf52f6d78ee2353fa9a6fe1642b1343bc00478c0edefe5d6a4cc3436cb849dec92119e7d61c59feca6243766b53fad39f83aa11685a874373dd7e15b64e30269d549e4100a5a5a45eef2e0e7b499491ef8f99017cd9e1b4da0a260ee7b208104af0b26db535e0a3130191627f5e4e3723169f46a5a20260fd6a07a830599702aa1752f8d4bee9f6d915b417cdcb5e2381dab8662b6c3cc41b9ab62b5c535f4f7758c0dad325d2976b31143f6f2caae03f6090c6eca95baca08ec54238e48c749dc4bf1bae53cb631b89f56dd0816d416f856dae8f591f87e2125244e758b300a25d41fdc5a43d50c15219099b6d8f6de9f7fa9f677c69a606ae21b7a39895f0b5623d6ae74bbf17f24322996b17629ba50435f8d077b33ee5d89f6229b2944ac2bb98575893585752342afe7525ce90b85ed90d1300573b16f9ed8512673105b45fd2dec513e064e582a89b0b787a2c84010af053b6aaff80f7d8d6e7bfd06bc049510a4aaa522bdb50d4d5bdeea0b109882346106ce7e43a946f17e6e0456c143785011ec76588508c5e0480eb605851cb00dfd1e2bb269ffbff83c9ab3630ad5a21d3b77172e8ccafa5016a25fc7e2eb0b3fa4db037538d678177be59e3c43cfc3cb5fcff86e82ddd21af4289c2ad47a032251aa5933b10a17ad698e34f9bd1cfd90ae7a844d0492eba89a2bc76abcaf2233147c210bc930d81a28b1c8f7a349ac812c73b64c0be5b41cfcf6419b9a67092ea96845fa53eed9b6c45e2b923ca0c9acb40a383ddcd6ca8a328e96bf38c3eb8b128f9ad34880e055c37a5a5efff6ab0fbdd189f691802d06fda828fc143516f840b239650ebcc896d16c50c6811a37e73ee770a9599f0d94cf20b038c7c07d56fe948f7bc689ea4418df7bd79e2237ff9526a6bb2568e1aca6be1b3e4efbe58fd6b961ae955ce920452c1020dacf00c017577870a15cdfa6add6e3d15b0465baebd99264ce2f2be8cc37246476ee12e79303e635a551eda00d60c9106dacc32e2580f507452258551f8d99c7cb49a9906d3f49c6c40d4b938a1e716c1768a360477147c507aff4a16ed020bfdf48bdd06671a597bedb74ce0cf260cbeeac551a4cc12e8054f83ad7aa45bd8b78e658c413e51f77b3f244b6bedb33418b937bb2a14602b65f01fb1900bebea0e50de3c8e55664a6e86a11790c9c7139fd7ea0a187836bea60749ba83f87083353380bc56cfca4b88a40e65e4847960a17c479c4eeb91b5f06e396302ff9655c648045f2df331a059e0839d29774c9865c8bb208309b9a572bc34132d31ace77844c28d2e014c0b006bfe69ad8ccced861ea7f06fc810771801fe94e21aadc9fd6f0140a6490fb4f1adb7c86c7b74234fcf92273ee61812adeec436c0e12b68a54e6fdd51b9bd87a0f0a03a163d6931ee47c56a6af99f2b3c68306882e3d827b41b985ded75e9fd39001000b44cd9702abeb8861ac6ae7dd6e37f2f0b4ab2ea39bb177b5ea4430b05e26122e00466f92057c08aa6f6d18d082caa0ae45f2d4f05e8824292c269306484baa9545c8297a500740f74407612ed7c184392ad4931482aa00cc153dd076cf1590989e8022a39a5d66b42eb1f7f7a663f6aabd73dad3abe1712ecf27f6f735d16dc8bec5b89d1f500b57817a0663867e5efc4cf2d3c97d079b70dab9912cd758c93edbfb16e3ac9a4469841a7acf6dce55b807289350f298d2bdee6c2b60118eb3b96fd1e3a3605447129ff40cc2d9041f9466428ee05733f8b89a941da692bf98e92a295005853975d38f7c496dd7f92a48cd74f76dede43d6efe280a930fa629b35e110fdd80a77370b869c36e02bceacc4268310ef0bed31b64939f8d2f5bd700507dbb9b505fdf9d35e04c75d3be7c32bc990e3bdbaf0c76e9b834dddece5e2bccb65fec5901e86b9b73ec9ab63dec1865668709c30dd7a669e99e1f0a4c90912b8aa082c1d8c54c8e44bd246e09ec3add5c0c9b89f3227a9a4d29aaeaeb19b586f0b5656726931374d1de56f930eb6d877c669daa0318f1ade620efcd97f76b98bd2bd1471ea922f345a3f1a0730109c5e32e6a1bb75fb16528d2040f532d9e009d32aa146c5dc17609cc3243a7bee2b2d42d4723a5462645b9faaacb12d6b70830c9ea6c093c295335ec4869d4f26b04f9a0d452ae0b56e8502d4f2cbe9302159b4c58586ceb39f005998ab2f9f54b5e3bb1e6ce94b1d801b4b9dd4a7f43b184849d2e071331c17de6bd7e7972c8e51206080f814e34fa390d5b5c7fd657e0084fb7f2b73256bc0fdb6cfa61e4568c694e32a1a5dee0c0ca3b477d9cb74830e6fd6933f44b6f831051c70d56fd3c443c592e3b33388daf91bff41c4b8038ec814dee1117929d91e8b31eab758b9a5fa85be113ee8b50bf3907d827a1a3c63036b0f7b6a5ebfb5df80f15f8b052d0223f2cd2ae7b48eabe60c3bc7306310ba08ae886c8c7826c8d635c20796706feea11db71de8c869a2de86d000204b1707ca86b724d972ffdc8a04c1d80292a0f23a9dcf947f2077916e3e561c3a13312cd661bdd4c6f97178f7062209a1e82769b2aa9eb3ff12a2ad9a61c65ab1865b2641c41de113a15a751cc0d7693e16a13a9f31265f46100cccc559a8c503d125cf20f620c8e49f722c477827b3356aa1f255400bda5d7f5a154e4196f7ba08a97b59e782cb348194f99298da94a3986848b99180b5af1c867d316b0def6692dfd8cc2f8f57f9a13d6c290de34c8d2c8b3f4868f89cac02408874a1c90fc79d3b6671607473a15d7f6eb3325a28f648dbc2c96bdb9bac47c916447972e1f4441e3fcade0ae9386409479031de82a7df36be9fd968310bbeafd06db8c070b6581bc84dbc740d8051f990efec7c4fa32ef1ff7f90f091c51b020abaec13bea182195a7e0d4ad40659b2a6d5b87d70237a23dd8b09585f904cf487db8436730ed4b2076385d5400ab4feba0e2724ea952d74865384a8902b7813ced0bc7b842a5b8211cdabdfcd29c0004800900010073797a31000000000c000780080003009c0500000c00078008000200010400000900010073797a30000000000900010073797a31000000001300010062726f6164636173742d6c696e6b00000900010073797a31000000003c0007800800020001000000080003004aa5000008000300080000000800030006000000080003001f000000080002000400000008000300970800001c00028008000100faffffff080001007f000000080001008000000008000680040002001400078008000200030000000800010001000000940106804700040067636d28616573290000000000000000000000000000000000000000000000001f0000008a3117fbdd334243c8c1375d4d7b705dabd9d8bcce36ec353251aa3ce08646004300040067636d28616573290000000000000000000000000000000000000000000000001b00000054f1d1aa982131b449dc392847e16cb4dbcaf8d304efd978b40d050001010300e47bcafca6f654e4be6d353ff12a6784d8deace14a403c9bd4adbf29bd8627f9f237ce619910ef4bbe5ec4764c5ddc262b1a752aa81439efde7e46256c6ac52421729f58506ef19386924b1e905fbe4ffdbc01e259369e6bc531d132b77c7886fd98e2fcf006688fc14ed0c4dcc5cb3957bb355ae1766d06175294050db2190d48184b5cb6f6a2d781046dc00cfc5eaa667dc0b668c0aae0c6014af6b2504d66f76b27f7ef065a4112f8b96653f35a25b71262ab892b99b055b0e9e3ff2d20e5f1b583460a691dca5da8194278d19e2c405e4547193778773838e1e42250f37011fa928241ff20557b9cd2dda74279bb4d00dac7e9d15260f79e741360000000f0000680e90003001094dc653d266710ae7a00c301753ed19d02d5652c3c4bdebd3632ad8c9a2cdc7e46fc697c94cf8d323dc0d1181b4cdc568516061c047ff900e9174828473e59f120613c499ce82510d1a9fe94a5bdfca92a64f3107a0cf3109f1516f41c652fc443d6f3a74c526e764df7dd44eaf8b9dca4b8c48d59fcd3498d0248c704ff51c0ec80ec6e3ec528a11220c22a8504b1a76c3e225e37a582b06c1c41141411e59e1b688c9cf8ad01b1fd4fb70310b2bc2c3c6664546eff80b3413bcdd165121e5a440355e24dee2eb28b632b06e0e972b35e3131705e7a0000000837812bcbba8470cbe978add2962c9e7d4768bab5e42f5454432edb7579f9954b873a85f4d5e3e0b5cf8b222fb90dd816d45b4df3"], 0x14f4}, 0x1, 0x0, 0x0, 0x8000}, 0x20020041) 18:45:37 executing program 5: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x30, r0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_LINK={0x18, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x30}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x28, r3, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_IP6_DADDR={0x14, 0x20, @empty}]}, 0x28}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x24, r3, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000010}, 0x4090) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x20, 0x140a, 0x200, 0x70bd26, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_RES_LQPN={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x20044044}, 0x0) 18:45:37 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r0, 0x0, 0x0) [ 2419.622285][T29928] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 18:45:37 executing program 3: connect$unix(0xffffffffffffffff, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) 18:45:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x3, 0x0, {}, [@L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x2}]}, 0x1c}}, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) r1 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x24, 0x0, 0x2, 0x70bd2b, 0x25dfdbfb, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x81}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x24}}, 0x4040) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340)={0x0, 0xee00, 0xee01}, 0xc) getsockopt$bt_hci(r1, 0x0, 0x3, &(0x7f0000000100)=""/4, &(0x7f0000000140)=0x4) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000200)) [ 2419.699901][T29928] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 18:45:37 executing program 0: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan4\x00', 0x0}) sendmsg$IEEE802154_LIST_IFACE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x0, 0x100, 0x70bd27, 0x25dfdbfc, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r0}]}, 0x28}}, 0x48050) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0x10, &(0x7f00000003c0)={&(0x7f0000000340)=""/8, 0x8, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x19, 0x6, &(0x7f0000000140)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x10001}, [@ldst={0x1, 0x0, 0x0, 0x2, 0xb, 0x8, 0xffffffffffffffff}, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}]}, &(0x7f0000000180)='syzkaller\x00', 0x9, 0xd2, &(0x7f00000001c0)=""/210, 0x41000, 0x4, '\x00', 0x0, 0x2a, r1, 0x8, &(0x7f00000002c0)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000300)={0x5, 0xd, 0x8, 0x101}, 0x10, r2}, 0x78) 18:45:37 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r0, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) 18:45:37 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_devices(r0, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000100)={r1, &(0x7f0000000080)="441e26b86bb581ba63f0a4", &(0x7f00000000c0)=""/22}, 0x20) openat$cgroup_devices(r0, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) 18:45:37 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x140a, 0x1, 0x70bd2a, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_RES_LQPN={0x8, 0x15, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x4}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x44085}, 0x0) 18:45:37 executing program 3: connect$unix(0xffffffffffffffff, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) 18:45:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r4, &(0x7f0000002e00)={&(0x7f0000002d40)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000002dc0)={&(0x7f0000002d80)={0x1c, r2, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [@L2TP_ATTR_PEER_SESSION_ID={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000810}, 0x4000) sendmsg$TIPC_NL_BEARER_SET(r3, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000300)={&(0x7f0000000180)={0x164, 0x0, 0x100, 0x70bd29, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0xfc, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_NAME={0xb, 0x1, @l2={'eth', 0x3a, 'lo\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @rand_addr=0x64010101}}, {0x14, 0x2, @in={0x2, 0x4e22, @private=0xa010102}}}}, @TIPC_NLA_BEARER_NAME={0x16, 0x1, @l2={'ib', 0x3a, 'batadv_slave_1\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1000}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x6, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7bf}}, {0x14, 0x2, @in={0x2, 0x4e20, @multicast2}}}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x7, @empty, 0xb5}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x1ff, @ipv4={'\x00', '\xff\xff', @remote}, 0x1000}}}}]}, @TIPC_NLA_NODE={0x54, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x3c, 0x4, {'gcm(aes)\x00', 0x14, "82c2d926e2244decd934289fbe31e6f657fdc260"}}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffffff}]}]}, 0x164}, 0x1, 0x0, 0x0, 0x10}, 0x4081) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, r2, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_CSUM={0x5}]}, 0x1c}}, 0x40040d4) getsockopt$bt_hci(r1, 0x0, 0x3, &(0x7f0000000380), &(0x7f00000003c0)) 18:45:38 executing program 5: sendto$unix(0xffffffffffffffff, &(0x7f00000003c0)="41d533658041a140bf0d1f2d64df025323a7e59c8d3fe53aef41a53e052b1bf0bd4849407179189c30dd55309184165f32f111fcb7eea8f4cdb94247f819b5d6770b2c7f", 0x44, 0x0, &(0x7f0000000440)=@file={0x0, './file0\x00'}, 0x6e) socketpair(0x29, 0x800, 0x4, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$PNPIPE_ENCAP(r0, 0x113, 0x1, &(0x7f0000000380), 0x4) r1 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f00000004c0)='devices.allow\x00', 0x2, 0x0) write$cgroup_devices(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="62202a3a2a206d008c2cde5859769fcd0b03faa6754f4c1b9a44e95d1630551d7b5116886e5f812d332d351ef0c63d7b04924181de5c8fd74f96e444eed03efe6508866a13dd0db7e0653945392ff8aabdb4feb5cf50194ce185e61047dea5a55e0de68cb9e1b6e21a8751c3e40f021255e93ae2afc6a539537a34d59b3ddbcc820af377b3cfc349d3feaf62213191eea87131d09ddae0a77ced8a32dafa25f3"], 0x8) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340)={0x0, 0xee00, 0xee01}, 0xc) socket$inet_icmp_raw(0x2, 0x3, 0x1) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000080)=""/128, 0x80}, {&(0x7f0000000140)=""/79, 0x89}, {&(0x7f00000001c0)=""/63, 0x3f}, {&(0x7f0000000500)=""/136}, {&(0x7f0000000680)=""/152}], 0x3, &(0x7f0000000280)=""/32, 0x20}, 0x80000020) 18:45:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) r0 = socket(0x0, 0x5, 0x2) sendmsg$TIPC_NL_BEARER_SET(r0, &(0x7f0000002f80)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000002f40)={&(0x7f0000001880)={0x1688, 0x0, 0x0, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x48, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xf2a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}]}]}, @TIPC_NLA_SOCK={0x78, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x10001}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7f}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x775}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xb2f}, @TIPC_NLA_CON_FLAG={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x800}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x800}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x200}, @TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x10001}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_NODE={0x110, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0x84, 0x3, "d1e67bcf43b09e5e5f0ef87400a59970f0054028a51699ff827a3c74e42d631a439ef6ced2d83371b75cf17491c7cee07b88ab229789435c4426611ec146d20cc147e729a99e2dbe3de03245d94c7de7b87a3b3359ee76b5f563c73376656c363fbbc8bb6c5cd82dfad70fc4f01ce88f4cba67de2e3272c25e004baeacbd6023"}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_KEY={0x3f, 0x4, {'gcm(aes)\x00', 0x17, "4fa242a507f5f6d5f32ee4838d2dec51f9fd7d02283b9a"}}, @TIPC_NLA_NODE_ID={0x37, 0x3, "efb4f43febae4ae1d1273ee3bf23691feda3c0eb87a45ef793f8bb4d9b54442f26920d2ef0b665bbace51705c8b87fcbf43e1d"}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xff}]}, @TIPC_NLA_NODE={0x1278, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0x5e, 0x3, "014761e791720d3a5e935bfe0e95686e3507272f914cbe55be4c9d96cf75b8ff9b6104f9a93afeac3dcc696f3ec925fe9503be2e88eb273f09a965841a6285f1e0d1aa23feaa62b4783ef82eba07d6a5f5ff836b40040c847d35"}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ID={0x8a, 0x3, "3974c184ba596689c9fb5be66f0893c6b73db682225dd4a897762d3085762b58a7de34db7e31ea8f5fd011d2c0ea2e7fb9925987b3788c1e3b6314f8f8b2601e6cab4373965d9a9d86fb0edf091b8a7b72098636720d3301c87d5f5fd45ff987063ff7b5cfcef36c11013634a8a2829853733553c075053a820799ccdd075a377ea52be1c90c"}, @TIPC_NLA_NODE_ID={0x1004, 0x3, "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"}, @TIPC_NLA_NODE_KEY={0x3c, 0x4, {'gcm(aes)\x00', 0x14, "73ceddf4bac031f06ce724d3a6795a6189c9a530"}}, @TIPC_NLA_NODE_ID={0xaa, 0x3, "659fa256cf0ee5eaf5240ecac3349fc48331ae52d2f3d47890d79a2e14600750f5dd29fd063232f52024186ef1aa2083afd1ebc46e06d5f66ce5c08ab4722884ba5bf61b0266ddae0e6f9333e5117d96c686c1141141dd89e31d990e6e4c7536a3d3ffceb8440ae6b3fc976ff7f18cd8a5f70d83a3215f000804660997f8130c0c977303b230689c463d388a4b8ea48aa8a445db000daa20171748c6d968157e417827f5b679"}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ID={0x8c, 0x3, "cde6ecc79cf7f1900378ea4cc7b3073ecdddc4f93a62b313cb7e4b3f7d5bbac2bc365ad89d85c9f2b50cb5f904b323896b6ceef80ca8e55825400f948872c5867c0613f39d9065f0c54cb817b5fa29a44a016501f5d106dc1b1928d7177d9eb4ffd8f558cd2154a82f4c1c63dbea9ca890f87e37e93df5662d5b4a5262119db5e51381d53cb7f910"}]}, @TIPC_NLA_MEDIA={0x30, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}, @TIPC_NLA_SOCK={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x800}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x344}]}, @TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8}]}, @TIPC_NLA_LINK={0x60, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xcfb4}]}]}, @TIPC_NLA_PUBL={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x2}]}, @TIPC_NLA_NODE={0x168, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ID={0xa6, 0x3, "ad82548a5ace20ab490f1db23ecc5d184f415e8496b91d0c26af5e55f96d5063ee13fdbe8cb9ac3f6a218a90d9b5cf3acf182f56cc5ee6d58069fa105e726ba710eab25cbd45973464d7d1db898e32d5141e009015beaf7ea55f10ae400c1c672b2dd214d225dd048f4b038cc7983147090aca213f2e486d16542aed0520cb74a84a025ec9ea84e19b54d6ac0e93494bf35950092e8a001560c9d4e589c95b5bab2f"}, @TIPC_NLA_NODE_KEY={0x48, 0x4, {'gcm(aes)\x00', 0x20, "450de3afcb5d296adf1402f1f081471734efe296af66edf70434e867a4939957"}}, @TIPC_NLA_NODE_ID={0x6c, 0x3, "3e0396b44609b3947d21e77f2fe399f8a1c018f9b754249f22c7bec5ff5918154dc2383bdf3c0010b10df69e172bdf24e7a577caadab8062e65e4793f0536e60ef74365bc827ace4a58372d0c50a4aa957cc9c184752ef78e4c3352848ae7a065cf2c72048f8269b"}]}]}, 0x1688}}, 0x400c) 18:45:38 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44085}, 0x0) 18:45:38 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) 18:45:38 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LIST_PHY(r0, &(0x7f0000000c80)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000c00)={0x14}, 0x14}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan3\x00', 0x0}) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {}, [@IEEE802154_ATTR_LLSEC_SECLEVELS={0x5}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r2}, @IEEE802154_ATTR_LLSEC_CMD_FRAME_ID={0x5, 0x34, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x44004}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), r1) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f00000001c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_KEY(r3, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000340)={&(0x7f00000008c0)=ANY=[@ANYBLOB="540100006cd154b40f87e5c04df293bc1d0b0e21178245c34f719b4d6f7f3ed05a9f36143f0806b61483131ce799175a9d75b8660640dfd8ae0c4d42db4a7edf1dacbb2f6d167a5312d6f9b2e6c2c48939d245b73604c35a9386aaf55b7157bb50e9476b", @ANYRES16=r4, @ANYBLOB="000027bd7000fddbdf251800000098002580050002001f0000000500020087000000240003005d974117705d6db643e719c14fa15e839f76807e2d30f74e455daf4ca5f14103140004006f5388d13f73d73e542492d9bfa2df1014000400db2e8772239ac900c98faa0ffbbd76391400040045231f5cfc6168a2e32723b7f74d64f3240003003997ffc575d93fe06ba98646a91004dd09c63bdb1ddb62c197ba3a820f5da9f008000300", @ANYRES32=r2, @ANYBLOB="8000258024000300081d55243912e2709cf08330ac87b9340ed41c55ccded5cd0991e427ee40272d4400018008000400010000003800038006000300a0aa000008000200030000000c00040000000000000000000c0004000203aaaaaaaaaaaa0c0004000201aaaaaaaaaaaa140004003a96a76b0c87c87b2e518a0ea02f402a07000300", @ANYRES32=r5, @ANYBLOB="0c00060002000000020000000c0006000300000000000000"], 0x154}, 0x1, 0x0, 0x0, 0x4040000}, 0x20008090) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan3\x00', 0x0}) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r6, &(0x7f0000000100)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000400)={0x38, 0x0, 0x20, 0x70bd26, 0x25dfdbfb, {}, [@IEEE802154_ATTR_LLSEC_SECLEVELS={0x5}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r7}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x38}, 0x1, 0x0, 0x0, 0x44004}, 0x0) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), r6) ioctl$sock_SIOCGIFINDEX_802154(r6, 0x8933, &(0x7f00000001c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_KEY(r8, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000780)={0x120, 0x0, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@NL802154_ATTR_SEC_KEY={0x64, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x1f}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x87}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x80000001}]}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "6f5388d13f73d73e542492d9bfa2df10"}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "db2e8772239ac900c98faa0ffbbd7639"}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "45231f5cfc6168a2e32723b7f74d64f3"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x15}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r7}, @NL802154_ATTR_SEC_KEY={0x80, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_CMDS={0x24, 0x3, "081d55243912e2709cf08330ac87b9340ed41c55ccded5cd0991e427ee40272d"}, @NL802154_KEY_ATTR_ID={0x44, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x3}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x38, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0102}}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x3}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0xffff}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0102}}]}]}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "3a96a76b0c87c87b2e518a0ea02f402a"}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r9}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x120}, 0x1, 0x0, 0x0, 0x4040000}, 0x90) sendmsg$NL802154_CMD_GET_INTERFACE(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r4, 0x8, 0x70bd25, 0x25dfdbff, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r9}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8010}, 0x4040) r10 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) sendmsg$IEEE802154_LLSEC_DEL_KEY(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x28, 0x0, 0x2, 0x70bd28, 0x25dfdbfd, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x3}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc, 0x2d, {0xaaaaaaaaaaaa0102}}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x40) openat$cgroup_devices(r10, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) 18:45:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_CSUM]}, 0xfffffffffffffe61}}, 0x0) socketpair(0x21, 0x800, 0x4, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$L2TP_CMD_TUNNEL_DELETE(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x7c, 0x0, 0x400, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0x1}, @L2TP_ATTR_ENCAP_TYPE={0x6}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x80}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @loopback}, @L2TP_ATTR_IP_DADDR={0x8, 0x19, @initdev={0xac, 0x1e, 0x0, 0x0}}, @L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4000001}, 0x40800) 18:45:38 executing program 5: bpf$PROG_BIND_MAP(0x23, &(0x7f0000000000), 0xc) 18:45:38 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44085}, 0x0) 18:45:38 executing program 0: getsockopt$PNPIPE_HANDLE(0xffffffffffffffff, 0x113, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) 18:45:38 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) 18:45:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_RESET_STATS(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_LINK={0x18, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x30}}, 0x0) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000140)=0x0, &(0x7f0000000180)=0x4) sendmsg$WG_CMD_SET_DEVICE(r2, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, 0x0, 0x1, 0x70bd27, 0x25dfdbfe, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0x200}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r3}, @WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x4004001}, 0x8000) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_CSUM]}, 0xfffffffffffffe61}}, 0x0) 18:45:38 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000080), 0x4) openat$cgroup_devices(r0, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$tun(r1, 0x0, 0x21) write$tun(r1, &(0x7f0000000580)=ANY=[@ANYBLOB="0000dada02802fff0000090006006c25a37804493a0000000000000000000000ffffac1414bbfc0200000000000000000000000000008706040300a0f9ffff02000000000000000000000000000120010000000000000000000000000002fc0000000000000000000000000000013c1000000000000007080000000100fd0800050201ff05020007c910fc010000000000000000000000000000c20400000000074800000003103f00040500000000000000d30e0000000000000300000000000000ff010000000000003f000000000000000000000000000000ffffffff0000000003000000000000000101000001000001000101003a02000000000000c910ff01000000000000000000000000000100000000000000040402ff407672fc010000000000000000000000000000fc000000000000000000000000000000890001306800000087009078fe8800000000000000000000000000011803aace8d427a50e768f6a9e7e41e18a1ce9a65cb931e0ce1099a53221649a4e407f4d187134ef5151ff445af4b6dc166d237bbebca68f3a19838d79df9fb3562ba218e7e28611507f086f324055074164a0d287189c47e46c3581c372aa4f19df297d0e7177f7511df4ebffe2024cf4ec754d759d43fc34d3d1c5e3a21cee9be9d1c58059c2c8923ead682a97763ffbbb308c73e6532fd21289a5773e96cb2cdffa14adc4049fddddb848e665317f95dacadcb86bcf00420f0028bb6ccbea39a8cb667953aed23f5d0e5b3894742791907f496480d0990557db112c88bd94d8c0c541900f9521fcd02e1ee02e1942fa5d754e6b1edfb1bfbfef322ac4a122f99e8535e3a979e565bec93c654001eb412ebc7897f47cb0b6746bf5939d4de8db067ccbc7362fcbd0f6820197500f659c2f4a3fcdbeaab02897124d874e5eab792bd6bdf3bc6457ded03a52d3051a5641edadb2f42af4b504fbb292f0bcea664618897d5ef55ecb7096d46ac8b5e1abce44e4a8945037a0109e61c0236cc9fc15e2947867aff7d8de0293f537c487fa110c544fac96aa221055d2467627ea2b2945d4f950a93278233beebed60a4aa18dd709cdbb51be83052e763c31f121ec2beb1cc3cafa7db1fff63d37f424cab002fac4aa371483934a9c9c28301702aa48eea57bbcaf06d1cf345728143d362b5c53ddcf0eb1049a22de0c7095c730533486d1a2efd0312bdb6bdd36da2202ec217c7a0487ffd8cfa929f91293abee44333d99daabee384981545d255bf3932e1f9a10688a6b6a9f2a51337c54fa77444f75c37084dc19a17a7f25ad5fb35630a57f9e695fc82f5d2c068538c9526fa8c483df27cfddd1516e36dc70b38a5218ff966f0a78839f9d0bffd3ecec0da5330dbd993f9d4b2c5e0d441a107cd9fbf415a9600e47f7535df4702b8be7cdd5d0100221195f027fde875ed7a86bfaf85c575ca8ed205e01abbf72c2f9bfcdaeb37f8a7bfbd985ed66cffda10065e7e909abc1bbcd91c6fd6cfeb052ff41bd447f5e7b29101e9346d4bcc2842cba537a23a1c95904fc18cd1409049cb4344020a00d98e928f196309543870a5e4c9a4ba113623fc52f1aaf7627205e14c5e0a1aefcf3cab22ce94277247"], 0x47f) 18:45:38 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x30, r0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_LINK={0x18, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x30}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r2, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x28, r3, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_IP6_DADDR={0x14, 0x20, @empty}]}, 0x28}}, 0x0) sendmsg$L2TP_CMD_SESSION_GET(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x40, r3, 0x800, 0x70bd29, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x3}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x7}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0xfb}, @L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x1}]}, 0x40}, 0x1, 0x0, 0x0, 0x20000040}, 0x2000c8c0) 18:45:38 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x44085}, 0x0) 18:45:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_CSUM]}, 0xfffffffffffffe61}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 18:45:38 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) 18:45:38 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000280)=ANY=[@ANYBLOB="8ceb6296c0c5863eb07ee76308782889e7f41438b3589e8437e03434"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x3f, 0x2000, 0x4, 0x1484, 0xffffffffffffffff, 0xffffffff, '\x00', 0x0, r0, 0x2, 0x2, 0x3}, 0x40) r2 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffffffffffff, 0x6, 0x20}, 0xc) recvmsg(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)=@can={0x1d, 0x0}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000280)}], 0x1}, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0xf, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10000}, [@func, @ldst={0x0, 0x3, 0x2, 0x6, 0x9, 0x0, 0xfffffffffffffffe}, @exit, @call={0x85, 0x0, 0x0, 0x97}, @map_val={0x18, 0xb, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x5}, @map_val={0x18, 0x2, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x8001}, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x8}, @initr0={0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1}]}, &(0x7f0000000100)='GPL\x00', 0x7f, 0xbd, &(0x7f0000000140)=""/189, 0x41100, 0x3, '\x00', r3, 0x0, r0, 0x8, &(0x7f0000000340)={0x7, 0x5}, 0x8, 0x10, &(0x7f00000003c0)={0x5, 0x7, 0xfffffffc}, 0x10}, 0x78) 18:45:38 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet_udplite(0x2, 0x2, 0x88) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f0000000000), 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0xee00, 0xee01}, 0xc) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f0000000080)) 18:45:38 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) 18:45:38 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x44085}, 0x0) 18:45:38 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) 18:45:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYBLOB="003bf14130838041967e69471b64880d4d75cb4f91a73bf8b981e49617dbfd053895dec7dd83d2dd6257e6ace48db873c1f48f26ddc3234d0463977ef59dd1bb495b2077cb782ff98bdd66f2e145afd580fbebaeb073d7fd5a7c437b0500bbeb9feed2e914a121bd4b"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xd, 0x1ff, 0x9, 0x5ab, 0x1131, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x5, 0x4}, 0x40) 18:45:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="0000e0961076000000000d0000000000"], 0xfffffffffffffe61}}, 0x0) 18:45:39 executing program 5: accept$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000000)=0x6e) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) 18:45:39 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x44085}, 0x0) 18:45:39 executing program 2: sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x48, 0x0, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@IEEE802154_ATTR_LLSEC_KEY_MODE={0x5}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0x1000}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x3}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x8000}, 0xc080) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r0, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) 18:45:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_CSUM]}, 0xfffffffffffffe61}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000140), r0) sendmsg$WG_CMD_GET_DEVICE(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x40, r2, 0x20, 0x70bd26, 0x25dfdbff, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e21}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @c}]}, 0x40}, 0x1, 0x0, 0x0, 0x2040014}, 0x44) 18:45:39 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) 18:45:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYRESHEX], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:45:39 executing program 5: sendto$unix(0xffffffffffffffff, &(0x7f0000000040)="56f0d7aac66b2da9205b21a9e1", 0xd, 0x800, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) 18:45:39 executing program 2: sendto$unix(0xffffffffffffffff, &(0x7f0000000080)="94d1895bc9b82629fa7f3b5e1abbece112f0780576b64553b36ca7ec7b76100c112fbf8a65333fdb32fa453438d1e716561451d3423868b1e78d501ab5c7fc5f1a3958e0b13620f08303dcad5dd6923062e78bfebe7103f4cdc75af506afc0cb4598e4dab5f5614c4b5c8ca87570c107c18984a25798af0cc80c2822aec3560a177f8b3dfd6b05d5e56543a56ceaa09d413a", 0x92, 0x20010000, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e24}, 0x6e) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) 18:45:39 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x44085}, 0x0) 18:45:39 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) 18:45:39 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LIST_PHY(r0, &(0x7f0000000c80)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000c00)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$ieee802154(&(0x7f00000005c0), r0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[], &(0x7f0000000480)=""/205, 0x1a, 0xcd, 0xfffffffd}, 0x20) socket$caif_seqpacket(0x25, 0x5, 0x5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x1, &(0x7f0000000000)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}], &(0x7f0000000040)='syzkaller\x00', 0x80, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000080)={0x4, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x3, 0x4, 0x401, 0x20}, 0x10}, 0x78) sendto$l2tp(0xffffffffffffffff, &(0x7f0000000380)="1aa2d66e0c2582d37d007841f5720bb57cfa642e8b7a584e5edeed8fda07cb183902d7aaf40d3c006d14e5780a22082618de764d73af3001bc3f327b24805bd7f23626bb6d6a6be1953740a7ce99968ebe84a9d652e37c7ca63ab6169f42d3b08bf1569f1735d09bcc5c14736d13ac8b6459451bdb91119385fec2ca86686943d28de54a51ef873b22c9fad02e0928459b757a1fc056ff4158e79dff3f735e10fa72586eae068c4ca15330369d9517e4efeecdcc1fb1a6af66d43f4fa924ee0ffaa881344e66b7b40c000000000000", 0xcf, 0x40, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)=""/118, 0x108, 0x76, 0x1}, 0x20) 18:45:39 executing program 4: socket$inet_sctp(0x2, 0x5, 0x84) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x28, r2, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_IP6_DADDR={0x14, 0x20, @empty}]}, 0x28}}, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000100)={0x28, r2, 0x200, 0x0, 0x0, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'ip6gretap0\x00'}]}, 0x28}}, 0x20004005) 18:45:39 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) 18:45:39 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet_udplite(0x2, 0x2, 0x88) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f0000000000), 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0xee00, 0xee01}, 0xc) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f0000000080)) 18:45:39 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) connect$unix(0xffffffffffffffff, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) 18:45:39 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x140a, 0x0, 0x70bd2a, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_RES_LQPN={0x8, 0x15, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x4}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x44085}, 0x0) 18:45:39 executing program 0: socketpair(0x1f, 0x800, 0xffff, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000002c0)={0x0, 0x2, 0x8000, 0xfffc}, 0x8) r1 = socket$nl_rdma(0x10, 0x3, 0x14) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000240)={'wg2\x00'}) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000180)={0xffffffffffffffff, &(0x7f0000000000)="5dccc1ae9b58b265efa19015ebc2688cc543b99d0cd550f0c82d1f6357c827f36c77b675a0633e196e51341970e62dee886b259d934f66ec96820c595a7574738e7eda02f465cf2e62dbaf4f893ddcb6225fc15080f2be67e9065d3bbffa1aeb782400efc3ee2cac2d144ec182c6d17d811bb305c124ce30f92dbca676f87645f0fd443465842017ca0b65451ac24b65cb82ab8d265b738c7c6604deeadc41a38b901dd7405b3f5109aed8074d3d541ddde746a720e5c83d18967d1fa5ea24026ad6aa2f86d23764262b", &(0x7f0000000100)=""/99, 0x4}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb0197c04176159f2657e8707e2208211d140d9d252ce3a3e1b01c97469771a1b389bffc7093fb379fb0fa54db1861bd56f40a56ba8c359108680000175fcda40abb3155dcdbfe95be881520813facbc856c71e9e4eb3200dd00"/103, @ANYRESOCT], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:45:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="ff000000cd7ec583b69f831208296bf32d8e14cd43b74393415016a2fff40b8596c8f3054a8335bfbebc4e1339", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\r\x00\x00\x00\x00\x00'], 0xfffffffffffffe61}}, 0x0) 18:45:39 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) 18:45:39 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet_udplite(0x2, 0x2, 0x88) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f0000000000), 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0xee00, 0xee01}, 0xc) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f0000000080)) 18:45:39 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) connect$unix(0xffffffffffffffff, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) 18:45:40 executing program 0: openat$cgroup_devices(0xffffffffffffffff, &(0x7f00000000c0)='devices.deny\x00', 0x2, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000340)={0x0, 0xee00, 0xee01}, 0xc) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000040), &(0x7f0000000080)=0x40) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00'], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000000)={0x1f, @none}, 0x8) 18:45:40 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x140a, 0x0, 0x70bd2a, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_RES_LQPN={0x8, 0x15, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x4}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x44085}, 0x0) 18:45:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_CSUM={0x5}]}, 0x1c}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x6c, 0x0, 0x4, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x58, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4a4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xf9b3}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'syz_tun\x00'}}]}]}, 0x6c}, 0x1, 0x0, 0x0, 0x240088c4}, 0x4004080) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000200)={0x14, 0x0, 0x200, 0x70bd28, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x44010}, 0x880) 18:45:40 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000010c0)={0xffffffffffffffff, &(0x7f0000000040)="a79eba7426a26012fdbaf98f5797468d796e771748f0dc7373ab858ddb99a867e13bb5e72a19c292652e9d6a1c57b1453dee4999729f520c8e3049d1f26a68ce55533076a7b9dd713dde4cb7dfdacef4630b69901bd402fb3f78292eb9ef0ccdd63a53f6", &(0x7f00000000c0)=""/4096}, 0x20) 18:45:40 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet_udplite(0x2, 0x2, 0x88) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f0000000000), 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0xee00, 0xee01}, 0xc) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f0000000080)) 18:45:40 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) connect$unix(0xffffffffffffffff, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) 18:45:40 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x140a, 0x0, 0x70bd2a, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_RES_LQPN={0x8, 0x15, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x4}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x44085}, 0x0) 18:45:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000440)=ANY=[@ANYBLOB="1c000000", @ANYRES16=0x0, @ANYBLOB="c2f5fc734908eaa8e76f0700ed630400"/35], 0xfffffffffffffe61}}, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140), r0) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0xd8, r1, 0x20, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x18}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x401}]}, @TIPC_NLA_BEARER={0xa0, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0xff, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xff}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x40, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x8}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}]}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}]}]}, 0xd8}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x40, 0x140a, 0x100, 0x70bd2b, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_RES_LQPN={0x8, 0x15, 0x1}, @RDMA_NLDEV_ATTR_RES_LQPN={0x8, 0x15, 0x1}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}, @RDMA_NLDEV_ATTR_RES_LQPN={0x8, 0x15, 0x2}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}, @RDMA_NLDEV_ATTR_RES_LQPN={0x24, 0x15, 0x3}]}, 0x40}, 0x1, 0x0, 0x0, 0x1}, 0x0) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$IEEE802154_SET_MACPARAMS(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2008010}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x38, r3, 0x200, 0x70bd2a, 0x25dfdbff, {}, [@IEEE802154_ATTR_CSMA_MAX_BE={0x5, 0x27, 0x1c}, @IEEE802154_ATTR_TXPOWER={0x5, 0x21, 0xbe}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_CCA_ED_LEVEL={0x8, 0x24, 0xffff}]}, 0x38}, 0x1, 0x0, 0x0, 0x4c000}, 0x20000094) 18:45:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYBLOB="9fc7b955b3ab3e0feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:45:40 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_SET(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000007c0)={0x1c, 0x1407, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x1c}}, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x18, 0x140a, 0x20, 0x70bd2d, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}]}, 0x18}, 0x1, 0x0, 0x0, 0x1}, 0x8081) 18:45:40 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet_udplite(0x2, 0x2, 0x88) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f0000000000), 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0xee00, 0xee01}, 0xc) 18:45:40 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, 0x0, 0x0) 18:45:40 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x140a, 0x1, 0x0, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_RES_LQPN={0x8, 0x15, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x4}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x44085}, 0x0) 18:45:40 executing program 0: syz_emit_ethernet(0xcf, &(0x7f0000000000)={@multicast, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1c}, @void, {@x25={0x805, {0x2, 0x80, 0xff, "b74f37c4f4f43745b74c28435f5fd2fc82b7386a979b4f6dfa4da708fcc8f82ac890714b817d4f3c3d501bf7d1be6ab449c6a2d4b5939e8d5aed0e701feb338b1e9042ee442d364cdf7905c40ed67744d1095a3fdc2891730c3791a0bab182e3511447cd503e0372ce864ab0073095b5a660037bbfaa0e49d8b1ce6d1b07d7dae4b89b98e8483103afc427d72b470888341f95bbf5642d857c636659140aeada79937785d669d62406fce96db38db4c6ee030c89e81fda04cd42bf33d7e7"}}}}, &(0x7f0000000100)={0x0, 0x3, [0xd88, 0xb9c, 0x85e, 0x782]}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:45:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_CSUM]}, 0xfffffffffffffe61}}, 0x0) r1 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000007c0)={0x1c, 0x1407, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x1c}}, 0x0) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', 0x0, 0x18}, 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={r2, &(0x7f0000000280), &(0x7f00000002c0)=@udp6}, 0x20) sendmsg$RDMA_NLDEV_CMD_SET(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, 0x1402, 0x1, 0x70bd2a, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz0\x00'}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz0\x00'}]}, 0x38}}, 0x20000000) 18:45:40 executing program 5: r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan3\x00', 0x0}) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {}, [@IEEE802154_ATTR_LLSEC_SECLEVELS={0x5}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r2}, @IEEE802154_ATTR_LLSEC_CMD_FRAME_ID={0x5, 0x34, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x44004}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), r1) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f00000001c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_KEY(r3, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x134, r4, 0x0, 0x70bd27, 0x25dfdbfd, {}, [@NL802154_ATTR_SEC_KEY={0x7c, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x1f}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x87}, @NL802154_KEY_ATTR_USAGE_CMDS={0x24, 0x3, "5d974117705d6db643e719c14fa15e839f76807e2d30f74e455daf4ca5f14103"}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "6f5388d13f73d73e542492d9bfa2df10"}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "db2e8772239ac900c98faa0ffbbd7639"}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "45231f5cfc6168a2e32723b7f74d64f3"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x15}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r2}, @NL802154_ATTR_SEC_KEY={0x7c, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_CMDS={0x24, 0x3, "081d55243912e2709cf08330ac87b9340ed41c55ccded5cd0991e427ee40272d"}, @NL802154_KEY_ATTR_ID={0x40, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x1}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x34, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa0}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x3}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0xffff}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0102}}]}]}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "3a96a76b0c87c87b2e518a0ea02f402a"}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r5}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x134}, 0x1, 0x0, 0x0, 0x4040000}, 0x90) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan3\x00', 0x0}) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r6, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {}, [@IEEE802154_ATTR_LLSEC_SECLEVELS={0x5}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r7}, @IEEE802154_ATTR_LLSEC_CMD_FRAME_ID={0x5, 0x34, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x44004}, 0x0) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), r6) ioctl$sock_SIOCGIFINDEX_802154(r6, 0x8933, &(0x7f00000001c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_KEY(r8, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x118, r9, 0x0, 0x70bd27, 0x25dfdbfd, {}, [@NL802154_ATTR_SEC_KEY={0x60, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x1f}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x87}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0xff}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "6f5388d13f73d73e542492d9bfa2df10"}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "db2e8772239ac900c98faa0ffbbd7639"}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "45231f5cfc6168a2e32723b7f74d64f3"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x15}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r7}, @NL802154_ATTR_SEC_KEY={0x7c, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_CMDS={0x24, 0x3, "081d55243912e2709cf08330ac87b9340ed41c55ccded5cd0991e427ee40272d"}, @NL802154_KEY_ATTR_ID={0x40, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x1}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x34, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa0}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x3}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0xffff}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0102}}]}]}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "3a96a76b0c87c87b2e518a0ea02f402a"}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r10}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x118}, 0x1, 0x0, 0x0, 0x4040000}, 0x90) sendmsg$NL802154_CMD_GET_SEC_DEV(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x70, r4, 0x10, 0x70bd2d, 0x25dfdbff, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r10}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x70}, 0x1, 0x0, 0x0, 0x8000}, 0x4000014) sendmsg$IEEE802154_SET_MACPARAMS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x60, r0, 0x20, 0x70bd25, 0x25dfdbff, {}, [@IEEE802154_ATTR_CCA_MODE={0x5, 0x23, 0x80}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_FRAME_RETRIES={0x5, 0x28, 0xe6}, @IEEE802154_ATTR_FRAME_RETRIES={0x5, 0x28, 0x1}, @IEEE802154_ATTR_CCA_MODE={0x5, 0x23, 0x80}, @IEEE802154_ATTR_CCA_MODE={0x5, 0x23, 0x1}, @IEEE802154_ATTR_FRAME_RETRIES={0x5, 0x28, 0x40}, @IEEE802154_ATTR_FRAME_RETRIES={0x5, 0x28, 0x55}, @IEEE802154_ATTR_CSMA_RETRIES={0x5, 0x25, 0x3}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000880}, 0x24008011) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) 18:45:40 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet_udplite(0x2, 0x2, 0x88) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000000), 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:40 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x140a, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_RES_LQPN={0x8, 0x15, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x4}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x44085}, 0x0) 18:45:40 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, 0x0, 0x0) 18:45:40 executing program 4: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) getsockname$unix(r0, &(0x7f0000000100), &(0x7f0000000040)=0x6e) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockname$unix(0xffffffffffffffff, &(0x7f0000000300)=@abs, &(0x7f0000000380)=0x6e) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f00000000c0)={&(0x7f0000000000), 0xffffffa6, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1c0000001cb5d029c251305ce722d33905eccd23b8bfea55235ab4d43e1c92d7551e5c48a549d3b4b1f1577f2dbb699420ad86c0de81c845822386df6abd9f933cf22ff88f0d0cb9bbb7ce2c8a2fd61aa9ae9aaac3e971f681b8941caaac3104772056156df15e509b30099edffc2a7566ac932567dc71726ea0886a555880e9ea06814bfeef0074a609101f", @ANYRES16=0x0, @ANYBLOB="0000000000000000000007ffe10000000d0000000800", @ANYRES16=r0], 0xfffffffffffffe61}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$bt_hci(r2, 0x0, 0x1, &(0x7f0000000480)=""/182, &(0x7f0000000180)=0xb6) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCOUTQ(r3, 0x5411, &(0x7f0000000000)) getsockname$unix(r3, &(0x7f0000000240)=@abs, &(0x7f00000001c0)=0x6e) 18:45:40 executing program 0: bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000000)="c65e69e0e4a49a2f5389ef4f726dc403fe591d0b5dc3b60d7abf0f9bf5530dbd05bc500998f881f92030281b24f4ada43404133c10c753edd5e5aabd0483f480a7118e95ac7c6d4648dc8d71aefa2031b3f51e1cec379b693c3255b27e8faf92e1046c34dd2f7b9dcee3fee609b83c84d05bc07ecf649587b7f9d33d382bfb0ce9806d74fe390d7cb4c7aad8ce04d51d8737293475312412d36777d13a252361c2436b498ccce2b88d27d7dff0b10b28610000"}, 0xfffffe38) 18:45:40 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet_udplite(0x2, 0x2, 0x88) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:41 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x140a, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_RES_LQPN={0x8, 0x15, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x44085}, 0x0) 18:45:41 executing program 5: socketpair(0x27, 0x800, 0x90, &(0x7f00000005c0)={0xffffffffffffffff}) bind$alg(r0, &(0x7f0000000600)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-aes-neonbs\x00'}, 0x58) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) 18:45:41 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, 0x0, 0x0) 18:45:41 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LIST_PHY(r0, &(0x7f0000000c80)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000c40)={&(0x7f00000001c0)={0x14, 0x0, 0x0, 0xfffffffd}, 0x14}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), r1) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES64, @ANYRESOCT=r0, @ANYRESHEX], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000000c0), r0) sendmsg$IEEE802154_LLSEC_LIST_DEV(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r2, 0x20, 0x70bd27, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) 18:45:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_RESET_STATS(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0b000200", @ANYRES16=r1, @ANYBLOB="010000000000000000000a00000004000980180004801300010062726f6164636173742d6c696e6b0000"], 0x30}}, 0x0) sendmsg$TIPC_NL_BEARER_GET(r2, &(0x7f0000000780)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000740)={&(0x7f0000000240)={0x4f8, 0x0, 0x10, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0x18, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_BEARER={0x104, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xba8}, @TIPC_NLA_BEARER_PROP={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2cf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}]}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @private=0xa010100}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x7, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, 0x6}}}}, @TIPC_NLA_BEARER_NAME={0xf, 0x1, @l2={'ib', 0x3a, 'geneve0\x00'}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffff800}]}, @TIPC_NLA_BEARER_NAME={0x13, 0x1, @l2={'eth', 0x3a, 'ip6gretap0\x00'}}]}, @TIPC_NLA_NODE={0x2c8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0x85, 0x3, "f1ac586c88ce63f9fb03ad9a3aaef8a562d6cbe1d23cbe7a3fd8be2e1fd0e82da7e87a85a645acdd2ce611f2b4c78ce420df0d39ea9e835a0ca894e0778ef4f5bfc5c7e661965da13d8ebed7fa524565e5687bf8a92d1372be1b583d70b7590c73818f5785eb1ef56d123a2cca8bd038874d4d3d3639465b74cb1505b283344b96"}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ID={0xf4, 0x3, "7cdb19a0919769521dba811a1de2178d2c2a7954596ea505d958e52289a232c281a30e738ded000a24983bc8c173258c7a9d9c8168384970de1fd5d160bc948cb83ad9a063640d4c233fcb414e7a45c1b96faf07402a413086b24b4da8d934c1d3b933af27e04e794ba54969d53d43f2e2cd0b4d318a51e5dfd6b682dc5b37f45b394a4adf2a4adeaeafebef7d03fe61a904df8fb7cb0f5a4ff4d322a34d1ff810254abec2f8db36f757b0c8a2f911b3d2f99ea63263b0a6d3629ffe98f4a95a97b567e5e6a944767ea5821b4f06facdb45381a56976d0568b1797a3b7821fbcd2fdbc34963b914aeb4d214742dbb88b"}, @TIPC_NLA_NODE_KEY={0x47, 0x4, {'gcm(aes)\x00', 0x1f, "6bc736c59e3fae3cbcb05f9463b44fbed38b74ca4a6792f358449bd7711e5d"}}, @TIPC_NLA_NODE_KEY={0x42, 0x4, {'gcm(aes)\x00', 0x1a, "5b92af51c77424bbe4ca9a0dfaea5fb76a5ce51f612a426b02db"}}, @TIPC_NLA_NODE_ID={0xb8, 0x3, "7e7756e32e7e0caef29c8fa0de3f4466e866863a4a5ce884067484d3a0f9c116a7c11ba2d499c8dd7364a87f5d9624996bffc640d10a27034e843f4d1d4b136ae0a2c8c9a780dbd36ab08d5f8abf492b2ff0e97cdf714283eb7e8ed18d31f9c3d9fe6bbf4ba01c3216c60776a0d45eed3a300f6e2d09ed003ff4bfbeee2a84cfa1f2e22e73950a9b3dca4cac248b2a5bbfdb8861bf526e78a86f79a930b68ab4f37316294d873cb28fd1cbef55d2d65208ea79e6"}]}, @TIPC_NLA_BEARER={0x100, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x20}}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, 0x8}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0xfffffffd, @rand_addr=' \x01\x00', 0xffffffff}}, {0x14, 0x2, @in={0x2, 0x4e23, @remote}}}}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'ip_vti0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffff07}]}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}]}]}, 0x4f8}, 0x1, 0x0, 0x0, 0x8081}, 0x40081) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x800, 0x0, 0x0, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x6e31}]}, 0x1c}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, 0x0, 0x10, 0x70bd26, 0x25dfdbfd, {}, [@L2TP_ATTR_MRU={0x6, 0x1d, 0x1}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x9}]}, 0x24}, 0x1, 0x0, 0x0, 0x810}, 0x810) 18:45:41 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet_udplite(0x2, 0x2, 0x88) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:41 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x140a, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_RES_LQPN={0x8, 0x15, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}]}, 0x20}, 0x1, 0x0, 0x0, 0x44085}, 0x0) 18:45:41 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e) 18:45:41 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) r1 = socket(0x2c, 0x2, 0x9) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0xb4a3) 18:45:41 executing program 0: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan0\x00', 0x0}) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x5c, 0x0, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x1}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa2}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x1}, @IEEE802154_ATTR_PAN_ID={0x6}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0x282}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x2}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r0}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0x80000000}]}, 0x5c}, 0x1, 0x0, 0x0, 0x800}, 0x40800) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:45:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="ef23df4082cd50305ae67a9315188ff94dab9929a1859103caca486d212ca9340c8d275f5798ea3f067dbd74071e162d6de1f12301e420fd239951d944b668b73343012e6f64102a0d0cd62106667945f0173b616dc93e8ebce8412b659f05ad3d3c6ba414e6c8c886032cfeeacae21e1f7c98ec820cc95355b262476feb4313751f873534c9bd11a6eb8b325b73a8964e197a38a6b03bd150a108730b8fd1abf20fa0750544846d88ccb429e89a1ff78eeac9b69e46fe4bac5d0af944c2f2912dff", @ANYRES16=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\r\x00\x00\x00\x00\x00'], 0xfffffffffffffe61}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_RESET_STATS(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x30, r2, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_LINK={0x18, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x30}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f0000000a80)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000a40)={&(0x7f00000006c0)={0x374, r2, 0x20, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x5c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7cad}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}, @TIPC_NLA_NODE={0xe4, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x45, 0x4, {'gcm(aes)\x00', 0x1d, "26dd60a8a56b2ab056f2fb36cb70d4567a9abbbe99d5eb2951d1d39e02"}}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x55f72858}, @TIPC_NLA_NODE_KEY={0x4b, 0x4, {'gcm(aes)\x00', 0x23, "7c57b75221d485cdfe79beffe23cd4fbcd8465714a9e0dd55db820fa6a55d216bbad3c"}}, @TIPC_NLA_NODE_KEY={0x3e, 0x4, {'gcm(aes)\x00', 0x16, "6681a8f28f5d1f6d68590a0d3e43bbf86bd9e592a8f6"}}]}, @TIPC_NLA_BEARER={0x164, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x200, @private0}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x0, @loopback, 0xeae}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x4, @loopback, 0x4}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x645, @mcast2, 0x4}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @multicast2}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x7, @empty, 0x9}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x76820fb0, @private2, 0x7}}, {0x14, 0x2, @in={0x2, 0x4e21, @loopback}}}}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @loopback}}, {0x14, 0x2, @in={0x2, 0x4e21, @empty}}}}]}, @TIPC_NLA_BEARER={0xc, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xff}]}, @TIPC_NLA_SOCK={0x88, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7}]}, @TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x2}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x94}, @TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xffff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xe5}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x10001}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x400}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x4}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xffffff00}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xff}]}]}, @TIPC_NLA_BEARER={0x4}, @TIPC_NLA_SOCK={0x10, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000000}]}]}, 0x374}, 0x1, 0x0, 0x0, 0x4000090}, 0x20010001) 18:45:41 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e) 18:45:41 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x140a, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_RES_LQPN={0x8, 0x15, 0x2}]}, 0x18}, 0x1, 0x0, 0x0, 0x44085}, 0x0) 18:45:41 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet_udplite(0x2, 0x2, 0x88) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e) 18:45:41 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x140a, 0x1}, 0x10}, 0x1, 0x0, 0x0, 0x44085}, 0x0) 18:45:41 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e) 18:45:41 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet_udplite(0x2, 0x2, 0x88) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:42 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet_udplite(0x2, 0x2, 0x88) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:42 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x140a, 0x1}, 0x10}}, 0x0) 18:45:42 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = accept$phonet_pipe(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000040)=0x10) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r1 = socket$phonet_pipe(0x23, 0x5, 0x2) connect$phonet_pipe(r1, &(0x7f0000000400)={0x23, 0x80}, 0x10) ioctl$SIOCPNENABLEPIPE(r1, 0x89ed, 0x0) 18:45:42 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:42 executing program 3: r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan3\x00', 0x0}) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {}, [@IEEE802154_ATTR_LLSEC_SECLEVELS={0x5}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r2}, @IEEE802154_ATTR_LLSEC_CMD_FRAME_ID={0x5, 0x34, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x44004}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), r1) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f00000001c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_KEY(r3, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x134, r4, 0x0, 0x70bd27, 0x25dfdbfd, {}, [@NL802154_ATTR_SEC_KEY={0x7c, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x1f}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x87}, @NL802154_KEY_ATTR_USAGE_CMDS={0x24, 0x3, "5d974117705d6db643e719c14fa15e839f76807e2d30f74e455daf4ca5f14103"}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "6f5388d13f73d73e542492d9bfa2df10"}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "db2e8772239ac900c98faa0ffbbd7639"}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "45231f5cfc6168a2e32723b7f74d64f3"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x15}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r2}, @NL802154_ATTR_SEC_KEY={0x7c, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_CMDS={0x24, 0x3, "081d55243912e2709cf08330ac87b9340ed41c55ccded5cd0991e427ee40272d"}, @NL802154_KEY_ATTR_ID={0x40, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x1}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x34, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa0}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x3}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0xffff}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0102}}]}]}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "3a96a76b0c87c87b2e518a0ea02f402a"}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r5}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x134}, 0x1, 0x0, 0x0, 0x4040000}, 0x90) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan3\x00', 0x0}) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r6, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {}, [@IEEE802154_ATTR_LLSEC_SECLEVELS={0x5}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r7}, @IEEE802154_ATTR_LLSEC_CMD_FRAME_ID={0x5, 0x34, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x44004}, 0x0) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), r6) ioctl$sock_SIOCGIFINDEX_802154(r6, 0x8933, &(0x7f00000001c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_KEY(r8, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x118, r9, 0x0, 0x70bd27, 0x25dfdbfd, {}, [@NL802154_ATTR_SEC_KEY={0x60, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x1f}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x87}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0xff}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "6f5388d13f73d73e542492d9bfa2df10"}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "db2e8772239ac900c98faa0ffbbd7639"}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "45231f5cfc6168a2e32723b7f74d64f3"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x15}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r7}, @NL802154_ATTR_SEC_KEY={0x7c, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_CMDS={0x24, 0x3, "081d55243912e2709cf08330ac87b9340ed41c55ccded5cd0991e427ee40272d"}, @NL802154_KEY_ATTR_ID={0x40, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x1}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x34, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa0}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x3}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0xffff}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0102}}]}]}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "3a96a76b0c87c87b2e518a0ea02f402a"}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r10}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x118}, 0x1, 0x0, 0x0, 0x4040000}, 0x90) sendmsg$NL802154_CMD_GET_SEC_DEV(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x70, r4, 0x10, 0x70bd2d, 0x25dfdbff, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r10}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x70}, 0x1, 0x0, 0x0, 0x8000}, 0x4000014) sendmsg$IEEE802154_SET_MACPARAMS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x60, r0, 0x20, 0x70bd25, 0x25dfdbff, {}, [@IEEE802154_ATTR_CCA_MODE={0x5, 0x23, 0x80}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_FRAME_RETRIES={0x5, 0x28, 0xe6}, @IEEE802154_ATTR_FRAME_RETRIES={0x5, 0x28, 0x1}, @IEEE802154_ATTR_CCA_MODE={0x5, 0x23, 0x80}, @IEEE802154_ATTR_CCA_MODE={0x5, 0x23, 0x1}, @IEEE802154_ATTR_FRAME_RETRIES={0x5, 0x28, 0x40}, @IEEE802154_ATTR_FRAME_RETRIES={0x5, 0x28, 0x55}, @IEEE802154_ATTR_CSMA_RETRIES={0x5, 0x25, 0x3}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000880}, 0x24008011) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) 18:45:42 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet_udplite(0x2, 0x2, 0x88) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000000), 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:42 executing program 4: r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan3\x00', 0x0}) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {}, [@IEEE802154_ATTR_LLSEC_SECLEVELS={0x5}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r2}, @IEEE802154_ATTR_LLSEC_CMD_FRAME_ID={0x5, 0x34, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x44004}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), r1) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f00000001c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_KEY(r3, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x134, r4, 0x0, 0x70bd27, 0x25dfdbfd, {}, [@NL802154_ATTR_SEC_KEY={0x7c, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x1f}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x87}, @NL802154_KEY_ATTR_USAGE_CMDS={0x24, 0x3, "5d974117705d6db643e719c14fa15e839f76807e2d30f74e455daf4ca5f14103"}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "6f5388d13f73d73e542492d9bfa2df10"}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "db2e8772239ac900c98faa0ffbbd7639"}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "45231f5cfc6168a2e32723b7f74d64f3"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x15}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r2}, @NL802154_ATTR_SEC_KEY={0x7c, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_CMDS={0x24, 0x3, "081d55243912e2709cf08330ac87b9340ed41c55ccded5cd0991e427ee40272d"}, @NL802154_KEY_ATTR_ID={0x40, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x1}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x34, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa0}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x3}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0xffff}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0102}}]}]}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "3a96a76b0c87c87b2e518a0ea02f402a"}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r5}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x134}, 0x1, 0x0, 0x0, 0x4040000}, 0x90) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan3\x00', 0x0}) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r6, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {}, [@IEEE802154_ATTR_LLSEC_SECLEVELS={0x5}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r7}, @IEEE802154_ATTR_LLSEC_CMD_FRAME_ID={0x5, 0x34, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x44004}, 0x0) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), r6) ioctl$sock_SIOCGIFINDEX_802154(r6, 0x8933, &(0x7f00000001c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_KEY(r8, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x118, r9, 0x0, 0x70bd27, 0x25dfdbfd, {}, [@NL802154_ATTR_SEC_KEY={0x60, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x1f}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x87}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0xff}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "6f5388d13f73d73e542492d9bfa2df10"}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "db2e8772239ac900c98faa0ffbbd7639"}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "45231f5cfc6168a2e32723b7f74d64f3"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x15}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r7}, @NL802154_ATTR_SEC_KEY={0x7c, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_CMDS={0x24, 0x3, "081d55243912e2709cf08330ac87b9340ed41c55ccded5cd0991e427ee40272d"}, @NL802154_KEY_ATTR_ID={0x40, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x1}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x34, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa0}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x3}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0xffff}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0102}}]}]}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "3a96a76b0c87c87b2e518a0ea02f402a"}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r10}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x118}, 0x1, 0x0, 0x0, 0x4040000}, 0x90) sendmsg$NL802154_CMD_GET_SEC_DEV(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x70, r4, 0x10, 0x70bd2d, 0x25dfdbff, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r10}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x70}, 0x1, 0x0, 0x0, 0x8000}, 0x4000014) sendmsg$IEEE802154_SET_MACPARAMS(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x60, r0, 0x20, 0x70bd25, 0x25dfdbff, {}, [@IEEE802154_ATTR_CCA_MODE={0x5, 0x23, 0x80}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_FRAME_RETRIES={0x5, 0x28, 0xe6}, @IEEE802154_ATTR_FRAME_RETRIES={0x5, 0x28, 0x1}, @IEEE802154_ATTR_CCA_MODE={0x5, 0x23, 0x80}, @IEEE802154_ATTR_CCA_MODE={0x5, 0x23, 0x1}, @IEEE802154_ATTR_FRAME_RETRIES={0x5, 0x28, 0x40}, @IEEE802154_ATTR_FRAME_RETRIES={0x5, 0x28, 0x55}, @IEEE802154_ATTR_CSMA_RETRIES={0x5, 0x25, 0x3}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000880}, 0x24008011) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) 18:45:42 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9f09ed96c0"], &(0x7f00000001c0)=""/207, 0x1a, 0xcf, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x3, 0x6, 0x1, 0x7, 0x200, 0x1, 0xb083, '\x00', 0x0, r0, 0x4, 0x0, 0x2}, 0x40) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000400)={0xffffffffffffffff}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x8, 0x1, &(0x7f00000002c0)=@raw=[@call={0x85, 0x0, 0x0, 0x55}], &(0x7f0000000300)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x10, r0, 0x8, &(0x7f0000000340)={0x3, 0x1}, 0x8, 0x10, &(0x7f00000003c0)={0x0, 0xe, 0x1, 0x9}, 0x10, 0x0, r1}, 0x78) getsockopt$PNPIPE_HANDLE(0xffffffffffffffff, 0x113, 0x3, &(0x7f0000000000), &(0x7f0000000040)=0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000140)={0xffffffffffffffff, 0x10, &(0x7f0000000100)={&(0x7f0000000080)=""/125, 0x7d}}, 0x10) 18:45:42 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet_udplite(0x2, 0x2, 0x88) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000000), 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:42 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:43 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:43 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:43 executing program 5: sendmsg$RDMA_NLDEV_CMD_SYS_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x18, 0x1406, 0x100, 0x70bd29, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x18}, 0x1, 0x0, 0x0, 0x8001}, 0x1) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x200002, 0x0) 18:45:43 executing program 0: ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wg1\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB='ip_vti0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r0, @ANYBLOB="af000000000000df00000008410f004400680002442c000008ffffffff000000017f0000010000031be100000100000009000000002c5288cdf6b945c7b54e52af26f180bd17009217482582bc1859ae46e558fba7bd66ade5b6e29452defbf645114314fae20700"/115]}) 18:45:43 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:43 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet_udplite(0x2, 0x2, 0x88) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f0000000000), 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:43 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) r1 = socket(0x2c, 0x2, 0x9) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0xb4a3) 18:45:43 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) getpeername$unix(r0, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e) 18:45:43 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:43 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) sendto$unix(r0, &(0x7f0000000000)="43050d72a8ab4d2168210f99fa467342b212c89a0b3b09a25226910dd834dea9720f4d30e4f54649898f", 0x2a, 0x840, &(0x7f0000000040)=@abs={0x0, 0x0, 0x4e22}, 0x6e) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:45:43 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet_udplite(0x2, 0x2, 0x88) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:43 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:43 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'team0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x6, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x10001}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x4c}, @jmp={0x5, 0x1, 0x1, 0x3, 0x0, 0x0, 0x4}]}, &(0x7f0000000040)='syzkaller\x00', 0x3, 0x3d, &(0x7f0000000080)=""/61, 0x0, 0x1, '\x00', r1, 0x0, r0, 0x8, &(0x7f0000000100)={0x2, 0x5}, 0x8, 0x10, &(0x7f0000000140)={0x3, 0x8, 0x87, 0xfffffff7}, 0x10}, 0x78) 18:45:43 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:43 executing program 5: ioctl$SIOCGSTAMPNS(0xffffffffffffffff, 0x8907, &(0x7f0000000040)) sendmsg$RDMA_NLDEV_CMD_STAT_SET(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x20, 0x1410, 0x200, 0x70bd29, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x4}, @RDMA_NLDEV_ATTR_RES_LQPN={0x8}]}, 0x20}}, 0x84) setsockopt$PNPIPE_HANDLE(0xffffffffffffffff, 0x113, 0x3, &(0x7f0000000080)=0x27, 0x4) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2tp={0x2, 0x0, @initdev}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000180)=""/130, 0x82}, {&(0x7f0000000240)=""/150, 0x96}, {&(0x7f0000000300)=""/149, 0x95}], 0x4, &(0x7f0000000400)=""/103, 0x67}, 0x101) r0 = socket(0x21, 0x6, 0x3) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000600)={0x2, &(0x7f00000004c0)=[{@none}, {@fixed}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) socket(0x0, 0x5, 0x2) 18:45:43 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet_udplite(0x2, 0x2, 0x88) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:43 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:43 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:45 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz1\x00', 0x200002, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) r1 = socket(0x2c, 0x2, 0x9) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0xb4a3) 18:45:45 executing program 0: sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x21480014}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x18, 0x140a, 0x1, 0x70bd26, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}]}, 0x18}, 0x1, 0x0, 0x0, 0x4000010}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000002dc0)={0x0, 0x0, &(0x7f0000002c00)=[{&(0x7f00000007c0)=""/89, 0x59}, {&(0x7f0000000840)=""/192, 0xc0}, {&(0x7f0000000900)=""/20, 0x14}, {&(0x7f0000000940)=""/252, 0xfc}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000001a40)=""/109, 0x6d}, {&(0x7f0000001ac0)=""/4096, 0x1000}, {&(0x7f0000002ac0)=""/209, 0xd1}, {&(0x7f0000002bc0)=""/43, 0x2b}], 0x9, &(0x7f0000002cc0)=""/194, 0xc2}, 0x240) recvmsg(0xffffffffffffffff, &(0x7f0000003000)={0x0, 0x0, &(0x7f0000002f00)=[{&(0x7f0000002ec0)=""/46, 0x2e}], 0x1, &(0x7f0000002f40)=""/139, 0x8b}, 0x20012001) ioctl$SIOCGSTAMPNS(0xffffffffffffffff, 0x8907, &(0x7f0000000780)) r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000180)={'gre0\x00', &(0x7f0000000100)={'gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @local}}}}) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0187c0"], &(0x7f0000000480)=""/198, 0x1a, 0xc6, 0x1}, 0x20) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x1b, 0x3, 0x200, 0x41, 0x81, 0xffffffffffffffff, 0x3b, '\x00', r1, r2, 0x5, 0x0, 0x1}, 0x40) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000300)=0x0, &(0x7f0000000340)=0x4) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x0, 0x0}, 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000300)=@raw=[@alu], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r5}, 0x78) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x1e, 0x7, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000005000000000000000100000095000000000000004087ff03e200000018100000", @ANYRES32, @ANYBLOB="000000e00a6022c07c75daffffffffff"], &(0x7f0000000580)='syzkaller\x00', 0x18, 0x36, &(0x7f00000005c0)=""/54, 0x40f00, 0x1, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000600)={0x0, 0x1}, 0x8, 0x10, &(0x7f0000000640)={0x1, 0x1, 0x100, 0x6}, 0x10}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x6, &(0x7f00000001c0)=@raw=[@exit, @map={0x18, 0x4}, @map={0x18, 0x6, 0x1, 0x0, r3}, @alu={0x4, 0x0, 0x0, 0x9, 0x2, 0x80, 0x1}], &(0x7f0000000200)='GPL\x00', 0x3, 0x96, &(0x7f0000000240)=""/150, 0x41000, 0x11, '\x00', r4, 0x1, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x7, 0x3}, 0x8, 0x10, &(0x7f0000000400)={0x4, 0x9, 0x10000, 0x3ff}, 0x10, r5, r6}, 0x78) r7 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r7, &(0x7f0000000000)={0x1f, @fixed}, 0x8) getsockopt$bt_sco_SCO_CONNINFO(r7, 0x11, 0x2, &(0x7f0000002e00)=""/103, &(0x7f0000002e80)=0x67) 18:45:45 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1800}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, 0x0, 0x8, 0x70bd26, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_CMD_FRAME_ID={0x5, 0x34, 0x2}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x8040}, 0x4000) sendmsg$IEEE802154_LIST_PHY(r0, &(0x7f0000000c80)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000c00)={0x14}, 0x14}}, 0x0) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) sendmsg$IEEE802154_LLSEC_ADD_KEY(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r1, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@IEEE802154_ATTR_PAN_ID={0x6}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc, 0x2d, {0xaaaaaaaaaaaa0102}}]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x20000020) 18:45:45 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:45 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet_udplite(0x2, 0x2, 0x88) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:45 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:46 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:46 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet_udplite(0x2, 0x2, 0x88) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:46 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:46 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000040)=""/196, &(0x7f0000000140)=0xc4) 18:45:46 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:46 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:46 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:46 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:46 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:46 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) 18:45:46 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:46 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:46 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:46 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:46 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:46 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:46 executing program 5: recvmsg(0xffffffffffffffff, &(0x7f0000001240)={&(0x7f00000000c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)=""/26, 0x1a}, {&(0x7f0000000180)=""/126, 0x7e}], 0x2, &(0x7f0000000240)=""/4096, 0x1000}, 0x21) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_RESET_STATS(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x30, r1, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_LINK={0x18, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x30}}, 0x0) sendmsg$TIPC_NL_MON_SET(r0, &(0x7f00000013c0)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000001380)={&(0x7f00000012c0)={0xa8, r1, 0x200, 0x70bd29, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x4}, @TIPC_NLA_PUBL={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x4}]}, @TIPC_NLA_NET={0x28, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x81}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xffffffffffff0000}]}, @TIPC_NLA_NODE={0x5c, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x401}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x42, 0x4, {'gcm(aes)\x00', 0x1a, "3db5c7838f2aed6d2ef032ab602a178362aaa5a8e4aabaa4be94"}}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0xa8}, 0x1, 0x0, 0x0, 0x4004}, 0x8841) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup/syz1\x00', 0x200002, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r3, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) openat$cgroup_devices(r3, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 18:45:46 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:46 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:46 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:46 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:46 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) setsockopt$pppl2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x1, 0x4) syz_init_net_socket$bt_l2cap(0x1f, 0xcc278a6e390cef78, 0x0) openat$cgroup_devices(r0, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) 18:45:46 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:47 executing program 2: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:47 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:47 executing program 5: r0 = socket$l2tp(0x2, 0x2, 0x73) getsockopt$sock_timeval(r0, 0x1, 0x43, &(0x7f0000000100), &(0x7f0000000140)=0x10) sendmsg$L2TP_CMD_SESSION_GET(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000080), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, 0x0, 0x4, 0x70bd2a, 0x25dfdbfe, {}, [@L2TP_ATTR_FD={0x8, 0x17, @l2tp=r0}, @L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0xff}]}, 0x24}, 0x1, 0x0, 0x0, 0x400c804}, 0x48080) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = socket(0xa, 0x800, 0x10001) sendmsg$L2TP_CMD_TUNNEL_GET(r1, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, 0x0, 0x1, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0xf8}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x20040800) r2 = socket(0x15, 0x3, 0x3) setsockopt$inet6_dccp_int(r2, 0x21, 0x0, &(0x7f0000000040)=0x2, 0x4) 18:45:47 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:47 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:47 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:47 executing program 5: getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) 18:45:47 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:47 executing program 2: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:47 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:47 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:47 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:47 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) socketpair(0x21, 0x80000, 0xffff, &(0x7f0000000080)) openat$cgroup_devices(r0, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) r1 = socket$phonet_pipe(0x23, 0x5, 0x2) connect$phonet_pipe(r1, &(0x7f0000000400)={0x23, 0x80}, 0x10) accept4$phonet_pipe(r1, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x80800) socket$inet_icmp(0x2, 0x2, 0x1) 18:45:47 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:47 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:47 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:47 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:47 executing program 2: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:47 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:47 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:47 executing program 5: bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={0x1, &(0x7f0000000040)="5b0fa051b672fde9ac45eb4ad73e399c3d35f2cf3f1f6a764ba142cc99a18f13a78c29de3f0dbf31bb8b1f3d19d9b5451148544b09be63ffcc5b3a58cc1b61c169b563e26fcf5de809931fee5c0d244fefd90725d2d07f4f6e", &(0x7f00000000c0)=""/226}, 0x20) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) r1 = socket$unix(0x1, 0x2, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0xee00, 0xee01}, 0xc) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f0000000000)) getsockname$unix(r1, &(0x7f0000000240), &(0x7f00000002c0)=0x6e) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000200)=0x6, 0x4) 18:45:47 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:47 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:48 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:48 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:48 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x800, 0x70bd27, 0x25dfdbff, {}, [@IEEE802154_ATTR_PAGE={0x5, 0x1d, 0x1e}, @IEEE802154_ATTR_COORD_SHORT_ADDR={0x6}]}, 0x24}, 0x1, 0x0, 0x0, 0x2400c815}, 0x804) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000140)={'wpan1\x00'}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) 18:45:48 executing program 4: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:48 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:48 executing program 2: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:48 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:48 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) 18:45:48 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:48 executing program 2: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:48 executing program 4: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:48 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:48 executing program 3: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:48 executing program 0: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:48 executing program 2: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:48 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000080)='devices.allow\x00', 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r0 = socket$phonet_pipe(0x23, 0x5, 0x2) connect$phonet_pipe(r0, &(0x7f0000000400)={0x23, 0x80}, 0x10) ioctl$SIOCPNENABLEPIPE(r0, 0x89ed, 0x0) 18:45:48 executing program 1: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:48 executing program 4: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:48 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:45:48 executing program 3: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:48 executing program 1: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:48 executing program 0: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:48 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$IP_VS_SO_GET_VERSION(r1, 0x0, 0x480, &(0x7f0000000300), &(0x7f0000000340)=0x40) sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x30, r0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_LINK={0x18, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x30}}, 0x0) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000280)={&(0x7f00000000c0)={0x1b0, 0x0, 0x20, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0xa4, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x49f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5b83}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffff801}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}]}, @TIPC_NLA_BEARER={0xf8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @remote}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x0, @mcast2, 0x1}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0xfffffffb, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0xfff}}, {0x14, 0x2, @in={0x2, 0x4e23, @remote}}}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}]}]}]}, 0x1b0}, 0x1, 0x0, 0x0, 0x4000010}, 0x84) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) 18:45:48 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:45:49 executing program 4: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:49 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:45:49 executing program 3: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:49 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.net/syz0\x00', 0x200002, 0x0) getsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x4) socket$inet6_udplite(0xa, 0x2, 0x88) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x200002, 0x0) 18:45:49 executing program 1: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:49 executing program 0: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:49 executing program 4: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:49 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}], 0x80) 18:45:49 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x200002, 0x0) 18:45:49 executing program 4: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:49 executing program 1: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:49 executing program 3: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:49 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}], 0x64) 18:45:49 executing program 0: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:49 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:45:49 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = socket(0x10, 0x6, 0x7) sendto$l2tp(r0, &(0x7f0000000140)="19352af1ae3ee4c3e647cd388702681e1ec7a82bfa7b57adc74b9ffde314f0766fd2fa75368dad6b0f6a26c2d5804361c98d332a3c3c5aaa06fb0c485d3e835d58cd559ff949243404486757975eafb90f5ade988642210333e70f676316239a8586001c204ed88da37191c779cb3768be987625d9aee619c535c6a2ea9e089e45472396fc5d536ffd5803841eff47d06983b1ef7110899ca9cd8e0ed3e9afd1feec44ae45d5f09e2c97aa71e16567f24df58d092fb4b2f365cb30ca4b6dfce28166b2a3076b", 0xc6, 0x20000825, 0x0, 0x0) 18:45:49 executing program 1: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:49 executing program 3: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:49 executing program 0: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:49 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}], 0x48) 18:45:49 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:45:49 executing program 1: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:49 executing program 5: r0 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x44, r0, 0x8, 0x70bd28, 0x25dfdbfc, {}, [@WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0x4}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e21}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0x40}]}, 0x44}}, 0x4008000) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) 18:45:50 executing program 3: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:50 executing program 0: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:45:50 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}], 0x2c) 18:45:50 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:45:50 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:45:50 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000040)) r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000007c0)={0x1c, 0x1407, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x1c}}, 0x40c0) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="090000000714000128bd7000ffdbdf2508000100020000000900020073797a3200000000050054000100000005005400000080000500540000000000"], 0x3c}, 0x1, 0x0, 0x0, 0x4000}, 0x2001c800) 18:45:50 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:45:50 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:45:50 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}], 0x80) 18:45:50 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}], 0x10) 18:45:50 executing program 5: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000640)={0xffffffffffffffff, &(0x7f0000000040)="a534b4704199e8cc55d45c5ba47f61ead67e6104e07e9cf0e21ce536e6ed2f636d", &(0x7f0000000600)=@tcp}, 0x20) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) 18:45:50 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:45:50 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:45:50 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socketpair(0x2, 0x3, 0x1, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), r0) socket$l2tp6(0xa, 0x2, 0x73) 18:45:50 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:45:50 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:45:50 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}], 0x64) 18:45:50 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:45:50 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}], 0x80) 18:45:50 executing program 5: r0 = socket$can_j1939(0x1d, 0x2, 0x7) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x48002, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000040), &(0x7f00000000c0)=0xc) 18:45:50 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}], 0x80) 18:45:51 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280), 0x0) 18:45:51 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}], 0x48) 18:45:51 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:45:51 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}], 0x64) 18:45:51 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), r0) 18:45:51 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}], 0x64) 18:45:51 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}], 0x80) 18:45:51 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}], 0x48) 18:45:51 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}], 0x2c) 18:45:51 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}], 0x48) 18:45:51 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000080)='#\x00', 0x0}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r0}, 0x1) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 18:45:51 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280), 0x0) 18:45:51 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}], 0x64) 18:45:51 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}], 0x2c) 18:45:51 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}], 0x2c) 18:45:51 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280), 0x0) 18:45:51 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}], 0x10) 18:45:51 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}], 0x48) 18:45:51 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}], 0x48) 18:45:52 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}], 0x10) 18:45:52 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}], 0x10) 18:45:52 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:45:52 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}], 0x48) 18:45:52 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}], 0x2c) 18:45:52 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}], 0x48) 18:45:52 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}], 0x10) 18:45:52 executing program 5: setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}], 0x48) 18:45:52 executing program 5: setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}], 0x48) 18:45:52 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280), 0x0) 18:45:52 executing program 5: setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}], 0x48) 18:45:52 executing program 5: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}], 0x48) 18:45:53 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280), 0x0) 18:45:53 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280), 0x0) 18:45:53 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280), 0x0) 18:45:53 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in], 0x10) 18:45:53 executing program 5: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}], 0x48) 18:45:53 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280), 0x0) 18:45:53 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280), 0x0) 18:45:53 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280), 0x0) 18:45:53 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280), 0x0) 18:45:53 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in], 0x10) 18:45:53 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280), 0x0) 18:45:53 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280), 0x0) 18:45:53 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:45:53 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280), 0x0) 18:45:53 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in], 0x10) 18:45:53 executing program 5: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}], 0x48) 18:45:53 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280), 0x0) 18:45:53 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}], 0x10) 18:45:53 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:45:53 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:45:53 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:45:53 executing program 5: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}], 0x48) 18:45:54 executing program 5: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}], 0x48) 18:45:54 executing program 5: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}], 0x48) 18:45:54 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in], 0x10) 18:45:54 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:45:54 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:45:54 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in], 0x10) 18:45:54 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in], 0x10) 18:45:54 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}], 0x10) 18:45:54 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in], 0x10) 18:45:54 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:45:54 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in], 0x10) 18:45:54 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in], 0x10) 18:45:54 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in], 0x10) 18:45:54 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in], 0x10) 18:45:55 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}], 0x2c) 18:45:55 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in], 0x10) 18:45:55 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in], 0x10) 18:45:55 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:45:55 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}], 0x10) 18:45:55 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}], 0x10) 18:45:55 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in], 0x10) 18:45:55 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in], 0x10) 18:45:55 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}], 0x2c) 18:45:55 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:45:55 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:45:55 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}], 0x2c) 18:45:55 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}], 0x2c) 18:45:56 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:45:56 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280), 0x0) 18:45:56 executing program 1: setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}], 0x2c) 18:45:56 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280), 0x0) 18:45:56 executing program 2: setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}], 0x10) 18:45:56 executing program 1: setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}], 0x2c) 18:45:56 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280), 0x0) 18:45:56 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:45:56 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:45:56 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:45:56 executing program 1: setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}], 0x2c) 18:45:56 executing program 2: setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}], 0x10) 18:45:57 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:45:57 executing program 1: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}], 0x2c) 18:45:57 executing program 2: setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}], 0x10) 18:45:57 executing program 2: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}], 0x10) 18:45:57 executing program 1: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}], 0x2c) 18:45:57 executing program 2: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}], 0x10) 18:45:57 executing program 1: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}], 0x2c) 18:45:57 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in], 0x10) 18:45:57 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:45:57 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:45:57 executing program 2: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}], 0x10) 18:45:57 executing program 1: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}], 0x2c) 18:45:58 executing program 4: setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:45:58 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in], 0x10) 18:45:58 executing program 1: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}], 0x2c) 18:45:58 executing program 2: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}], 0x10) 18:45:58 executing program 2: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}], 0x10) 18:45:58 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in], 0x10) 18:45:58 executing program 1: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}], 0x2c) 18:45:58 executing program 4: setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:45:58 executing program 3: setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:45:58 executing program 0: setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:45:58 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:45:58 executing program 2: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}], 0x10) 18:45:58 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:45:58 executing program 4: setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:45:58 executing program 3: setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:45:58 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:45:58 executing program 4: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:45:58 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:45:59 executing program 0: setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:45:59 executing program 3: setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:45:59 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:45:59 executing program 4: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:45:59 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:45:59 executing program 0: setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:45:59 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:45:59 executing program 3: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:45:59 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}], 0x10) 18:45:59 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:45:59 executing program 4: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:45:59 executing program 0: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:45:59 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280), 0x0) 18:45:59 executing program 0: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:45:59 executing program 4: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:45:59 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280), 0x0) 18:45:59 executing program 3: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:46:00 executing program 4: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:46:00 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:46:00 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280), 0x0) 18:46:00 executing program 0: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:46:00 executing program 3: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:46:00 executing program 4: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:46:00 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}], 0x10) 18:46:00 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:46:00 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:46:00 executing program 0: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:46:00 executing program 3: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:46:01 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:46:01 executing program 0: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:46:01 executing program 5: setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:46:01 executing program 3: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:46:01 executing program 0: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:46:01 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:46:01 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}], 0x10) 18:46:01 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280), 0x0) 18:46:01 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in], 0x10) 18:46:01 executing program 3: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:46:01 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:46:01 executing program 5: setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:46:01 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280), 0x0) 18:46:02 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:46:02 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in], 0x10) 18:46:02 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:46:02 executing program 5: setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:46:02 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280), 0x0) 18:46:02 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in], 0x10) 18:46:02 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:46:02 executing program 5: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:46:02 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x0, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}], 0x2c) 18:46:02 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in], 0x10) 18:46:02 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:46:02 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in], 0x10) 18:46:02 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:46:02 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in], 0x10) 18:46:02 executing program 5: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:46:02 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280), 0x0) 18:46:02 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x0, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}], 0x2c) 18:46:02 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in], 0x10) 18:46:02 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280), 0x0) 18:46:03 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}], 0x10) 18:46:03 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280), 0x0) 18:46:03 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x0, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}], 0x2c) 18:46:03 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x0, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}], 0x2c) 18:46:03 executing program 5: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:46:03 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280), 0x0) 18:46:03 executing program 2: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}], 0x48) 18:46:03 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280), 0x0) 18:46:03 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:46:03 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}], 0x2c) 18:46:03 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in], 0x10) 18:46:03 executing program 5: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:46:03 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280), 0x0) 18:46:03 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x0, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}], 0x2c) 18:46:03 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}], 0x2c) 18:46:03 executing program 5: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:46:03 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in], 0x10) 18:46:03 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in], 0x10) 18:46:03 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}], 0x10) 18:46:03 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0x0, @private0, 0x20}], 0x2c) 18:46:04 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}], 0x2c) 18:46:04 executing program 5: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}], 0x10) 18:46:04 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in], 0x10) 18:46:04 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in], 0x10) 18:46:04 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0x0, @private0}], 0x2c) 18:46:04 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in], 0x10) 18:46:04 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}], 0x10) 18:46:04 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in6={0xa, 0x4e23, 0x0, @private0}], 0x1c) 18:46:04 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:46:04 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}], 0x2c) 18:46:04 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}], 0x2c) 18:46:04 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in6={0xa, 0x4e23, 0x0, @private0}], 0x1c) 18:46:04 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:46:04 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}], 0x2c) 18:46:04 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}], 0x2c) 18:46:04 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:46:04 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}], 0x64) 18:46:04 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}], 0x2c) 18:46:05 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}], 0x10) 18:46:05 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in6={0xa, 0x4e23, 0x0, @private0}], 0x1c) 18:46:05 executing program 4: setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}], 0x2c) 18:46:05 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280), 0x0) 18:46:05 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}], 0x48) 18:46:05 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}], 0x2c) 18:46:05 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280), 0x0) 18:46:05 executing program 3: r0 = socket$can_j1939(0x1d, 0x2, 0x7) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x48002, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000040), &(0x7f00000000c0)=0xc) 18:46:05 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}], 0x64) 18:46:05 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0x0, @private0}], 0x2c) 18:46:05 executing program 4: setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}], 0x2c) 18:46:05 executing program 4: setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}], 0x2c) 18:46:06 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0x0, @private0}], 0x2c) 18:46:06 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}], 0x64) 18:46:06 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in, @in6={0xa, 0x4e23, 0x0, @private0}], 0x2c) 18:46:06 executing program 3: r0 = socket$can_j1939(0x1d, 0x2, 0x7) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x48002, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000040), &(0x7f00000000c0)=0xc) 18:46:06 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280), 0x0) 18:46:06 executing program 4: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}], 0x2c) 18:46:06 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in], 0x10) 18:46:06 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in, @in6={0xa, 0x4e23, 0x0, @private0}], 0x2c) 18:46:06 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}], 0x80) 18:46:06 executing program 3: r0 = socket$can_j1939(0x1d, 0x2, 0x7) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x48002, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000040), &(0x7f00000000c0)=0xc) 18:46:06 executing program 4: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}], 0x2c) 18:46:06 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:46:06 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:46:06 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in, @in6={0xa, 0x4e23, 0x0, @private0}], 0x2c) 18:46:06 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in], 0x10) 18:46:06 executing program 3: r0 = socket$can_j1939(0x1d, 0x2, 0x7) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000040), &(0x7f00000000c0)=0xc) 18:46:06 executing program 4: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}], 0x2c) 18:46:07 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:46:07 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:46:07 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:46:07 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in], 0x10) 18:46:07 executing program 3: r0 = socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000040), &(0x7f00000000c0)=0xc) 18:46:07 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:46:07 executing program 4: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}], 0x2c) 18:46:07 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:46:07 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:46:07 executing program 3: getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f00000000c0)=0xc) 18:46:07 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:46:07 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:46:07 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:46:07 executing program 4: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}], 0x2c) 18:46:07 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:46:07 executing program 3: getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f00000000c0)=0xc) 18:46:07 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) socketpair(0x21, 0x80000, 0xffff, &(0x7f0000000080)) openat$cgroup_devices(r0, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) r1 = socket$phonet_pipe(0x23, 0x5, 0x2) connect$phonet_pipe(r1, &(0x7f0000000400)={0x23, 0x80}, 0x10) accept4$phonet_pipe(r1, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x80800) socket$inet_icmp(0x2, 0x2, 0x1) 18:46:07 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:46:07 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:46:07 executing program 4: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}], 0x2c) 18:46:07 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:46:07 executing program 3: getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f00000000c0)=0xc) 18:46:07 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:46:08 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:46:08 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:46:08 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:46:08 executing program 3: socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f00000000c0)=0xc) 18:46:08 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:46:08 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:46:08 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:46:08 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:46:08 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:46:08 executing program 3: socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f00000000c0)=0xc) 18:46:08 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:46:08 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:46:08 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:46:08 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x200002, 0x0) 18:46:08 executing program 3: socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000040), &(0x7f00000000c0)=0xc) 18:46:08 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:46:08 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:46:08 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1800}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, 0x0, 0x8, 0x70bd26, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_CMD_FRAME_ID={0x5, 0x34, 0x2}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x8040}, 0x4000) sendmsg$IEEE802154_LIST_PHY(r0, &(0x7f0000000c80)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000c00)={0x14}, 0x14}}, 0x0) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) sendmsg$IEEE802154_LLSEC_ADD_KEY(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r1, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@IEEE802154_ATTR_PAN_ID={0x6}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc, 0x2d, {0xaaaaaaaaaaaa0102}}]}, 0x28}, 0x1, 0x0, 0x0, 0x1}, 0x20000020) 18:46:08 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}], 0x10) 18:46:08 executing program 2: ioctl$SIOCGSTAMPNS(0xffffffffffffffff, 0x8907, &(0x7f0000000040)) sendmsg$RDMA_NLDEV_CMD_STAT_SET(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)={0x20, 0x1410, 0x200, 0x70bd29, 0x25dfdbff, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x4}, @RDMA_NLDEV_ATTR_RES_LQPN={0x8}]}, 0x20}}, 0x84) setsockopt$PNPIPE_HANDLE(0xffffffffffffffff, 0x113, 0x3, &(0x7f0000000080)=0x27, 0x4) recvmsg(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@l2tp={0x2, 0x0, @initdev}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000180)=""/130, 0x82}, {&(0x7f0000000240)=""/150, 0x96}, {&(0x7f0000000300)=""/149, 0x95}], 0x4, &(0x7f0000000400)=""/103, 0x67}, 0x101) r0 = socket(0x21, 0x6, 0x3) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000600)={0x2, &(0x7f00000004c0)=[{@none}, {@fixed}]}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) socket(0x0, 0x5, 0x2) 18:46:08 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:46:08 executing program 3: r0 = socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, &(0x7f00000000c0)) 18:46:08 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet_udplite(0x2, 0x2, 0x88) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) 18:46:08 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r0, 0x0, &(0x7f0000000200)) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet_udplite(0x2, 0x2, 0x88) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f0000000000), 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r3, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0xfffffe01, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}, @in6={0xa, 0x4e22, 0x800, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0x9, @loopback, 0x8}, @in6={0xa, 0x4e24, 0xfffffff7, @mcast2, 0x1}, @in6={0xa, 0x4e23, 0xfc, @private2={0xfc, 0x2, '\x00', 0x1}, 0x7fff}], 0x9c) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000340)={0x0, 0xee00, 0xee01}, 0xc) 18:46:09 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) connect$unix(0xffffffffffffffff, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) 18:46:09 executing program 3: r0 = socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, 0x0) 18:46:09 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LIST_PHY(r0, &(0x7f0000000c80)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000c00)={0x14}, 0x14}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan3\x00', 0x0}) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {}, [@IEEE802154_ATTR_LLSEC_SECLEVELS={0x5}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r2}, @IEEE802154_ATTR_LLSEC_CMD_FRAME_ID={0x5, 0x34, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x44004}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), r1) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f00000001c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_KEY(r3, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000340)={&(0x7f00000008c0)=ANY=[@ANYBLOB="540100006cd154b40f87e5c04df293bc1d0b0e21178245c34f719b4d6f7f3ed05a9f36143f0806b61483131ce799175a9d75b8660640dfd8ae0c4d42db4a7edf1dacbb2f6d167a5312d6f9b2e6c2c48939d245b73604c35a9386aaf55b7157bb50e9476b", @ANYRES16=r4, @ANYBLOB="000027bd7000fddbdf251800000098002580050002001f0000000500020087000000240003005d974117705d6db643e719c14fa15e839f76807e2d30f74e455daf4ca5f14103140004006f5388d13f73d73e542492d9bfa2df1014000400db2e8772239ac900c98faa0ffbbd76391400040045231f5cfc6168a2e32723b7f74d64f3240003003997ffc575d93fe06ba98646a91004dd09c63bdb1ddb62c197ba3a820f5da9f008000300", @ANYRES32=r2, @ANYBLOB="8000258024000300081d55243912e2709cf08330ac87b9340ed41c55ccded5cd0991e427ee40272d4400018008000400010000003800038006000300a0aa000008000200030000000c00040000000000000000000c0004000203aaaaaaaaaaaa0c0004000201aaaaaaaaaaaa140004003a96a76b0c87c87b2e518a0ea02f402a07000300", @ANYRES32=r5, @ANYBLOB="0c00060002000000020000000c0006000300000000000000"], 0x154}, 0x1, 0x0, 0x0, 0x4040000}, 0x20008090) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan3\x00', 0x0}) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r6, &(0x7f0000000100)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000400)={0x38, 0x0, 0x20, 0x70bd26, 0x25dfdbfb, {}, [@IEEE802154_ATTR_LLSEC_SECLEVELS={0x5}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r7}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x38}, 0x1, 0x0, 0x0, 0x44004}, 0x0) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), r6) ioctl$sock_SIOCGIFINDEX_802154(r6, 0x8933, &(0x7f00000001c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_KEY(r8, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000780)={0x120, 0x0, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@NL802154_ATTR_SEC_KEY={0x64, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x1f}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x87}, @NL802154_KEY_ATTR_ID={0xc, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x80000001}]}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "6f5388d13f73d73e542492d9bfa2df10"}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "db2e8772239ac900c98faa0ffbbd7639"}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "45231f5cfc6168a2e32723b7f74d64f3"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x15}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r7}, @NL802154_ATTR_SEC_KEY={0x80, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_CMDS={0x24, 0x3, "081d55243912e2709cf08330ac87b9340ed41c55ccded5cd0991e427ee40272d"}, @NL802154_KEY_ATTR_ID={0x44, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_INDEX={0x5, 0x2, 0x3}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x38, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0102}}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x3}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0xffff}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0102}}]}]}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "3a96a76b0c87c87b2e518a0ea02f402a"}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r9}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x120}, 0x1, 0x0, 0x0, 0x4040000}, 0x90) sendmsg$NL802154_CMD_GET_INTERFACE(r0, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r4, 0x8, 0x70bd25, 0x25dfdbff, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r9}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8010}, 0x4040) r10 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) sendmsg$IEEE802154_LLSEC_DEL_KEY(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x28, 0x0, 0x2, 0x70bd28, 0x25dfdbfd, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x3}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc, 0x2d, {0xaaaaaaaaaaaa0102}}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x40) openat$cgroup_devices(r10, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) 18:46:09 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r0, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) 18:46:09 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000180), &(0x7f00000001c0)=0x40) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x3, 0x0, {}, [@L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x2}]}, 0x1c}}, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) r1 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x24, 0x0, 0x2, 0x70bd2b, 0x25dfdbfb, {}, [@L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x81}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}]}, 0x24}}, 0x4040) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340)={0x0, 0xee00, 0xee01}, 0xc) getsockopt$bt_hci(r1, 0x0, 0x3, &(0x7f0000000100)=""/4, &(0x7f0000000140)=0x4) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000200)) 18:46:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_CSUM]}, 0xfffffffffffffe61}}, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_RESET_STATS(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)={0x2c0, r1, 0x1, 0xffffffff, 0x0, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_LINK={0x18, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x200020}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80000001}]}, @TIPC_NLA_NODE={0x50, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x44, 0x4, {'gcm(aes)\x00', 0x1c, "3b5d2ecefe6d05d067d46f5dc8ee3dc7fc7478414052cddd23ba1165"}}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xf0000000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x0, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}]}, @TIPC_NLA_BEARER={0x70, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @broadcast}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x80000000, @mcast2, 0x9}}}}, @TIPC_NLA_BEARER_PROP={0x4}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'ipvlan0\x00'}}]}, @TIPC_NLA_NODE={0x160, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0xc2, 0x3, "3824565c046a2538628e6a333b52fcaa94b6a4bfbbd5302bb307121e0524cc1df4bdc1744343fe2b8e1f024437d2fabe61679fe3801c6addde2ec6a28680d5c2685e0ac496636c6793e4ef23ec66312ca563e7270c8711a8ae43df57c79f262baa75851f9c7c336ba69095baaa9bc200b3beaf52af5599ded345d7b0e325698406221cb37a88de8c0b968736fc8a73ea2d47704f5b39d87490b813c6cb330e7aa31d2c0e12546759832b2663130094d76dec27682c1598f41252bc86d0f0"}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_KEY={0xffffffffffffff80, 0x4, {'gcm(aes)\x00', 0x19, "92d4346533ebe02af089999fd683413cb1e6670dff64df0ba2"}}, @TIPC_NLA_NODE_KEY={0x41, 0x4, {'gcm(aes)\x00', 0x19, "69e993b97d9f2e88b403fe08254fc8639fdc2aa62a3bf4c768"}}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}]}, @TIPC_NLA_NODE={0x30, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0x2c, 0x3, "ae54523fa4e1fde8efd19a4abd7df279fbb68166fa2062dc69fa0c8c813c0b77f4df359481b3e4ec"}]}]}, 0x2c0}}, 0x20000014) socketpair(0x1e, 0x1, 0x3, &(0x7f0000000580)={0xffffffffffffffff}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x28, r5, 0x1, 0x0, 0x0, {}, [@L2TP_ATTR_IP6_DADDR={0x14, 0x20, @empty}]}, 0x28}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r3, &(0x7f0000000980)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000940)={&(0x7f00000008c0)={0x60, r5, 0x200, 0x70bd2d, 0x25dfdbfb, {}, [@L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x2705}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_UDP_DPORT={0x6, 0x1b, 0x4e24}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @empty}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_MTU={0x6, 0x1c, 0x923}]}, 0x60}, 0x1, 0x0, 0x0, 0x84}, 0x10) sendmsg$TIPC_NL_KEY_FLUSH(r0, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000340)={&(0x7f0000000140)={0x1dc, r1, 0x100, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x28, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x20}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1ff}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_BEARER={0x104, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffff9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x59}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x91}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x80, @rand_addr=' \x01\x00', 0xbe610a6f}}, {0x14, 0x2, @in={0x2, 0x4e21, @local}}}}, @TIPC_NLA_BEARER_NAME={0xe, 0x1, @l2={'ib', 0x3a, 'vxcan1\x00'}}, @TIPC_NLA_BEARER_NAME={0xf, 0x1, @l2={'ib', 0x3a, 'macsec0\x00'}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xa39}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2e0f}]}, @TIPC_NLA_NET={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x80000000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8e}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffffffd}]}, @TIPC_NLA_BEARER={0x5c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @loopback}}, {0x14, 0x2, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb543}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_NODE={0x14, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x1dc}, 0x1, 0x0, 0x0, 0x4004800}, 0x40004000) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f0000000500)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0xbc, r1, 0x2, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x38, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xffffffff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7ff}]}, @TIPC_NLA_PUBL={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xfffffff8}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x9}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xdc9}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x800}, @TIPC_NLA_PUBL_UPPER={0x8}]}, @TIPC_NLA_BEARER={0x44, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xe, 0x1, @l2={'eth', 0x3a, 'veth0\x00'}}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}]}]}, 0xbc}, 0x1, 0x0, 0x0, 0x4040051}, 0x10) 18:46:09 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) socket$inet_sctp(0x2, 0x5, 0x84) 18:46:09 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}], 0x10) 18:46:09 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xb0, 0x1}, 0x20) socket$inet6_mptcp(0xa, 0x1, 0x106) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000d80)={0xffffffffffffffff}) sendto(r1, &(0x7f0000000dc0)="8297ccfd293af01bad9395f26acecff15384bea28799ad587a373f3f262df388d3eca829d9b65e424a6bb3d442a7d8148f4d78e1222ee16d3a502e3a54b7a23ff63b316ff279901cdfd22002007671cb1663f8c4d3d3ac44c6bccbb6acae9367147b7ca09c1fcee9c0cf3838bc3eb125446aff656a8fdab65ad2866dff1cbb5f3772dcf875c45f4a1f481eebc5bbf7df46b30b3d393c8eef4255307245350e58b905a6f3fd32c61aa869ca66a9dbeebbdc61da544e69e7c3ee7c466badf3e89c091492", 0xc3, 0x24004010, &(0x7f0000000ec0)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x80) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[@ANYBLOB="9feb010018000000000000007900000079000000020000000000d4ccb2be337a9d1980b9a6f21e00000000000300000000010000000500000088000000090000000600000f010000000500000007000000090000000200000003000000030000000400000002000000090000000400000001010000020000000100000004000000070000000100000000000000010000006d0e000000"], &(0x7f0000000080)=""/122, 0x96, 0x7a, 0x1}, 0x20) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000007c0)={&(0x7f0000000780)='./file0\x00', 0x0, 0x18}, 0x10) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000a80)={&(0x7f00000008c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@const={0xa, 0x0, 0x0, 0xa, 0x2}, @ptr={0x5, 0x0, 0x0, 0x2, 0x1}, @func={0x10, 0x0, 0x0, 0xc, 0x5}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x42, 0x0, 0x2f, 0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x1}}, @int={0x2, 0x0, 0x0, 0x1, 0x0, 0xc, 0x0, 0x4, 0x4}, @int={0x6, 0x0, 0x0, 0x1, 0x0, 0x1f, 0x0, 0x66}, @volatile={0xb}]}, {0x0, [0x2e, 0x61, 0x0, 0x2e]}}, &(0x7f0000000980)=""/210, 0x96, 0xd2}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x18, 0x7, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4}, [@call={0x85, 0x0, 0x0, 0xa3}, @map={0x18, 0x8, 0x1, 0x0, r3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}]}, &(0x7f0000000840)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000880)=""/63, 0x41100, 0x10, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000c80)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000cc0)={0x4, 0x8, 0x7, 0x8}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000740)={r2, 0x10, &(0x7f0000000440)={&(0x7f0000000680)=""/154, 0x9a}}, 0x10) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x1c}, 0x10) r6 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000340)={0x0, 0xee00, 0xee01}, 0xc) ioctl$sock_SIOCOUTQ(r6, 0x5411, &(0x7f00000001c0)) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="00032dbd7000ffdbdf25040000000500120069000000060001000000000005002200000000000c000f0009000000000000000c0016000200000000000000050022000000000006000e0000080000140008006970766c616e31000000000000000000050012000300000005000d0000000000"], 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x4000101) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000ac0)=0x0, &(0x7f0000000b00)=0x4) r9 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000bc0), 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c00)=@bpf_tracing={0x1a, 0x9, &(0x7f00000003c0)=@raw=[@map={0x18, 0xd, 0x1, 0x0, r5}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0x5}, @map_val={0x18, 0x3, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, @exit], &(0x7f0000000100)='GPL\x00', 0xfffffffb, 0x57, &(0x7f0000000140)=""/87, 0x41000, 0x5, '\x00', r8, 0x1a, r0, 0x8, &(0x7f0000000b40)={0x8, 0x104}, 0x8, 0x10, &(0x7f0000000b80)={0x4, 0x9, 0x3, 0x4}, 0x10, 0x2217b, r9}, 0x78) 18:46:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) socket$inet_sctp(0x2, 0x5, 0x84) 18:46:09 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffffffffffff, 0x5, 0x38}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, &(0x7f0000000080), &(0x7f00000000c0)='syzkaller\x00', 0x5, 0x69, &(0x7f0000000100)=""/105, 0x41000, 0x3, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000180)={0x2, 0x4}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0x6, 0x400, 0xc11c}, 0x10}, 0x78) getpid() r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40, 0x7ff, 0x5ec1, 0x800, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4}, 0x40) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r1, &(0x7f0000000080)="2a8cd5a3981aede0506393841d34"}, 0x20) 18:46:09 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000100)=[@in6={0xa, 0x4e21, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}, 0x8}], 0x1c) 18:46:09 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xb0, 0x1}, 0x20) socket$inet6_mptcp(0xa, 0x1, 0x106) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000d80)={0xffffffffffffffff}) sendto(r1, &(0x7f0000000dc0)="8297ccfd293af01bad9395f26acecff15384bea28799ad587a373f3f262df388d3eca829d9b65e424a6bb3d442a7d8148f4d78e1222ee16d3a502e3a54b7a23ff63b316ff279901cdfd22002007671cb1663f8c4d3d3ac44c6bccbb6acae9367147b7ca09c1fcee9c0cf3838bc3eb125446aff656a8fdab65ad2866dff1cbb5f3772dcf875c45f4a1f481eebc5bbf7df46b30b3d393c8eef4255307245350e58b905a6f3fd32c61aa869ca66a9dbeebbdc61da544e69e7c3ee7c466badf3e89c091492", 0xc3, 0x24004010, &(0x7f0000000ec0)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x80) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[@ANYBLOB="9feb010018000000000000007900000079000000020000000000d4ccb2be337a9d1980b9a6f21e00000000000300000000010000000500000088000000090000000600000f010000000500000007000000090000000200000003000000030000000400000002000000090000000400000001010000020000000100000004000000070000000100000000000000010000006d0e000000"], &(0x7f0000000080)=""/122, 0x96, 0x7a, 0x1}, 0x20) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000007c0)={&(0x7f0000000780)='./file0\x00', 0x0, 0x18}, 0x10) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000a80)={&(0x7f00000008c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@const={0xa, 0x0, 0x0, 0xa, 0x2}, @ptr={0x5, 0x0, 0x0, 0x2, 0x1}, @func={0x10, 0x0, 0x0, 0xc, 0x5}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x42, 0x0, 0x2f, 0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x1}}, @int={0x2, 0x0, 0x0, 0x1, 0x0, 0xc, 0x0, 0x4, 0x4}, @int={0x6, 0x0, 0x0, 0x1, 0x0, 0x1f, 0x0, 0x66}, @volatile={0xb}]}, {0x0, [0x2e, 0x61, 0x0, 0x2e]}}, &(0x7f0000000980)=""/210, 0x96, 0xd2}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x18, 0x7, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4}, [@call={0x85, 0x0, 0x0, 0xa3}, @map={0x18, 0x8, 0x1, 0x0, r3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}]}, &(0x7f0000000840)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000880)=""/63, 0x41100, 0x10, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000c80)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000cc0)={0x4, 0x8, 0x7, 0x8}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000740)={r2, 0x10, &(0x7f0000000440)={&(0x7f0000000680)=""/154, 0x9a}}, 0x10) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x1c}, 0x10) r6 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000340)={0x0, 0xee00, 0xee01}, 0xc) ioctl$sock_SIOCOUTQ(r6, 0x5411, &(0x7f00000001c0)) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="00032dbd7000ffdbdf25040000000500120069000000060001000000000005002200000000000c000f0009000000000000000c0016000200000000000000050022000000000006000e0000080000140008006970766c616e31000000000000000000050012000300000005000d0000000000"], 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x4000101) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000ac0)=0x0, &(0x7f0000000b00)=0x4) r9 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000bc0), 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c00)=@bpf_tracing={0x1a, 0x9, &(0x7f00000003c0)=@raw=[@map={0x18, 0xd, 0x1, 0x0, r5}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0x5}, @map_val={0x18, 0x3, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, @exit], &(0x7f0000000100)='GPL\x00', 0xfffffffb, 0x57, &(0x7f0000000140)=""/87, 0x41000, 0x5, '\x00', r8, 0x1a, r0, 0x8, &(0x7f0000000b40)={0x8, 0x104}, 0x8, 0x10, &(0x7f0000000b80)={0x4, 0x9, 0x3, 0x4}, 0x10, 0x2217b, r9}, 0x78) 18:46:09 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x3}, 0x20) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LIST_PHY(r0, &(0x7f0000000c80)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000c00)={0x14}, 0x14}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan3\x00', 0x0}) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {}, [@IEEE802154_ATTR_LLSEC_SECLEVELS={0x5}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r2}, @IEEE802154_ATTR_LLSEC_CMD_FRAME_ID={0x5, 0x34, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x44004}, 0x0) sendmsg$IEEE802154_LLSEC_DEL_KEY(r0, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x30, 0x0, 0x8, 0x70bd28, 0x25dfdbfe, {}, [@IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x3}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0x7}, @IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0102}}]}, 0x30}, 0x1, 0x0, 0x0, 0x4040080}, 0x40) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), r1) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f00000001c0)={'wpan0\x00'}) sendmsg$NL802154_CMD_DEL_SEC_KEY(r3, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000340)={&(0x7f00000005c0)={0x164, r4, 0x4, 0x70bd2b, 0x25dfdbfd}, 0x164}, 0x1, 0x0, 0x0, 0x4040000}, 0x90) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x38, 0x0, 0x800, 0x70bd25, 0x25dfdbfe, {}, [@NL802154_ATTR_PAGE={0x5, 0x7, 0x18}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r2}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x3}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}]}, 0x38}, 0x1, 0x0, 0x0, 0x14}, 0x20000800) 18:46:09 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffffffffffff, 0x5, 0x38}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, &(0x7f0000000080), &(0x7f00000000c0)='syzkaller\x00', 0x5, 0x69, &(0x7f0000000100)=""/105, 0x41000, 0x3, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000180)={0x2, 0x4}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0x6, 0x400, 0xc11c}, 0x10}, 0x78) getpid() r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40, 0x7ff, 0x5ec1, 0x800, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4}, 0x40) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r1, &(0x7f0000000080)="2a8cd5a3981aede0506393841d34"}, 0x20) 18:46:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) socket$inet_sctp(0x2, 0x5, 0x84) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 18:46:09 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000100)=[@in6={0xa, 0x4e21, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}, 0x8}], 0x1c) 18:46:10 executing program 3: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xb0, 0x1}, 0x20) socket$inet6_mptcp(0xa, 0x1, 0x106) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000d80)={0xffffffffffffffff}) sendto(r1, &(0x7f0000000dc0)="8297ccfd293af01bad9395f26acecff15384bea28799ad587a373f3f262df388d3eca829d9b65e424a6bb3d442a7d8148f4d78e1222ee16d3a502e3a54b7a23ff63b316ff279901cdfd22002007671cb1663f8c4d3d3ac44c6bccbb6acae9367147b7ca09c1fcee9c0cf3838bc3eb125446aff656a8fdab65ad2866dff1cbb5f3772dcf875c45f4a1f481eebc5bbf7df46b30b3d393c8eef4255307245350e58b905a6f3fd32c61aa869ca66a9dbeebbdc61da544e69e7c3ee7c466badf3e89c091492", 0xc3, 0x24004010, &(0x7f0000000ec0)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x80) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[@ANYBLOB="9feb010018000000000000007900000079000000020000000000d4ccb2be337a9d1980b9a6f21e00000000000300000000010000000500000088000000090000000600000f010000000500000007000000090000000200000003000000030000000400000002000000090000000400000001010000020000000100000004000000070000000100000000000000010000006d0e000000"], &(0x7f0000000080)=""/122, 0x96, 0x7a, 0x1}, 0x20) r3 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000007c0)={&(0x7f0000000780)='./file0\x00', 0x0, 0x18}, 0x10) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000a80)={&(0x7f00000008c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@const={0xa, 0x0, 0x0, 0xa, 0x2}, @ptr={0x5, 0x0, 0x0, 0x2, 0x1}, @func={0x10, 0x0, 0x0, 0xc, 0x5}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x42, 0x0, 0x2f, 0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x1}}, @int={0x2, 0x0, 0x0, 0x1, 0x0, 0xc, 0x0, 0x4, 0x4}, @int={0x6, 0x0, 0x0, 0x1, 0x0, 0x1f, 0x0, 0x66}, @volatile={0xb}]}, {0x0, [0x2e, 0x61, 0x0, 0x2e]}}, &(0x7f0000000980)=""/210, 0x96, 0xd2}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x18, 0x7, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4}, [@call={0x85, 0x0, 0x0, 0xa3}, @map={0x18, 0x8, 0x1, 0x0, r3}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}]}, &(0x7f0000000840)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000880)=""/63, 0x41100, 0x10, '\x00', 0x0, 0x0, r4, 0x8, &(0x7f0000000c80)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000cc0)={0x4, 0x8, 0x7, 0x8}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000740)={r2, 0x10, &(0x7f0000000440)={&(0x7f0000000680)=""/154, 0x9a}}, 0x10) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x1c}, 0x10) r6 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000000340)={0x0, 0xee00, 0xee01}, 0xc) ioctl$sock_SIOCOUTQ(r6, 0x5411, &(0x7f00000001c0)) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r7, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="00032dbd7000ffdbdf25040000000500120069000000060001000000000005002200000000000c000f0009000000000000000c0016000200000000000000050022000000000006000e0000080000140008006970766c616e31000000000000000000050012000300000005000d0000000000"], 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x4000101) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000ac0)=0x0, &(0x7f0000000b00)=0x4) r9 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000bc0), 0x4) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c00)=@bpf_tracing={0x1a, 0x9, &(0x7f00000003c0)=@raw=[@map={0x18, 0xd, 0x1, 0x0, r5}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x4}, @exit, @call={0x85, 0x0, 0x0, 0x5}, @map_val={0x18, 0x3, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, @exit], &(0x7f0000000100)='GPL\x00', 0xfffffffb, 0x57, &(0x7f0000000140)=""/87, 0x41000, 0x5, '\x00', r8, 0x1a, r0, 0x8, &(0x7f0000000b40)={0x8, 0x104}, 0x8, 0x10, &(0x7f0000000b80)={0x4, 0x9, 0x3, 0x4}, 0x10, 0x2217b, r9}, 0x78) 18:46:10 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffffffffffff, 0x5, 0x38}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, &(0x7f0000000080), &(0x7f00000000c0)='syzkaller\x00', 0x5, 0x69, &(0x7f0000000100)=""/105, 0x41000, 0x3, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000180)={0x2, 0x4}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0x6, 0x400, 0xc11c}, 0x10}, 0x78) getpid() r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40, 0x7ff, 0x5ec1, 0x800, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4}, 0x40) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r1, &(0x7f0000000080)="2a8cd5a3981aede0506393841d34"}, 0x20) 18:46:10 executing program 0: r0 = socket$unix(0x1, 0x3, 0x0) connect$unix(r0, &(0x7f0000000040)=@abs={0x0, 0x0, 0x4e20}, 0x6e) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) 18:46:10 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}], 0x10) 18:46:10 executing program 1: r0 = socket$unix(0x1, 0x3, 0x0) connect$unix(r0, &(0x7f0000000040)=@abs={0x0, 0x0, 0x4e20}, 0x6e) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) 18:46:10 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000100)=[@in6={0xa, 0x4e21, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}, 0x8}], 0x1c) 18:46:10 executing program 0: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x30, r0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_LINK={0x18, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x30}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000240)={&(0x7f0000000080)={0x1b4, 0x0, 0x20, 0x70bd2a, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0xfc, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xce}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfdd5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x400}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff800}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}]}, @TIPC_NLA_NET={0x18, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x31}]}, @TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7fff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}]}, @TIPC_NLA_NET={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xf5}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xe07}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}]}, @TIPC_NLA_MEDIA={0x2c, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x1b4}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LIST_PHY(r2, &(0x7f0000000c80)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000c00)={0xf, 0x0, 0x0, 0x0, 0x200}, 0x14}}, 0x20000800) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LIST_PHY(r3, &(0x7f0000000c80)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000c00)={0x14}, 0x14}}, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRESHEX=r3], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:46:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xb0, 0x1}, 0x20) socket$inet6_mptcp(0xa, 0x1, 0x106) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000d80)={0xffffffffffffffff}) sendto(r0, &(0x7f0000000dc0)="8297ccfd293af01bad9395f26acecff15384bea28799ad587a373f3f262df388d3eca829d9b65e424a6bb3d442a7d8148f4d78e1222ee16d3a502e3a54b7a23ff63b316ff279901cdfd22002007671cb1663f8c4d3d3ac44c6bccbb6acae9367147b7ca09c1fcee9c0cf3838bc3eb125446aff656a8fdab65ad2866dff1cbb5f3772dcf875c45f4a1f481eebc5bbf7df46b30b3d393c8eef4255307245350e58b905a6f3fd32c61aa869ca66a9dbeebbdc61da544e69e7c3ee7c466badf3e89c091492", 0xc3, 0x24004010, &(0x7f0000000ec0)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x80) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[@ANYBLOB="9feb010018000000000000007900000079000000020000000000d4ccb2be337a9d1980b9a6f21e00000000000300000000010000000500000088000000090000000600000f010000000500000007000000090000000200000003000000030000000400000002000000090000000400000001010000020000000100000004000000070000000100000000000000010000006d0e000000"], &(0x7f0000000080)=""/122, 0x96, 0x7a, 0x1}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000007c0)={&(0x7f0000000780)='./file0\x00', 0x0, 0x18}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000a80)={&(0x7f00000008c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@const={0xa, 0x0, 0x0, 0xa, 0x2}, @ptr={0x5, 0x0, 0x0, 0x2, 0x1}, @func={0x10, 0x0, 0x0, 0xc, 0x5}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x42, 0x0, 0x2f, 0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x1}}, @int={0x2, 0x0, 0x0, 0x1, 0x0, 0xc, 0x0, 0x4, 0x4}, @int={0x6, 0x0, 0x0, 0x1, 0x0, 0x1f, 0x0, 0x66}, @volatile={0xb}]}, {0x0, [0x2e, 0x61, 0x0, 0x2e]}}, &(0x7f0000000980)=""/210, 0x96, 0xd2}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x18, 0x7, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4}, [@call={0x85, 0x0, 0x0, 0xa3}, @map={0x18, 0x8, 0x1, 0x0, r2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}]}, &(0x7f0000000840)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000880)=""/63, 0x41100, 0x10, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000c80)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000cc0)={0x4, 0x8, 0x7, 0x8}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000740)={r1, 0x10, &(0x7f0000000440)={&(0x7f0000000680)=""/154, 0x9a}}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x1c}, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000340)={0x0, 0xee00, 0xee01}, 0xc) ioctl$sock_SIOCOUTQ(r4, 0x5411, &(0x7f00000001c0)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="00032dbd7000ffdbdf25040000000500120069000000060001000000000005002200000000000c000f0009000000000000000c0016000200000000000000050022000000000006000e0000080000140008006970766c616e31000000000000000000050012000300000005000d0000000000"], 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x4000101) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000ac0), &(0x7f0000000b00)=0x4) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000bc0), 0x4) 18:46:10 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffffffffffff, 0x5, 0x38}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, &(0x7f0000000080), &(0x7f00000000c0)='syzkaller\x00', 0x5, 0x69, &(0x7f0000000100)=""/105, 0x41000, 0x3, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000180)={0x2, 0x4}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0x6, 0x400, 0xc11c}, 0x10}, 0x78) getpid() bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40, 0x7ff, 0x5ec1, 0x800, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4}, 0x40) 18:46:10 executing program 1: r0 = socket$unix(0x1, 0x3, 0x0) connect$unix(r0, &(0x7f0000000040)=@abs={0x0, 0x0, 0x4e20}, 0x6e) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) 18:46:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xb0, 0x1}, 0x20) socket$inet6_mptcp(0xa, 0x1, 0x106) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000d80)={0xffffffffffffffff}) sendto(r0, &(0x7f0000000dc0)="8297ccfd293af01bad9395f26acecff15384bea28799ad587a373f3f262df388d3eca829d9b65e424a6bb3d442a7d8148f4d78e1222ee16d3a502e3a54b7a23ff63b316ff279901cdfd22002007671cb1663f8c4d3d3ac44c6bccbb6acae9367147b7ca09c1fcee9c0cf3838bc3eb125446aff656a8fdab65ad2866dff1cbb5f3772dcf875c45f4a1f481eebc5bbf7df46b30b3d393c8eef4255307245350e58b905a6f3fd32c61aa869ca66a9dbeebbdc61da544e69e7c3ee7c466badf3e89c091492", 0xc3, 0x24004010, &(0x7f0000000ec0)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x80) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[@ANYBLOB="9feb010018000000000000007900000079000000020000000000d4ccb2be337a9d1980b9a6f21e00000000000300000000010000000500000088000000090000000600000f010000000500000007000000090000000200000003000000030000000400000002000000090000000400000001010000020000000100000004000000070000000100000000000000010000006d0e000000"], &(0x7f0000000080)=""/122, 0x96, 0x7a, 0x1}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000007c0)={&(0x7f0000000780)='./file0\x00', 0x0, 0x18}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000a80)={&(0x7f00000008c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@const={0xa, 0x0, 0x0, 0xa, 0x2}, @ptr={0x5, 0x0, 0x0, 0x2, 0x1}, @func={0x10, 0x0, 0x0, 0xc, 0x5}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x42, 0x0, 0x2f, 0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x1}}, @int={0x2, 0x0, 0x0, 0x1, 0x0, 0xc, 0x0, 0x4, 0x4}, @int={0x6, 0x0, 0x0, 0x1, 0x0, 0x1f, 0x0, 0x66}, @volatile={0xb}]}, {0x0, [0x2e, 0x61, 0x0, 0x2e]}}, &(0x7f0000000980)=""/210, 0x96, 0xd2}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x18, 0x7, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4}, [@call={0x85, 0x0, 0x0, 0xa3}, @map={0x18, 0x8, 0x1, 0x0, r2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}]}, &(0x7f0000000840)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000880)=""/63, 0x41100, 0x10, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000c80)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000cc0)={0x4, 0x8, 0x7, 0x8}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000740)={r1, 0x10, &(0x7f0000000440)={&(0x7f0000000680)=""/154, 0x9a}}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x1c}, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000340)={0x0, 0xee00, 0xee01}, 0xc) ioctl$sock_SIOCOUTQ(r4, 0x5411, &(0x7f00000001c0)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="00032dbd7000ffdbdf25040000000500120069000000060001000000000005002200000000000c000f0009000000000000000c0016000200000000000000050022000000000006000e0000080000140008006970766c616e31000000000000000000050012000300000005000d0000000000"], 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x4000101) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000ac0), &(0x7f0000000b00)=0x4) 18:46:11 executing program 2: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffffffffffff, 0x5, 0x38}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x0, &(0x7f0000000080), &(0x7f00000000c0)='syzkaller\x00', 0x5, 0x69, &(0x7f0000000100)=""/105, 0x41000, 0x3, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000180)={0x2, 0x4}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0x6, 0x400, 0xc11c}, 0x10}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40, 0x7ff, 0x5ec1, 0x800, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4}, 0x40) 18:46:11 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}], 0x10) 18:46:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:11 executing program 1: r0 = socket$unix(0x1, 0x3, 0x0) connect$unix(r0, &(0x7f0000000040)=@abs={0x0, 0x0, 0x4e20}, 0x6e) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) 18:46:11 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x0, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, 0x20}], 0x2c) 18:46:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xb0, 0x1}, 0x20) socket$inet6_mptcp(0xa, 0x1, 0x106) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000d80)={0xffffffffffffffff}) sendto(r0, &(0x7f0000000dc0)="8297ccfd293af01bad9395f26acecff15384bea28799ad587a373f3f262df388d3eca829d9b65e424a6bb3d442a7d8148f4d78e1222ee16d3a502e3a54b7a23ff63b316ff279901cdfd22002007671cb1663f8c4d3d3ac44c6bccbb6acae9367147b7ca09c1fcee9c0cf3838bc3eb125446aff656a8fdab65ad2866dff1cbb5f3772dcf875c45f4a1f481eebc5bbf7df46b30b3d393c8eef4255307245350e58b905a6f3fd32c61aa869ca66a9dbeebbdc61da544e69e7c3ee7c466badf3e89c091492", 0xc3, 0x24004010, &(0x7f0000000ec0)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x80) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[@ANYBLOB="9feb010018000000000000007900000079000000020000000000d4ccb2be337a9d1980b9a6f21e00000000000300000000010000000500000088000000090000000600000f010000000500000007000000090000000200000003000000030000000400000002000000090000000400000001010000020000000100000004000000070000000100000000000000010000006d0e000000"], &(0x7f0000000080)=""/122, 0x96, 0x7a, 0x1}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000007c0)={&(0x7f0000000780)='./file0\x00', 0x0, 0x18}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000a80)={&(0x7f00000008c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@const={0xa, 0x0, 0x0, 0xa, 0x2}, @ptr={0x5, 0x0, 0x0, 0x2, 0x1}, @func={0x10, 0x0, 0x0, 0xc, 0x5}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x42, 0x0, 0x2f, 0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x1}}, @int={0x2, 0x0, 0x0, 0x1, 0x0, 0xc, 0x0, 0x4, 0x4}, @int={0x6, 0x0, 0x0, 0x1, 0x0, 0x1f, 0x0, 0x66}, @volatile={0xb}]}, {0x0, [0x2e, 0x61, 0x0, 0x2e]}}, &(0x7f0000000980)=""/210, 0x96, 0xd2}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x18, 0x7, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4}, [@call={0x85, 0x0, 0x0, 0xa3}, @map={0x18, 0x8, 0x1, 0x0, r2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}]}, &(0x7f0000000840)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000880)=""/63, 0x41100, 0x10, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000c80)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000cc0)={0x4, 0x8, 0x7, 0x8}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000740)={r1, 0x10, &(0x7f0000000440)={&(0x7f0000000680)=""/154, 0x9a}}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x1c}, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000340)={0x0, 0xee00, 0xee01}, 0xc) ioctl$sock_SIOCOUTQ(r4, 0x5411, &(0x7f00000001c0)) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r5, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="00032dbd7000ffdbdf25040000000500120069000000060001000000000005002200000000000c000f0009000000000000000c0016000200000000000000050022000000000006000e0000080000140008006970766c616e31000000000000000000050012000300000005000d0000000000"], 0x78}, 0x1, 0x0, 0x0, 0x800}, 0x4000101) 18:46:11 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000040)={0xffffffffffffffff, 0x5, 0x38}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40, 0x7ff, 0x5ec1, 0x800, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4}, 0x40) 18:46:11 executing program 1: r0 = socket$unix(0x1, 0x3, 0x0) connect$unix(r0, &(0x7f0000000040)=@abs={0x0, 0x0, 0x4e20}, 0x6e) 18:46:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:11 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40, 0x7ff, 0x5ec1, 0x800, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4}, 0x40) 18:46:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xb0, 0x1}, 0x20) socket$inet6_mptcp(0xa, 0x1, 0x106) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000d80)={0xffffffffffffffff}) sendto(r0, &(0x7f0000000dc0)="8297ccfd293af01bad9395f26acecff15384bea28799ad587a373f3f262df388d3eca829d9b65e424a6bb3d442a7d8148f4d78e1222ee16d3a502e3a54b7a23ff63b316ff279901cdfd22002007671cb1663f8c4d3d3ac44c6bccbb6acae9367147b7ca09c1fcee9c0cf3838bc3eb125446aff656a8fdab65ad2866dff1cbb5f3772dcf875c45f4a1f481eebc5bbf7df46b30b3d393c8eef4255307245350e58b905a6f3fd32c61aa869ca66a9dbeebbdc61da544e69e7c3ee7c466badf3e89c091492", 0xc3, 0x24004010, &(0x7f0000000ec0)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x80) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[@ANYBLOB="9feb010018000000000000007900000079000000020000000000d4ccb2be337a9d1980b9a6f21e00000000000300000000010000000500000088000000090000000600000f010000000500000007000000090000000200000003000000030000000400000002000000090000000400000001010000020000000100000004000000070000000100000000000000010000006d0e000000"], &(0x7f0000000080)=""/122, 0x96, 0x7a, 0x1}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000007c0)={&(0x7f0000000780)='./file0\x00', 0x0, 0x18}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000a80)={&(0x7f00000008c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@const={0xa, 0x0, 0x0, 0xa, 0x2}, @ptr={0x5, 0x0, 0x0, 0x2, 0x1}, @func={0x10, 0x0, 0x0, 0xc, 0x5}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x42, 0x0, 0x2f, 0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x1}}, @int={0x2, 0x0, 0x0, 0x1, 0x0, 0xc, 0x0, 0x4, 0x4}, @int={0x6, 0x0, 0x0, 0x1, 0x0, 0x1f, 0x0, 0x66}, @volatile={0xb}]}, {0x0, [0x2e, 0x61, 0x0, 0x2e]}}, &(0x7f0000000980)=""/210, 0x96, 0xd2}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x18, 0x7, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4}, [@call={0x85, 0x0, 0x0, 0xa3}, @map={0x18, 0x8, 0x1, 0x0, r2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}]}, &(0x7f0000000840)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000880)=""/63, 0x41100, 0x10, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000c80)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000cc0)={0x4, 0x8, 0x7, 0x8}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000740)={r1, 0x10, &(0x7f0000000440)={&(0x7f0000000680)=""/154, 0x9a}}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x1c}, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000340)={0x0, 0xee00, 0xee01}, 0xc) ioctl$sock_SIOCOUTQ(r4, 0x5411, &(0x7f00000001c0)) socket$nl_generic(0x10, 0x3, 0x10) 18:46:12 executing program 1: socket$unix(0x1, 0x3, 0x0) 18:46:12 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}], 0x10) 18:46:12 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x0, 0x0, @private0, 0x20}], 0x2c) 18:46:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xb0, 0x1}, 0x20) socket$inet6_mptcp(0xa, 0x1, 0x106) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000d80)={0xffffffffffffffff}) sendto(r0, &(0x7f0000000dc0)="8297ccfd293af01bad9395f26acecff15384bea28799ad587a373f3f262df388d3eca829d9b65e424a6bb3d442a7d8148f4d78e1222ee16d3a502e3a54b7a23ff63b316ff279901cdfd22002007671cb1663f8c4d3d3ac44c6bccbb6acae9367147b7ca09c1fcee9c0cf3838bc3eb125446aff656a8fdab65ad2866dff1cbb5f3772dcf875c45f4a1f481eebc5bbf7df46b30b3d393c8eef4255307245350e58b905a6f3fd32c61aa869ca66a9dbeebbdc61da544e69e7c3ee7c466badf3e89c091492", 0xc3, 0x24004010, &(0x7f0000000ec0)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x80) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[@ANYBLOB="9feb010018000000000000007900000079000000020000000000d4ccb2be337a9d1980b9a6f21e00000000000300000000010000000500000088000000090000000600000f010000000500000007000000090000000200000003000000030000000400000002000000090000000400000001010000020000000100000004000000070000000100000000000000010000006d0e000000"], &(0x7f0000000080)=""/122, 0x96, 0x7a, 0x1}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000007c0)={&(0x7f0000000780)='./file0\x00', 0x0, 0x18}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000a80)={&(0x7f00000008c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@const={0xa, 0x0, 0x0, 0xa, 0x2}, @ptr={0x5, 0x0, 0x0, 0x2, 0x1}, @func={0x10, 0x0, 0x0, 0xc, 0x5}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x42, 0x0, 0x2f, 0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x1}}, @int={0x2, 0x0, 0x0, 0x1, 0x0, 0xc, 0x0, 0x4, 0x4}, @int={0x6, 0x0, 0x0, 0x1, 0x0, 0x1f, 0x0, 0x66}, @volatile={0xb}]}, {0x0, [0x2e, 0x61, 0x0, 0x2e]}}, &(0x7f0000000980)=""/210, 0x96, 0xd2}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x18, 0x7, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4}, [@call={0x85, 0x0, 0x0, 0xa3}, @map={0x18, 0x8, 0x1, 0x0, r2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}]}, &(0x7f0000000840)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000880)=""/63, 0x41100, 0x10, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000c80)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000cc0)={0x4, 0x8, 0x7, 0x8}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000740)={r1, 0x10, &(0x7f0000000440)={&(0x7f0000000680)=""/154, 0x9a}}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x1c}, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000340)={0x0, 0xee00, 0xee01}, 0xc) ioctl$sock_SIOCOUTQ(r4, 0x5411, &(0x7f00000001c0)) 18:46:12 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x40, 0x7ff, 0x5ec1, 0x800, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4}, 0x40) 18:46:12 executing program 1: socket$unix(0x1, 0x0, 0x0) 18:46:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:12 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in6={0xa, 0x0, 0x0, @private0}], 0x2c) 18:46:12 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) 18:46:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xb0, 0x1}, 0x20) socket$inet6_mptcp(0xa, 0x1, 0x106) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000d80)={0xffffffffffffffff}) sendto(r0, &(0x7f0000000dc0)="8297ccfd293af01bad9395f26acecff15384bea28799ad587a373f3f262df388d3eca829d9b65e424a6bb3d442a7d8148f4d78e1222ee16d3a502e3a54b7a23ff63b316ff279901cdfd22002007671cb1663f8c4d3d3ac44c6bccbb6acae9367147b7ca09c1fcee9c0cf3838bc3eb125446aff656a8fdab65ad2866dff1cbb5f3772dcf875c45f4a1f481eebc5bbf7df46b30b3d393c8eef4255307245350e58b905a6f3fd32c61aa869ca66a9dbeebbdc61da544e69e7c3ee7c466badf3e89c091492", 0xc3, 0x24004010, &(0x7f0000000ec0)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x80) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[@ANYBLOB="9feb010018000000000000007900000079000000020000000000d4ccb2be337a9d1980b9a6f21e00000000000300000000010000000500000088000000090000000600000f010000000500000007000000090000000200000003000000030000000400000002000000090000000400000001010000020000000100000004000000070000000100000000000000010000006d0e000000"], &(0x7f0000000080)=""/122, 0x96, 0x7a, 0x1}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000007c0)={&(0x7f0000000780)='./file0\x00', 0x0, 0x18}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000a80)={&(0x7f00000008c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@const={0xa, 0x0, 0x0, 0xa, 0x2}, @ptr={0x5, 0x0, 0x0, 0x2, 0x1}, @func={0x10, 0x0, 0x0, 0xc, 0x5}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x42, 0x0, 0x2f, 0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x1}}, @int={0x2, 0x0, 0x0, 0x1, 0x0, 0xc, 0x0, 0x4, 0x4}, @int={0x6, 0x0, 0x0, 0x1, 0x0, 0x1f, 0x0, 0x66}, @volatile={0xb}]}, {0x0, [0x2e, 0x61, 0x0, 0x2e]}}, &(0x7f0000000980)=""/210, 0x96, 0xd2}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x18, 0x7, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4}, [@call={0x85, 0x0, 0x0, 0xa3}, @map={0x18, 0x8, 0x1, 0x0, r2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}]}, &(0x7f0000000840)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000880)=""/63, 0x41100, 0x10, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000c80)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000cc0)={0x4, 0x8, 0x7, 0x8}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000740)={r1, 0x10, &(0x7f0000000440)={&(0x7f0000000680)=""/154, 0x9a}}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x1c}, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000340)={0x0, 0xee00, 0xee01}, 0xc) 18:46:12 executing program 1: socket$unix(0x1, 0x0, 0x0) 18:46:12 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in6={0xa, 0x0, 0x0, @private0}], 0x1c) 18:46:12 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) 18:46:13 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xb0, 0x1}, 0x20) socket$inet6_mptcp(0xa, 0x1, 0x106) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000d80)={0xffffffffffffffff}) sendto(r0, &(0x7f0000000dc0)="8297ccfd293af01bad9395f26acecff15384bea28799ad587a373f3f262df388d3eca829d9b65e424a6bb3d442a7d8148f4d78e1222ee16d3a502e3a54b7a23ff63b316ff279901cdfd22002007671cb1663f8c4d3d3ac44c6bccbb6acae9367147b7ca09c1fcee9c0cf3838bc3eb125446aff656a8fdab65ad2866dff1cbb5f3772dcf875c45f4a1f481eebc5bbf7df46b30b3d393c8eef4255307245350e58b905a6f3fd32c61aa869ca66a9dbeebbdc61da544e69e7c3ee7c466badf3e89c091492", 0xc3, 0x24004010, &(0x7f0000000ec0)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x80) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[@ANYBLOB="9feb010018000000000000007900000079000000020000000000d4ccb2be337a9d1980b9a6f21e00000000000300000000010000000500000088000000090000000600000f010000000500000007000000090000000200000003000000030000000400000002000000090000000400000001010000020000000100000004000000070000000100000000000000010000006d0e000000"], &(0x7f0000000080)=""/122, 0x96, 0x7a, 0x1}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000007c0)={&(0x7f0000000780)='./file0\x00', 0x0, 0x18}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000a80)={&(0x7f00000008c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@const={0xa, 0x0, 0x0, 0xa, 0x2}, @ptr={0x5, 0x0, 0x0, 0x2, 0x1}, @func={0x10, 0x0, 0x0, 0xc, 0x5}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x42, 0x0, 0x2f, 0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x1}}, @int={0x2, 0x0, 0x0, 0x1, 0x0, 0xc, 0x0, 0x4, 0x4}, @int={0x6, 0x0, 0x0, 0x1, 0x0, 0x1f, 0x0, 0x66}, @volatile={0xb}]}, {0x0, [0x2e, 0x61, 0x0, 0x2e]}}, &(0x7f0000000980)=""/210, 0x96, 0xd2}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x18, 0x7, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4}, [@call={0x85, 0x0, 0x0, 0xa3}, @map={0x18, 0x8, 0x1, 0x0, r2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}]}, &(0x7f0000000840)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000880)=""/63, 0x41100, 0x10, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000c80)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000cc0)={0x4, 0x8, 0x7, 0x8}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000740)={r1, 0x10, &(0x7f0000000440)={&(0x7f0000000680)=""/154, 0x9a}}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x1c}, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000340)={0x0, 0xee00, 0xee01}, 0xc) 18:46:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xb0, 0x1}, 0x20) socket$inet6_mptcp(0xa, 0x1, 0x106) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000d80)={0xffffffffffffffff}) sendto(r0, &(0x7f0000000dc0)="8297ccfd293af01bad9395f26acecff15384bea28799ad587a373f3f262df388d3eca829d9b65e424a6bb3d442a7d8148f4d78e1222ee16d3a502e3a54b7a23ff63b316ff279901cdfd22002007671cb1663f8c4d3d3ac44c6bccbb6acae9367147b7ca09c1fcee9c0cf3838bc3eb125446aff656a8fdab65ad2866dff1cbb5f3772dcf875c45f4a1f481eebc5bbf7df46b30b3d393c8eef4255307245350e58b905a6f3fd32c61aa869ca66a9dbeebbdc61da544e69e7c3ee7c466badf3e89c091492", 0xc3, 0x24004010, &(0x7f0000000ec0)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x80) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[@ANYBLOB="9feb010018000000000000007900000079000000020000000000d4ccb2be337a9d1980b9a6f21e00000000000300000000010000000500000088000000090000000600000f010000000500000007000000090000000200000003000000030000000400000002000000090000000400000001010000020000000100000004000000070000000100000000000000010000006d0e000000"], &(0x7f0000000080)=""/122, 0x96, 0x7a, 0x1}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000007c0)={&(0x7f0000000780)='./file0\x00', 0x0, 0x18}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000a80)={&(0x7f00000008c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@const={0xa, 0x0, 0x0, 0xa, 0x2}, @ptr={0x5, 0x0, 0x0, 0x2, 0x1}, @func={0x10, 0x0, 0x0, 0xc, 0x5}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x42, 0x0, 0x2f, 0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x1}}, @int={0x2, 0x0, 0x0, 0x1, 0x0, 0xc, 0x0, 0x4, 0x4}, @int={0x6, 0x0, 0x0, 0x1, 0x0, 0x1f, 0x0, 0x66}, @volatile={0xb}]}, {0x0, [0x2e, 0x61, 0x0, 0x2e]}}, &(0x7f0000000980)=""/210, 0x96, 0xd2}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x18, 0x7, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4}, [@call={0x85, 0x0, 0x0, 0xa3}, @map={0x18, 0x8, 0x1, 0x0, r2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}]}, &(0x7f0000000840)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000880)=""/63, 0x41100, 0x10, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000c80)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000cc0)={0x4, 0x8, 0x7, 0x8}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000740)={r1, 0x10, &(0x7f0000000440)={&(0x7f0000000680)=""/154, 0x9a}}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x1c}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) 18:46:13 executing program 1: socket$unix(0x1, 0x0, 0x0) 18:46:13 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in6={0xa, 0x0, 0x0, @private0}], 0x1c) 18:46:13 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:13 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) 18:46:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xb0, 0x1}, 0x20) socket$inet6_mptcp(0xa, 0x1, 0x106) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000d80)={0xffffffffffffffff}) sendto(r0, &(0x7f0000000dc0)="8297ccfd293af01bad9395f26acecff15384bea28799ad587a373f3f262df388d3eca829d9b65e424a6bb3d442a7d8148f4d78e1222ee16d3a502e3a54b7a23ff63b316ff279901cdfd22002007671cb1663f8c4d3d3ac44c6bccbb6acae9367147b7ca09c1fcee9c0cf3838bc3eb125446aff656a8fdab65ad2866dff1cbb5f3772dcf875c45f4a1f481eebc5bbf7df46b30b3d393c8eef4255307245350e58b905a6f3fd32c61aa869ca66a9dbeebbdc61da544e69e7c3ee7c466badf3e89c091492", 0xc3, 0x24004010, &(0x7f0000000ec0)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x80) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[@ANYBLOB="9feb010018000000000000007900000079000000020000000000d4ccb2be337a9d1980b9a6f21e00000000000300000000010000000500000088000000090000000600000f010000000500000007000000090000000200000003000000030000000400000002000000090000000400000001010000020000000100000004000000070000000100000000000000010000006d0e000000"], &(0x7f0000000080)=""/122, 0x96, 0x7a, 0x1}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000007c0)={&(0x7f0000000780)='./file0\x00', 0x0, 0x18}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000a80)={&(0x7f00000008c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@const={0xa, 0x0, 0x0, 0xa, 0x2}, @ptr={0x5, 0x0, 0x0, 0x2, 0x1}, @func={0x10, 0x0, 0x0, 0xc, 0x5}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x42, 0x0, 0x2f, 0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x1}}, @int={0x2, 0x0, 0x0, 0x1, 0x0, 0xc, 0x0, 0x4, 0x4}, @int={0x6, 0x0, 0x0, 0x1, 0x0, 0x1f, 0x0, 0x66}, @volatile={0xb}]}, {0x0, [0x2e, 0x61, 0x0, 0x2e]}}, &(0x7f0000000980)=""/210, 0x96, 0xd2}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x18, 0x7, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4}, [@call={0x85, 0x0, 0x0, 0xa3}, @map={0x18, 0x8, 0x1, 0x0, r2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}]}, &(0x7f0000000840)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000880)=""/63, 0x41100, 0x10, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000c80)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000cc0)={0x4, 0x8, 0x7, 0x8}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000740)={r1, 0x10, &(0x7f0000000440)={&(0x7f0000000680)=""/154, 0x9a}}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x1c}, 0x10) 18:46:13 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x40, 0x7ff, 0x5ec1, 0x800, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4}, 0x40) 18:46:13 executing program 1: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_RES_QP_GET(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x140a, 0x1, 0x70bd2a, 0x25dfdbfc, "", [@RDMA_NLDEV_ATTR_RES_LQPN={0x8, 0x15, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x4}, @RDMA_NLDEV_ATTR_PORT_INDEX={0x8, 0x3, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x44085}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LIST_PHY(r1, &(0x7f0000000c80)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000c00)={0x14}, 0x14}}, 0x0) 18:46:13 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in6={0xa, 0x0, 0x0, @private0}], 0x1c) 18:46:13 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xb0, 0x1}, 0x20) socket$inet6_mptcp(0xa, 0x1, 0x106) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000d80)={0xffffffffffffffff}) sendto(r0, &(0x7f0000000dc0)="8297ccfd293af01bad9395f26acecff15384bea28799ad587a373f3f262df388d3eca829d9b65e424a6bb3d442a7d8148f4d78e1222ee16d3a502e3a54b7a23ff63b316ff279901cdfd22002007671cb1663f8c4d3d3ac44c6bccbb6acae9367147b7ca09c1fcee9c0cf3838bc3eb125446aff656a8fdab65ad2866dff1cbb5f3772dcf875c45f4a1f481eebc5bbf7df46b30b3d393c8eef4255307245350e58b905a6f3fd32c61aa869ca66a9dbeebbdc61da544e69e7c3ee7c466badf3e89c091492", 0xc3, 0x24004010, &(0x7f0000000ec0)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x80) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[@ANYBLOB="9feb010018000000000000007900000079000000020000000000d4ccb2be337a9d1980b9a6f21e00000000000300000000010000000500000088000000090000000600000f010000000500000007000000090000000200000003000000030000000400000002000000090000000400000001010000020000000100000004000000070000000100000000000000010000006d0e000000"], &(0x7f0000000080)=""/122, 0x96, 0x7a, 0x1}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000007c0)={&(0x7f0000000780)='./file0\x00', 0x0, 0x18}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000a80)={&(0x7f00000008c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@const={0xa, 0x0, 0x0, 0xa, 0x2}, @ptr={0x5, 0x0, 0x0, 0x2, 0x1}, @func={0x10, 0x0, 0x0, 0xc, 0x5}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x42, 0x0, 0x2f, 0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x1}}, @int={0x2, 0x0, 0x0, 0x1, 0x0, 0xc, 0x0, 0x4, 0x4}, @int={0x6, 0x0, 0x0, 0x1, 0x0, 0x1f, 0x0, 0x66}, @volatile={0xb}]}, {0x0, [0x2e, 0x61, 0x0, 0x2e]}}, &(0x7f0000000980)=""/210, 0x96, 0xd2}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x18, 0x7, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4}, [@call={0x85, 0x0, 0x0, 0xa3}, @map={0x18, 0x8, 0x1, 0x0, r2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}]}, &(0x7f0000000840)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000880)=""/63, 0x41100, 0x10, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000c80)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000cc0)={0x4, 0x8, 0x7, 0x8}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000740)={r1, 0x10, &(0x7f0000000440)={&(0x7f0000000680)=""/154, 0x9a}}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', 0x0, 0x1c}, 0x10) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000340)={0x0, 0xee00, 0xee01}, 0xc) 18:46:13 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xb0, 0x1}, 0x20) socket$inet6_mptcp(0xa, 0x1, 0x106) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000d80)={0xffffffffffffffff}) sendto(r0, &(0x7f0000000dc0)="8297ccfd293af01bad9395f26acecff15384bea28799ad587a373f3f262df388d3eca829d9b65e424a6bb3d442a7d8148f4d78e1222ee16d3a502e3a54b7a23ff63b316ff279901cdfd22002007671cb1663f8c4d3d3ac44c6bccbb6acae9367147b7ca09c1fcee9c0cf3838bc3eb125446aff656a8fdab65ad2866dff1cbb5f3772dcf875c45f4a1f481eebc5bbf7df46b30b3d393c8eef4255307245350e58b905a6f3fd32c61aa869ca66a9dbeebbdc61da544e69e7c3ee7c466badf3e89c091492", 0xc3, 0x24004010, &(0x7f0000000ec0)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x80) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[@ANYBLOB="9feb010018000000000000007900000079000000020000000000d4ccb2be337a9d1980b9a6f21e00000000000300000000010000000500000088000000090000000600000f010000000500000007000000090000000200000003000000030000000400000002000000090000000400000001010000020000000100000004000000070000000100000000000000010000006d0e000000"], &(0x7f0000000080)=""/122, 0x96, 0x7a, 0x1}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000007c0)={&(0x7f0000000780)='./file0\x00', 0x0, 0x18}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000a80)={&(0x7f00000008c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@const={0xa, 0x0, 0x0, 0xa, 0x2}, @ptr={0x5, 0x0, 0x0, 0x2, 0x1}, @func={0x10, 0x0, 0x0, 0xc, 0x5}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x42, 0x0, 0x2f, 0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x1}}, @int={0x2, 0x0, 0x0, 0x1, 0x0, 0xc, 0x0, 0x4, 0x4}, @int={0x6, 0x0, 0x0, 0x1, 0x0, 0x1f, 0x0, 0x66}, @volatile={0xb}]}, {0x0, [0x2e, 0x61, 0x0, 0x2e]}}, &(0x7f0000000980)=""/210, 0x96, 0xd2}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x18, 0x7, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4}, [@call={0x85, 0x0, 0x0, 0xa3}, @map={0x18, 0x8, 0x1, 0x0, r2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}]}, &(0x7f0000000840)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000880)=""/63, 0x41100, 0x10, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000c80)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000cc0)={0x4, 0x8, 0x7, 0x8}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000740)={r1, 0x10, &(0x7f0000000440)={&(0x7f0000000680)=""/154, 0x9a}}, 0x10) 18:46:13 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x40, 0x7ff, 0x5ec1, 0x800, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4}, 0x40) 18:46:13 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}, @in6={0xa, 0x0, 0x0, @private0}], 0x2c) 18:46:13 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:13 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) socket$inet_sctp(0x2, 0x5, 0x84) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000380), r1) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan3\x00'}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 18:46:13 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x40, 0x7ff, 0x5ec1, 0x800, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4}, 0x40) 18:46:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xb0, 0x1}, 0x20) socket$inet6_mptcp(0xa, 0x1, 0x106) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000d80)={0xffffffffffffffff}) sendto(r0, &(0x7f0000000dc0)="8297ccfd293af01bad9395f26acecff15384bea28799ad587a373f3f262df388d3eca829d9b65e424a6bb3d442a7d8148f4d78e1222ee16d3a502e3a54b7a23ff63b316ff279901cdfd22002007671cb1663f8c4d3d3ac44c6bccbb6acae9367147b7ca09c1fcee9c0cf3838bc3eb125446aff656a8fdab65ad2866dff1cbb5f3772dcf875c45f4a1f481eebc5bbf7df46b30b3d393c8eef4255307245350e58b905a6f3fd32c61aa869ca66a9dbeebbdc61da544e69e7c3ee7c466badf3e89c091492", 0xc3, 0x24004010, &(0x7f0000000ec0)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[@ANYBLOB="9feb010018000000000000007900000079000000020000000000d4ccb2be337a9d1980b9a6f21e00000000000300000000010000000500000088000000090000000600000f010000000500000007000000090000000200000003000000030000000400000002000000090000000400000001010000020000000100000004000000070000000100000000000000010000006d0e000000"], &(0x7f0000000080)=""/122, 0x96, 0x7a, 0x1}, 0x20) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000007c0)={&(0x7f0000000780)='./file0\x00', 0x0, 0x18}, 0x10) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000a80)={&(0x7f00000008c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@const={0xa, 0x0, 0x0, 0xa, 0x2}, @ptr={0x5, 0x0, 0x0, 0x2, 0x1}, @func={0x10, 0x0, 0x0, 0xc, 0x5}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x42, 0x0, 0x2f, 0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x1}}, @int={0x2, 0x0, 0x0, 0x1, 0x0, 0xc, 0x0, 0x4, 0x4}, @int={0x6, 0x0, 0x0, 0x1, 0x0, 0x1f, 0x0, 0x66}, @volatile={0xb}]}, {0x0, [0x2e, 0x61, 0x0, 0x2e]}}, &(0x7f0000000980)=""/210, 0x96, 0xd2}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x18, 0x7, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4}, [@call={0x85, 0x0, 0x0, 0xa3}, @map={0x18, 0x8, 0x1, 0x0, r1}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}]}, &(0x7f0000000840)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000880)=""/63, 0x41100, 0x10, '\x00', 0x0, 0x0, r2, 0x8, &(0x7f0000000c80)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000cc0)={0x4, 0x8, 0x7, 0x8}, 0x10}, 0x78) 18:46:13 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}, @in6={0xa, 0x0, 0x0, @private0}], 0x2c) 18:46:14 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:14 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:14 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x0, 0x7ff, 0x5ec1, 0x800, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4}, 0x40) 18:46:14 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xb0, 0x1}, 0x20) socket$inet6_mptcp(0xa, 0x1, 0x106) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000d80)={0xffffffffffffffff}) sendto(r0, &(0x7f0000000dc0)="8297ccfd293af01bad9395f26acecff15384bea28799ad587a373f3f262df388d3eca829d9b65e424a6bb3d442a7d8148f4d78e1222ee16d3a502e3a54b7a23ff63b316ff279901cdfd22002007671cb1663f8c4d3d3ac44c6bccbb6acae9367147b7ca09c1fcee9c0cf3838bc3eb125446aff656a8fdab65ad2866dff1cbb5f3772dcf875c45f4a1f481eebc5bbf7df46b30b3d393c8eef4255307245350e58b905a6f3fd32c61aa869ca66a9dbeebbdc61da544e69e7c3ee7c466badf3e89c091492", 0xc3, 0x24004010, &(0x7f0000000ec0)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[@ANYBLOB="9feb010018000000000000007900000079000000020000000000d4ccb2be337a9d1980b9a6f21e00000000000300000000010000000500000088000000090000000600000f010000000500000007000000090000000200000003000000030000000400000002000000090000000400000001010000020000000100000004000000070000000100000000000000010000006d0e000000"], &(0x7f0000000080)=""/122, 0x96, 0x7a, 0x1}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f00000007c0)={&(0x7f0000000780)='./file0\x00', 0x0, 0x18}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000a80)={&(0x7f00000008c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@const={0xa, 0x0, 0x0, 0xa, 0x2}, @ptr={0x5, 0x0, 0x0, 0x2, 0x1}, @func={0x10, 0x0, 0x0, 0xc, 0x5}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x42, 0x0, 0x2f, 0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x1}}, @int={0x2, 0x0, 0x0, 0x1, 0x0, 0xc, 0x0, 0x4, 0x4}, @int={0x6, 0x0, 0x0, 0x1, 0x0, 0x1f, 0x0, 0x66}, @volatile={0xb}]}, {0x0, [0x2e, 0x61, 0x0, 0x2e]}}, &(0x7f0000000980)=""/210, 0x96, 0xd2}, 0x20) 18:46:14 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}, @in6={0xa, 0x0, 0x0, @private0}], 0x2c) 18:46:14 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:14 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x0, 0x0, 0x5ec1, 0x800, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4}, 0x40) 18:46:14 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:14 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xb0, 0x1}, 0x20) socket$inet6_mptcp(0xa, 0x1, 0x106) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000d80)={0xffffffffffffffff}) sendto(r0, &(0x7f0000000dc0)="8297ccfd293af01bad9395f26acecff15384bea28799ad587a373f3f262df388d3eca829d9b65e424a6bb3d442a7d8148f4d78e1222ee16d3a502e3a54b7a23ff63b316ff279901cdfd22002007671cb1663f8c4d3d3ac44c6bccbb6acae9367147b7ca09c1fcee9c0cf3838bc3eb125446aff656a8fdab65ad2866dff1cbb5f3772dcf875c45f4a1f481eebc5bbf7df46b30b3d393c8eef4255307245350e58b905a6f3fd32c61aa869ca66a9dbeebbdc61da544e69e7c3ee7c466badf3e89c091492", 0xc3, 0x24004010, &(0x7f0000000ec0)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[@ANYBLOB="9feb010018000000000000007900000079000000020000000000d4ccb2be337a9d1980b9a6f21e00000000000300000000010000000500000088000000090000000600000f010000000500000007000000090000000200000003000000030000000400000002000000090000000400000001010000020000000100000004000000070000000100000000000000010000006d0e000000"], &(0x7f0000000080)=""/122, 0x96, 0x7a, 0x1}, 0x20) bpf$OBJ_GET_MAP(0x7, &(0x7f00000007c0)={&(0x7f0000000780)='./file0\x00', 0x0, 0x18}, 0x10) 18:46:14 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20}, @in6={0xa, 0x0, 0x0, @private0}], 0x2c) 18:46:14 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x0, 0x0, 0x0, 0x800, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4}, 0x40) 18:46:14 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:14 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20}, @in6={0xa, 0x0, 0x0, @private0}], 0x2c) 18:46:14 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xb0, 0x1}, 0x20) socket$inet6_mptcp(0xa, 0x1, 0x106) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000d80)={0xffffffffffffffff}) sendto(r0, &(0x7f0000000dc0)="8297ccfd293af01bad9395f26acecff15384bea28799ad587a373f3f262df388d3eca829d9b65e424a6bb3d442a7d8148f4d78e1222ee16d3a502e3a54b7a23ff63b316ff279901cdfd22002007671cb1663f8c4d3d3ac44c6bccbb6acae9367147b7ca09c1fcee9c0cf3838bc3eb125446aff656a8fdab65ad2866dff1cbb5f3772dcf875c45f4a1f481eebc5bbf7df46b30b3d393c8eef4255307245350e58b905a6f3fd32c61aa869ca66a9dbeebbdc61da544e69e7c3ee7c466badf3e89c091492", 0xc3, 0x24004010, &(0x7f0000000ec0)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x80) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[@ANYBLOB="9feb010018000000000000007900000079000000020000000000d4ccb2be337a9d1980b9a6f21e00000000000300000000010000000500000088000000090000000600000f010000000500000007000000090000000200000003000000030000000400000002000000090000000400000001010000020000000100000004000000070000000100000000000000010000006d0e000000"], &(0x7f0000000080)=""/122, 0x96, 0x7a, 0x1}, 0x20) 18:46:15 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:15 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4}, 0x40) 18:46:15 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:15 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x4e20}, @in6={0xa, 0x0, 0x0, @private0}], 0x2c) 18:46:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xb0, 0x1}, 0x20) socket$inet6_mptcp(0xa, 0x1, 0x106) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000d80)={0xffffffffffffffff}) sendto(r0, &(0x7f0000000dc0)="8297ccfd293af01bad9395f26acecff15384bea28799ad587a373f3f262df388d3eca829d9b65e424a6bb3d442a7d8148f4d78e1222ee16d3a502e3a54b7a23ff63b316ff279901cdfd22002007671cb1663f8c4d3d3ac44c6bccbb6acae9367147b7ca09c1fcee9c0cf3838bc3eb125446aff656a8fdab65ad2866dff1cbb5f3772dcf875c45f4a1f481eebc5bbf7df46b30b3d393c8eef4255307245350e58b905a6f3fd32c61aa869ca66a9dbeebbdc61da544e69e7c3ee7c466badf3e89c091492", 0xc3, 0x24004010, &(0x7f0000000ec0)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x80) 18:46:15 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4}, 0x40) 18:46:15 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4}, 0x40) 18:46:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xb0, 0x1}, 0x20) socket$inet6_mptcp(0xa, 0x1, 0x106) sendto(0xffffffffffffffff, &(0x7f0000000dc0)="8297ccfd293af01bad9395f26acecff15384bea28799ad587a373f3f262df388d3eca829d9b65e424a6bb3d442a7d8148f4d78e1222ee16d3a502e3a54b7a23ff63b316ff279901cdfd22002007671cb1663f8c4d3d3ac44c6bccbb6acae9367147b7ca09c1fcee9c0cf3838bc3eb125446aff656a8fdab65ad2866dff1cbb5f3772dcf875c45f4a1f481eebc5bbf7df46b30b3d393c8eef4255307245350e58b905a6f3fd32c61aa869ca66a9dbeebbdc61da544e69e7c3ee7c466badf3e89c091492", 0xc3, 0x24004010, &(0x7f0000000ec0)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x80) 18:46:15 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4}, 0x40) 18:46:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:15 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:46:15 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:15 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4}, 0x40) 18:46:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xb0, 0x1}, 0x20) socket$inet6_mptcp(0xa, 0x1, 0x106) sendto(0xffffffffffffffff, &(0x7f0000000dc0)="8297ccfd293af01bad9395f26acecff15384bea28799ad587a373f3f262df388d3eca829d9b65e424a6bb3d442a7d8148f4d78e1222ee16d3a502e3a54b7a23ff63b316ff279901cdfd22002007671cb1663f8c4d3d3ac44c6bccbb6acae9367147b7ca09c1fcee9c0cf3838bc3eb125446aff656a8fdab65ad2866dff1cbb5f3772dcf875c45f4a1f481eebc5bbf7df46b30b3d393c8eef4255307245350e58b905a6f3fd32c61aa869ca66a9dbeebbdc61da544e69e7c3ee7c466badf3e89c091492", 0xc3, 0x24004010, &(0x7f0000000ec0)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x80) 18:46:15 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x0, 0x0, 0x0, 0x800, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4}, 0x40) 18:46:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xb0, 0x1}, 0x20) socket$inet6_mptcp(0xa, 0x1, 0x106) sendto(0xffffffffffffffff, &(0x7f0000000dc0)="8297ccfd293af01bad9395f26acecff15384bea28799ad587a373f3f262df388d3eca829d9b65e424a6bb3d442a7d8148f4d78e1222ee16d3a502e3a54b7a23ff63b316ff279901cdfd22002007671cb1663f8c4d3d3ac44c6bccbb6acae9367147b7ca09c1fcee9c0cf3838bc3eb125446aff656a8fdab65ad2866dff1cbb5f3772dcf875c45f4a1f481eebc5bbf7df46b30b3d393c8eef4255307245350e58b905a6f3fd32c61aa869ca66a9dbeebbdc61da544e69e7c3ee7c466badf3e89c091492", 0xc3, 0x24004010, &(0x7f0000000ec0)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x80) 18:46:16 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4}, 0x40) 18:46:16 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x0, 0x0, 0x0, 0x800, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x40) 18:46:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:46:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:46:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xb0, 0x1}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000d80)={0xffffffffffffffff}) sendto(r0, &(0x7f0000000dc0)="8297ccfd293af01bad9395f26acecff15384bea28799ad587a373f3f262df388d3eca829d9b65e424a6bb3d442a7d8148f4d78e1222ee16d3a502e3a54b7a23ff63b316ff279901cdfd22002007671cb1663f8c4d3d3ac44c6bccbb6acae9367147b7ca09c1fcee9c0cf3838bc3eb125446aff656a8fdab65ad2866dff1cbb5f3772dcf875c45f4a1f481eebc5bbf7df46b30b3d393c8eef4255307245350e58b905a6f3fd32c61aa869ca66a9dbeebbdc61da544e69e7c3ee7c466badf3e89c091492", 0xc3, 0x24004010, &(0x7f0000000ec0)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x80) 18:46:16 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) 18:46:16 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x0, 0x0, 0x0, 0x800, 0x1}, 0x40) 18:46:16 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000d80)={0xffffffffffffffff}) sendto(r0, &(0x7f0000000dc0)="8297ccfd293af01bad9395f26acecff15384bea28799ad587a373f3f262df388d3eca829d9b65e424a6bb3d442a7d8148f4d78e1222ee16d3a502e3a54b7a23ff63b316ff279901cdfd22002007671cb1663f8c4d3d3ac44c6bccbb6acae9367147b7ca09c1fcee9c0cf3838bc3eb125446aff656a8fdab65ad2866dff1cbb5f3772dcf875c45f4a1f481eebc5bbf7df46b30b3d393c8eef4255307245350e58b905a6f3fd32c61aa869ca66a9dbeebbdc61da544e69e7c3ee7c466badf3e89c091492", 0xc3, 0x24004010, &(0x7f0000000ec0)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x80) 18:46:16 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) 18:46:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:46:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:46:16 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000d80)={0xffffffffffffffff}) sendto(r0, &(0x7f0000000dc0)="8297ccfd293af01bad9395f26acecff15384bea28799ad587a373f3f262df388d3eca829d9b65e424a6bb3d442a7d8148f4d78e1222ee16d3a502e3a54b7a23ff63b316ff279901cdfd22002007671cb1663f8c4d3d3ac44c6bccbb6acae9367147b7ca09c1fcee9c0cf3838bc3eb125446aff656a8fdab65ad2866dff1cbb5f3772dcf875c45f4a1f481eebc5bbf7df46b30b3d393c8eef4255307245350e58b905a6f3fd32c61aa869ca66a9dbeebbdc61da544e69e7c3ee7c466badf3e89c091492", 0xc3, 0x24004010, &(0x7f0000000ec0)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x80) 18:46:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:46:17 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) 18:46:17 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000d80)={0xffffffffffffffff}) sendto(r0, &(0x7f0000000dc0)="8297ccfd293af01bad9395f26acecff15384bea28799ad587a373f3f262df388d3eca829d9b65e424a6bb3d442a7d8148f4d78e1222ee16d3a502e3a54b7a23ff63b316ff279901cdfd22002007671cb1663f8c4d3d3ac44c6bccbb6acae9367147b7ca09c1fcee9c0cf3838bc3eb125446aff656a8fdab65ad2866dff1cbb5f3772dcf875c45f4a1f481eebc5bbf7df46b30b3d393c8eef4255307245350e58b905a6f3fd32c61aa869ca66a9dbeebbdc61da544e69e7c3ee7c466badf3e89c091492", 0xc3, 0x24004010, &(0x7f0000000ec0)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x80) 18:46:17 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4}, 0x40) 18:46:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:46:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:17 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000d80)={0xffffffffffffffff}) sendto(r0, &(0x7f0000000dc0)="8297ccfd293af01bad9395f26acecff15384bea28799ad587a373f3f262df388d3eca829d9b65e424a6bb3d442a7d8148f4d78e1222ee16d3a502e3a54b7a23ff63b316ff279901cdfd22002007671cb1663f8c4d3d3ac44c6bccbb6acae9367147b7ca09c1fcee9c0cf3838bc3eb125446aff656a8fdab65ad2866dff1cbb5f3772dcf875c45f4a1f481eebc5bbf7df46b30b3d393c8eef4255307245350e58b905a6f3fd32c61aa869ca66a9dbeebbdc61da544e69e7c3ee7c466badf3e89c091492", 0xc3, 0x24004010, &(0x7f0000000ec0)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x80) 18:46:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:46:17 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4}, 0x40) 18:46:17 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000dc0)="8297ccfd293af01bad9395f26acecff15384bea28799ad587a373f3f262df388d3eca829d9b65e424a6bb3d442a7d8148f4d78e1222ee16d3a502e3a54b7a23ff63b316ff279901cdfd22002007671cb1663f8c4d3d3ac44c6bccbb6acae9367147b7ca09c1fcee9c0cf3838bc3eb125446aff656a8fdab65ad2866dff1cbb5f3772dcf875c45f4a1f481eebc5bbf7df46b30b3d393c8eef4255307245350e58b905a6f3fd32c61aa869ca66a9dbeebbdc61da544e69e7c3ee7c466badf3e89c091492", 0xc3, 0x24004010, &(0x7f0000000ec0)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x80) 18:46:17 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4}, 0x40) 18:46:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:46:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:18 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000dc0)="8297ccfd293af01bad9395f26acecff15384bea28799ad587a373f3f262df388d3eca829d9b65e424a6bb3d442a7d8148f4d78e1222ee16d3a502e3a54b7a23ff63b316ff279901cdfd22002007671cb1663f8c4d3d3ac44c6bccbb6acae9367147b7ca09c1fcee9c0cf3838bc3eb125446aff656a8fdab65ad2866dff1cbb5f3772dcf875c45f4a1f481eebc5bbf7df46b30b3d393c8eef4255307245350e58b905a6f3fd32c61aa869ca66a9dbeebbdc61da544e69e7c3ee7c466badf3e89c091492", 0xc3, 0x24004010, &(0x7f0000000ec0)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x80) 18:46:18 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:18 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4}, 0x40) 18:46:18 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:18 executing program 3: socketpair$unix(0x1, 0x5, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000dc0)="8297ccfd293af01bad9395f26acecff15384bea28799ad587a373f3f262df388d3eca829d9b65e424a6bb3d442a7d8148f4d78e1222ee16d3a502e3a54b7a23ff63b316ff279901cdfd22002007671cb1663f8c4d3d3ac44c6bccbb6acae9367147b7ca09c1fcee9c0cf3838bc3eb125446aff656a8fdab65ad2866dff1cbb5f3772dcf875c45f4a1f481eebc5bbf7df46b30b3d393c8eef4255307245350e58b905a6f3fd32c61aa869ca66a9dbeebbdc61da544e69e7c3ee7c466badf3e89c091492", 0xc3, 0x24004010, &(0x7f0000000ec0)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x80) 18:46:18 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x40) 18:46:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) 18:46:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:19 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000d80)) sendto(0xffffffffffffffff, &(0x7f0000000dc0)="8297ccfd293af01bad9395f26acecff15384bea28799ad587a373f3f262df388d3eca829d9b65e424a6bb3d442a7d8148f4d78e1222ee16d3a502e3a54b7a23ff63b316ff279901cdfd22002007671cb1663f8c4d3d3ac44c6bccbb6acae9367147b7ca09c1fcee9c0cf3838bc3eb125446aff656a8fdab65ad2866dff1cbb5f3772dcf875c45f4a1f481eebc5bbf7df46b30b3d393c8eef4255307245350e58b905a6f3fd32c61aa869ca66a9dbeebbdc61da544e69e7c3ee7c466badf3e89c091492", 0xc3, 0x24004010, &(0x7f0000000ec0)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x80) 18:46:19 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 18:46:19 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000d80)) sendto(0xffffffffffffffff, &(0x7f0000000dc0)="8297ccfd293af01bad9395f26acecff15384bea28799ad587a373f3f262df388d3eca829d9b65e424a6bb3d442a7d8148f4d78e1222ee16d3a502e3a54b7a23ff63b316ff279901cdfd22002007671cb1663f8c4d3d3ac44c6bccbb6acae9367147b7ca09c1fcee9c0cf3838bc3eb125446aff656a8fdab65ad2866dff1cbb5f3772dcf875c45f4a1f481eebc5bbf7df46b30b3d393c8eef4255307245350e58b905a6f3fd32c61aa869ca66a9dbeebbdc61da544e69e7c3ee7c466badf3e89c091492", 0xc3, 0x24004010, &(0x7f0000000ec0)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x80) 18:46:19 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:19 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) 18:46:19 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000d80)) sendto(0xffffffffffffffff, &(0x7f0000000dc0)="8297ccfd293af01bad9395f26acecff15384bea28799ad587a373f3f262df388d3eca829d9b65e424a6bb3d442a7d8148f4d78e1222ee16d3a502e3a54b7a23ff63b316ff279901cdfd22002007671cb1663f8c4d3d3ac44c6bccbb6acae9367147b7ca09c1fcee9c0cf3838bc3eb125446aff656a8fdab65ad2866dff1cbb5f3772dcf875c45f4a1f481eebc5bbf7df46b30b3d393c8eef4255307245350e58b905a6f3fd32c61aa869ca66a9dbeebbdc61da544e69e7c3ee7c466badf3e89c091492", 0xc3, 0x24004010, &(0x7f0000000ec0)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x80) 18:46:19 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:19 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000d80)={0xffffffffffffffff}) sendto(r0, 0x0, 0x0, 0x24004010, &(0x7f0000000ec0)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x80) 18:46:20 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) 18:46:20 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:20 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000d80)={0xffffffffffffffff}) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000ec0)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x80) 18:46:20 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:20 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:20 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000d80)={0xffffffffffffffff}) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:46:20 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:20 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:46:20 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:21 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000d80)={0xffffffffffffffff}) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:46:21 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:21 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:21 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000d80)={0xffffffffffffffff}) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:46:21 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:46:21 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:21 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) 18:46:21 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:21 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:22 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:22 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:46:22 executing program 5: unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:22 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) 18:46:22 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:22 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:22 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:22 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:46:22 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) 18:46:23 executing program 5: unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:23 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:23 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:23 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:23 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:46:23 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:23 executing program 5: unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:23 executing program 1: unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:23 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:24 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:46:24 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:24 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:24 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:46:24 executing program 0: unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:24 executing program 1: unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:24 executing program 2: unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:46:25 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) [ 2467.500752][ T3253] ieee802154 phy0 wpan0: encryption failed: -22 [ 2467.507124][ T3253] ieee802154 phy1 wpan1: encryption failed: -22 18:46:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:25 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:46:25 executing program 1: unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:25 executing program 0: unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:26 executing program 0: unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:26 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:46:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:27 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:30 executing program 2: unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:46:31 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:31 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:31 executing program 2: unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:46:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:32 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:46:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:32 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:32 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:32 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:33 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:46:33 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:33 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:33 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:33 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:46:33 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:33 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:33 executing program 4: unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:34 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:34 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:34 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:34 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:46:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:34 executing program 4: unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:34 executing program 3: unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:35 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:46:35 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:35 executing program 4: unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:35 executing program 3: unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:35 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:46:35 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:36 executing program 3: unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:36 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:46:36 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:36 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:37 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:46:37 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:37 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:37 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:46:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:38 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:38 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:46:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:38 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:39 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:46:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:39 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:39 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:39 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:46:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:40 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:40 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:46:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:40 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:41 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:41 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:41 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:46:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:41 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:41 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:46:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:41 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:42 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:42 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:46:42 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:42 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:46:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:43 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:46:43 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:44 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:46:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:44 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:46:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:45 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:46:45 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:45 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:46:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:45 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:46 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:46 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:46:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:46 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:46 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:46 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:46 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:46:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:47 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:47 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:47 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:46:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x0) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:48 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:46:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x0) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:49 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:46:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x0) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) 18:46:49 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) 18:46:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) 18:46:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:51 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, 0x0, &(0x7f00000000c0)) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:52 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:52 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, 0x0, &(0x7f00000000c0)) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, 0x0, &(0x7f00000000c0)) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:53 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:53 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, &(0x7f00000000c0)) 18:46:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), 0x0) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:54 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, 0x0, &(0x7f00000000c0)) 18:46:54 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, &(0x7f00000000c0)) 18:46:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), 0x0) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:54 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, 0x0, &(0x7f00000000c0)) 18:46:54 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, 0x0, &(0x7f00000000c0)) 18:46:54 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:46:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, &(0x7f00000000c0)) 18:46:55 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), 0x0) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:46:55 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, 0x0, &(0x7f00000000c0)) 18:46:55 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, 0x0, &(0x7f00000000c0)) 18:46:55 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, 0x0, &(0x7f00000000c0)) 18:46:55 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:46:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), 0x0) 18:46:56 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(0x0, 0x5, 0x80000000) 18:46:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, 0x0, &(0x7f00000000c0)) 18:46:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, 0x0, &(0x7f00000000c0)) 18:46:56 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), 0x0) 18:46:56 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:46:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), 0x0) 18:46:56 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(0x0, 0x5, 0x80000000) 18:46:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, 0x0, &(0x7f00000000c0)) 18:46:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), 0x0) 18:46:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:57 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), 0x0) 18:46:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), 0x0) 18:46:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(0x0, 0x5, 0x80000000) 18:46:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:57 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), 0x0) 18:46:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), 0x0) 18:46:58 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), 0x0) 18:46:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x0, 0x80000000) 18:46:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(0x0, 0x5, 0x80000000) 18:46:58 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), 0x0) 18:46:58 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), 0x0) 18:46:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x0, 0x80000000) 18:46:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(0x0, 0x5, 0x80000000) 18:46:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x0, 0x80000000) 18:46:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), 0x0) 18:46:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:46:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x0, 0x80000000) 18:46:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(0x0, 0x5, 0x80000000) 18:46:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x0, 0x80000000) 18:47:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), 0x0) 18:47:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x0) 18:47:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x0, 0x80000000) 18:47:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), 0x0) 18:47:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x0) 18:47:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:01 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x0) 18:47:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), 0x0) 18:47:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:02 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:47:02 executing program 2: unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) 18:47:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:47:02 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:47:03 executing program 2: unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) 18:47:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) 18:47:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) 18:47:03 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:47:03 executing program 2: unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) 18:47:04 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) 18:47:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) 18:47:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:47:04 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) 18:47:04 executing program 4: unshare(0x42000000) 18:47:04 executing program 1: unshare(0x42000000) 18:47:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:47:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:05 executing program 0: unshare(0x42000000) 18:47:05 executing program 4: unshare(0x0) 18:47:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:47:05 executing program 1: unshare(0x42000000) 18:47:05 executing program 4: unshare(0x0) 18:47:05 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:05 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:06 executing program 4: unshare(0x0) 18:47:06 executing program 0: unshare(0x0) 18:47:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) 18:47:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:47:06 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:06 executing program 1: unshare(0x42000000) 18:47:06 executing program 0: unshare(0x0) 18:47:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:06 executing program 0: unshare(0x0) 18:47:07 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) 18:47:07 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) 18:47:07 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:47:07 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) 18:47:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:08 executing program 5: unshare(0x42000000) 18:47:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) 18:47:08 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:08 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) 18:47:08 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:47:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:09 executing program 5: unshare(0x0) 18:47:09 executing program 5: unshare(0x0) 18:47:09 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) 18:47:09 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) 18:47:10 executing program 5: unshare(0x0) 18:47:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:10 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:10 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x42000000) 18:47:10 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:10 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) 18:47:10 executing program 3: unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:11 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x42000000) 18:47:11 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:11 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:11 executing program 3: unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:11 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) 18:47:11 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x42000000) 18:47:12 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:12 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:12 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:12 executing program 3: unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:12 executing program 4: unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:12 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x42000000) 18:47:12 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:12 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) 18:47:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:13 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:13 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x42000000) 18:47:13 executing program 4: unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:13 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:13 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) 18:47:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:14 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) unshare(0x42000000) 18:47:14 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:47:14 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) 18:47:14 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:14 executing program 4: unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:14 executing program 0: unshare(0x42000000) 18:47:14 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) unshare(0x42000000) 18:47:14 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:14 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, &(0x7f00000000c0)) 18:47:14 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) 18:47:15 executing program 4: unshare(0x10000) unshare(0x42000000) 18:47:15 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:15 executing program 0: unshare(0x42000000) 18:47:15 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) unshare(0x42000000) 18:47:15 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) 18:47:15 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, &(0x7f00000000c0)) 18:47:15 executing program 4: unshare(0x42000000) 18:47:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:16 executing program 0: unshare(0x42000000) 18:47:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x0) 18:47:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) 18:47:16 executing program 5: unshare(0x42000000) 18:47:16 executing program 4: unshare(0x0) 18:47:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x0) 18:47:16 executing program 4: unshare(0x0) 18:47:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x0) 18:47:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) 18:47:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) 18:47:17 executing program 4: unshare(0x0) 18:47:17 executing program 5: unshare(0x0) 18:47:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:17 executing program 5: unshare(0x0) 18:47:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) 18:47:17 executing program 5: unshare(0x0) 18:47:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) 18:47:17 executing program 2: unshare(0x42000000) 18:47:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:18 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:18 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) 18:47:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) 18:47:18 executing program 2: unshare(0x42000000) 18:47:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], 0x0, 0x1a}, 0x20) unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:19 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:19 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x42000000) 18:47:19 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) 18:47:19 executing program 2: unshare(0x42000000) 18:47:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], 0x0, 0x1a}, 0x20) unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:19 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], 0x0, 0x1a}, 0x20) unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:19 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x42000000) 18:47:19 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) 18:47:20 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x42000000) 18:47:20 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], 0x0, 0x1a}, 0x20) unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], 0x0, 0x1a}, 0x20) unshare(0x0) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:20 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], 0x0, 0x1a}, 0x20) unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:20 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x42000000) 18:47:20 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x42000000) 18:47:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], 0x0, 0x1a}, 0x20) unshare(0x0) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:21 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x42000000) 18:47:21 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], 0x0, 0x1a}, 0x20) unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:21 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) 18:47:21 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x42000000) 18:47:21 executing program 1: unshare(0x42000000) 18:47:21 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], 0x0, 0x1a}, 0x20) unshare(0x0) unshare(0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:21 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], 0x0, 0x1a}, 0x20) unshare(0x0) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:21 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], 0x0, 0x1a}, 0x20) unshare(0x0) unshare(0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:21 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], 0x0, 0x1a}, 0x20) unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:22 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) 18:47:22 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) unshare(0x42000000) 18:47:22 executing program 1: unshare(0x0) 18:47:22 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], 0x0, 0x1a}, 0x20) unshare(0x0) unshare(0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:22 executing program 1: unshare(0x0) 18:47:22 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], 0x0, 0x1a}, 0x20) unshare(0x0) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, &(0x7f00000000c0)) 18:47:22 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], 0x0, 0x1a}, 0x20) unshare(0x0) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:22 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], 0x0, 0x1a}, 0x20) unshare(0x10000) unshare(0x42000000) 18:47:22 executing program 1: unshare(0x0) 18:47:22 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) unshare(0x0) 18:47:22 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) 18:47:23 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) unshare(0x0) 18:47:23 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) unshare(0x0) 18:47:23 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], 0x0, 0x1a}, 0x20) unshare(0x0) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:23 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], 0x0, 0x1a}, 0x20) unshare(0x0) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, &(0x7f00000000c0)) 18:47:23 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], 0x0, 0x1a}, 0x20) unshare(0x10000) 18:47:23 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], 0x0, 0x1a}, 0x20) unshare(0x10000) unshare(0x42000000) 18:47:23 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x42000000) 18:47:23 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], 0x0, 0x1a}, 0x20) 18:47:23 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) unshare(0x42000000) 18:47:23 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], 0x0, 0x1a}, 0x20) unshare(0x0) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, &(0x7f00000000c0)) 18:47:24 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 18:47:24 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], 0x0, 0x1a}, 0x20) unshare(0x0) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, &(0x7f00000000c0)) 18:47:24 executing program 1: unshare(0x42000000) 18:47:24 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x42000000) 18:47:24 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 18:47:24 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 18:47:24 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) unshare(0x42000000) 18:47:24 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], 0x0, 0x1a}, 0x20) unshare(0x0) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), 0x0) 18:47:24 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:47:24 executing program 1: unshare(0x42000000) 18:47:24 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x42000000) 18:47:24 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:47:24 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x42000000) 18:47:25 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:47:25 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x42000000) 18:47:25 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], 0x0, 0x1a}, 0x20) unshare(0x0) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), 0x0) 18:47:25 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], 0x0, 0x1a}, 0x20) unshare(0x0) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), 0x0) 18:47:25 executing program 5: unshare(0x10000) unshare(0x42000000) 18:47:25 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x42000000) 18:47:25 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x42000000) 18:47:25 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x42000000) 18:47:25 executing program 5: unshare(0x10000) unshare(0x42000000) 18:47:25 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], 0x0, 0x1a}, 0x20) unshare(0x0) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), 0x0) 18:47:26 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], 0x0, 0x1a}, 0x20) unshare(0x0) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), 0x0) 18:47:26 executing program 1: unshare(0x10000) unshare(0x42000000) 18:47:26 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x42000000) 18:47:26 executing program 5: unshare(0x10000) unshare(0x42000000) 18:47:26 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], 0x0, 0x1a}, 0x20) unshare(0x0) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), 0x0) 18:47:26 executing program 2: unshare(0x10000) unshare(0x42000000) 18:47:26 executing program 1: unshare(0x10000) unshare(0x42000000) [ 2528.940566][ T3253] ieee802154 phy0 wpan0: encryption failed: -22 [ 2528.946930][ T3253] ieee802154 phy1 wpan1: encryption failed: -22 18:47:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x42000000) 18:47:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x42000000) 18:47:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) 18:47:27 executing program 0: unshare(0x10000) unshare(0x42000000) 18:47:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x42000000) 18:47:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], 0x0, 0x1a}, 0x20) unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) 18:47:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x42000000) 18:47:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) 18:47:28 executing program 0: unshare(0x10000) unshare(0x42000000) 18:47:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x42000000) 18:47:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) 18:47:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) 18:47:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) 18:47:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:28 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) 18:47:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0) 18:47:29 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) 18:47:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) 18:47:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) 18:47:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:29 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) 18:47:29 executing program 2: unshare(0x42000000) 18:47:29 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) 18:47:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) 18:47:30 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:30 executing program 1: unshare(0x42000000) 18:47:30 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) 18:47:30 executing program 2: unshare(0x42000000) 18:47:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) 18:47:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) 18:47:30 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, &(0x7f00000000c0)) 18:47:30 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) unshare(0x42000000) 18:47:30 executing program 1: unshare(0x42000000) 18:47:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x20) unshare(0x10000) unshare(0x42000000) 18:47:31 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) 18:47:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:47:31 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, &(0x7f00000000c0)) 18:47:31 executing program 1: unshare(0x42000000) 18:47:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x20) unshare(0x10000) unshare(0x42000000) 18:47:31 executing program 0: unshare(0x10000) unshare(0x42000000) 18:47:31 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) 18:47:32 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, &(0x7f00000000c0)) 18:47:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) 18:47:32 executing program 1: unshare(0x42000000) 18:47:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x20) unshare(0x10000) unshare(0x42000000) 18:47:32 executing program 0: unshare(0x10000) unshare(0x42000000) 18:47:32 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x20) unshare(0x10000) unshare(0x42000000) 18:47:32 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) unshare(0x42000000) 18:47:32 executing program 3: unshare(0x42000000) 18:47:44 executing program 1: unshare(0x0) 18:47:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x0) unshare(0x42000000) 18:47:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x20) unshare(0x10000) unshare(0x42000000) 18:47:44 executing program 1: unshare(0x0) 18:47:44 executing program 1: unshare(0x0) 18:47:44 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x20) unshare(0x10000) unshare(0x42000000) 18:47:47 executing program 0: unshare(0x10000) unshare(0x42000000) 18:47:47 executing program 3: unshare(0x42000000) 18:47:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) unshare(0x42000000) 18:47:51 executing program 0: unshare(0x42000000) 18:47:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) unshare(0x42000000) 18:47:51 executing program 0: unshare(0x42000000) 18:47:51 executing program 4: unshare(0x42000000) 18:47:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x0) unshare(0x42000000) 18:47:52 executing program 0: unshare(0x42000000) 18:47:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x20) unshare(0x10000) unshare(0x42000000) 18:47:52 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x20) unshare(0x10000) unshare(0x42000000) 18:47:52 executing program 4: unshare(0x42000000) 18:47:58 executing program 3: unshare(0x42000000) 18:47:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x20) unshare(0x10000) unshare(0x42000000) 18:48:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x20) unshare(0x42000000) 18:48:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:48:05 executing program 4: unshare(0x42000000) 18:48:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x0) unshare(0x42000000) 18:48:06 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:06 executing program 0: unshare(0x0) unshare(0x42000000) 18:48:06 executing program 4: unshare(0x0) 18:48:06 executing program 4: unshare(0x0) 18:48:06 executing program 4: unshare(0x0) 18:48:06 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x0) unshare(0x42000000) 18:48:10 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:10 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:10 executing program 1: unshare(0x42000000) 18:48:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:48:11 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x20) unshare(0x42000000) 18:48:15 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x0) 18:48:15 executing program 1: unshare(0x0) 18:48:15 executing program 0: unshare(0x0) unshare(0x42000000) 18:48:15 executing program 2: unshare(0x42000000) 18:48:15 executing program 3: unshare(0x42000000) 18:48:15 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x0) unshare(0x42000000) 18:48:15 executing program 1: unshare(0x0) 18:48:15 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x0) 18:48:16 executing program 1: unshare(0x0) 18:48:16 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x0) unshare(0x42000000) 18:48:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x0) unshare(0x42000000) 18:48:16 executing program 3: unshare(0x42000000) 18:48:16 executing program 0: unshare(0x0) unshare(0x42000000) 18:48:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x0) 18:48:16 executing program 1: unshare(0x0) unshare(0x42000000) 18:48:16 executing program 0: unshare(0x10000) unshare(0x0) 18:48:16 executing program 2: unshare(0x0) unshare(0x42000000) 18:48:16 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) unshare(0x42000000) 18:48:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) 18:48:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) 18:48:17 executing program 0: unshare(0x10000) unshare(0x0) 18:48:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x42000000) 18:48:17 executing program 0: unshare(0x10000) unshare(0x0) 18:48:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) 18:48:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x42000000) 18:48:17 executing program 5: unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:18 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x42000000) 18:48:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) 18:48:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x42000000) 18:48:18 executing program 5: unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:18 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x42000000) 18:48:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:19 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) 18:48:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:19 executing program 5: unshare(0x42000000) 18:48:19 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x42000000) 18:48:19 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:19 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:19 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) 18:48:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) 18:48:20 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:20 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:20 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:20 executing program 2: unshare(0x42000000) 18:48:20 executing program 0: unshare(0x42000000) 18:48:20 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:21 executing program 5: unshare(0x42000000) 18:48:21 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:48:21 executing program 4: unshare(0x42000000) 18:48:21 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) 18:48:21 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:21 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:48:21 executing program 5: unshare(0x42000000) 18:48:22 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) 18:48:22 executing program 4: unshare(0x42000000) 18:48:22 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:22 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) 18:48:22 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) 18:48:22 executing program 5: unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:22 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:48:23 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) 18:48:23 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) 18:48:23 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) 18:48:23 executing program 3: unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:23 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:48:23 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) 18:48:23 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:48:23 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:23 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x0) 18:48:24 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:24 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:24 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) 18:48:24 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:24 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:24 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x0) 18:48:24 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x0) 18:48:25 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:25 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x0, 0x80000000) 18:48:25 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), 0x0) 18:48:25 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:25 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), 0x0) 18:48:25 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), 0x0) 18:48:26 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), 0x0) 18:48:26 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:26 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), 0x0) 18:48:26 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), 0x0) 18:48:26 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), 0x0) 18:48:26 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, 0x0, &(0x7f00000000c0)) 18:48:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:27 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(0x0, 0x5, 0x80000000) 18:48:27 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), 0x0) 18:48:27 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), 0x0) 18:48:27 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:48:27 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, 0x0, &(0x7f00000000c0)) 18:48:27 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, 0x0, &(0x7f00000000c0)) 18:48:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(0x0, 0x5, 0x80000000) 18:48:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:48:28 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, 0x0, &(0x7f00000000c0)) 18:48:28 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, 0x0, &(0x7f00000000c0)) 18:48:28 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, 0x0, &(0x7f00000000c0)) [ 2590.390879][ T3253] ieee802154 phy0 wpan0: encryption failed: -22 [ 2590.397252][ T3253] ieee802154 phy1 wpan1: encryption failed: -22 18:48:28 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, 0x0, &(0x7f00000000c0)) 18:48:28 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), 0x0) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:48:28 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, &(0x7f00000000c0)) 18:48:29 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:48:29 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, 0x0, &(0x7f00000000c0)) 18:48:29 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, 0x0, &(0x7f00000000c0)) 18:48:29 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:29 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), 0x0) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:48:30 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:48:30 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, &(0x7f00000000c0)) 18:48:30 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, 0x0, &(0x7f00000000c0)) 18:48:30 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:30 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), 0x0) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:48:30 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, &(0x7f00000000c0)) 18:48:30 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:31 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, &(0x7f00000000c0)) 18:48:31 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, 0x0, &(0x7f00000000c0)) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:48:31 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:31 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:31 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:31 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:31 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, 0x0, &(0x7f00000000c0)) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:48:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:32 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:32 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, 0x0, &(0x7f00000000c0)) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:48:32 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:32 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, 0x0, &(0x7f00000000c0)) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:48:32 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:33 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:33 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) 18:48:33 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:33 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:48:33 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:33 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, 0x0, &(0x7f00000000c0)) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:48:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:34 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:34 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:34 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) 18:48:34 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:48:34 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:34 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:35 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) 18:48:35 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x0) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:35 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:48:35 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:48:35 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:36 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:48:36 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:36 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:48:36 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:48:36 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x0) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:37 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:48:37 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:48:37 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x0) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:37 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:37 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:48:37 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:37 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:48:38 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:38 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:38 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:48:38 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:38 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:39 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:39 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:48:39 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:39 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:39 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:48:40 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:40 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:48:40 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:40 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:48:40 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:40 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:41 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:48:41 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:41 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:41 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:48:41 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:41 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:42 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:42 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:42 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:48:42 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:48:42 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:42 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:42 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:43 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:48:43 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:48:43 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:43 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:43 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:43 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:44 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:48:44 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:48:44 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:44 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:44 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:44 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:45 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:48:45 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:45 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:45 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:45 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:45 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:48:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:48:46 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:46 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:46 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:46 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:46 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:48:47 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:47 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:47 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:48:47 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:47 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:48:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:48 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:48 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:48 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:48:48 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:48 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:48:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x0) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:48:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:49 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:48:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:48:49 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:50 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:50 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:50 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:50 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:48:50 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:48:50 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:51 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:48:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:51 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:51 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:48:52 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:48:52 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:52 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:52 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:48:52 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:48:52 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:48:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:53 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:48:53 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:48:53 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:48:53 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:54 executing program 3: unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:54 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:54 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:48:54 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:48:54 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:54 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:54 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], 0x0, 0x1a, 0x0, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:48:55 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:55 executing program 4: unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:55 executing program 2: unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:55 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:55 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:48:55 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:48:56 executing program 5: unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:56 executing program 0: unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:56 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:56 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:48:56 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:48:57 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:57 executing program 0: unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:57 executing program 4: unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:57 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:57 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:48:57 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:48:58 executing program 0: unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:58 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:58 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:48:58 executing program 4: unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:58 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:58 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:59 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:59 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:48:59 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:48:59 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:48:59 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:49:00 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:49:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:49:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:00 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:01 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:49:01 executing program 5: unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:49:01 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:01 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:02 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:02 executing program 5: unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:49:02 executing program 0: unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:49:02 executing program 2: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:03 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:49:03 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:03 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:49:03 executing program 5: unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:03 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:49:04 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:49:04 executing program 4: unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:04 executing program 5: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:49:04 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:49:05 executing program 2: unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:05 executing program 3: unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:05 executing program 1: unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:05 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:49:05 executing program 4: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:49:05 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:49:06 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:06 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:49:06 executing program 1: unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:06 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:07 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:49:07 executing program 4: unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:49:07 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:07 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:49:07 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:07 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:08 executing program 4: unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:49:08 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) 18:49:08 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:49:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:08 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:08 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:09 executing program 4: unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:49:09 executing program 2: unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:49:09 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) 18:49:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:09 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:49:09 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:10 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:10 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) 18:49:10 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:49:10 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:49:10 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:49:10 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:11 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:11 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:49:11 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:49:11 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:11 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:49:11 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:11 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:49:12 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:12 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:49:12 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:12 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000d80)={0xffffffffffffffff}) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:49:12 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) 18:49:12 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000d80)={0xffffffffffffffff}) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:49:12 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) 18:49:13 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:49:13 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000d80)={0xffffffffffffffff}) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:49:13 executing program 5: sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 18:49:13 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:49:13 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:13 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:13 executing program 5: sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 18:49:13 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:13 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:49:13 executing program 5: sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 18:49:14 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000d80)={0xffffffffffffffff}) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:49:14 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:49:14 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000d80)={0xffffffffffffffff}) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:49:14 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) 18:49:14 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:14 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000d80)={0xffffffffffffffff}) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:49:14 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:49:14 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:14 executing program 5: socketpair$unix(0x1, 0x5, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 18:49:15 executing program 5: socketpair$unix(0x1, 0x5, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 18:49:15 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:49:15 executing program 5: socketpair$unix(0x1, 0x5, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 18:49:15 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:15 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:49:15 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000d80)={0xffffffffffffffff}) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:49:15 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000d80)) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 18:49:15 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:49:15 executing program 3: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000d80)={0xffffffffffffffff}) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 18:49:15 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000d80)) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 18:49:16 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:16 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000d80)) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 18:49:16 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:16 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000d80)) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 18:49:16 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:49:16 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:49:16 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000d80)) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 18:49:16 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) socket$inet_sctp(0x2, 0x5, 0x84) 18:49:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:49:17 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:17 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:17 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:49:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:49:17 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:49:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:18 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:18 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:49:18 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:49:18 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:49:18 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:18 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:49:19 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:19 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:19 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:49:19 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:49:20 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x42000000) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:20 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:49:20 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) 18:49:20 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:49:20 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:49:21 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:49:21 executing program 4: unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:21 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xb0, 0x1}, 0x20) socket$inet6_mptcp(0xa, 0x1, 0x106) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000d80)={0xffffffffffffffff}) sendto(r0, &(0x7f0000000dc0)="8297ccfd293af01bad9395f26acecff15384bea28799ad587a373f3f262df388d3eca829d9b65e424a6bb3d442a7d8148f4d78e1222ee16d3a502e3a54b7a23ff63b316ff279901cdfd22002007671cb1663f8c4d3d3ac44c6bccbb6acae9367147b7ca09c1fcee9c0cf3838bc3eb125446aff656a8fdab65ad2866dff1cbb5f3772dcf875c45f4a1f481eebc5bbf7df46b30b3d393c8eef4255307245350e58b905a6f3fd32c61aa869ca66a9dbeebbdc61da544e69e7c3ee7c466badf3e89c091492", 0xc3, 0x24004010, &(0x7f0000000ec0)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x80) 18:49:21 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) syz_extract_tcp_res(&(0x7f0000000000), 0x5, 0x80000000) 18:49:21 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000280)=[@in={0x2, 0x0, @rand_addr=0x64010100}, @in6={0xa, 0x0, 0x0, @private0}], 0x2c) 18:49:21 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000040)=ANY=[@ANYRES16], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x21) unshare(0x10000) unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:21 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xb0, 0x1}, 0x20) socket$inet6_mptcp(0xa, 0x1, 0x106) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000d80)={0xffffffffffffffff}) sendto(r0, &(0x7f0000000dc0)="8297ccfd293af01bad9395f26acecff15384bea28799ad587a373f3f262df388d3eca829d9b65e424a6bb3d442a7d8148f4d78e1222ee16d3a502e3a54b7a23ff63b316ff279901cdfd22002007671cb1663f8c4d3d3ac44c6bccbb6acae9367147b7ca09c1fcee9c0cf3838bc3eb125446aff656a8fdab65ad2866dff1cbb5f3772dcf875c45f4a1f481eebc5bbf7df46b30b3d393c8eef4255307245350e58b905a6f3fd32c61aa869ca66a9dbeebbdc61da544e69e7c3ee7c466badf3e89c091492", 0xc3, 0x24004010, &(0x7f0000000ec0)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x3}}, 0x80) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[@ANYBLOB="9feb010018000000000000007900000079000000020000000000d4ccb2be337a9d1980b9a6f21e00000000000300000000010000000500000088000000090000000600000f010000000500000007000000090000000200000003000000030000000400000002000000090000000400000001010000020000000100000004000000070000000100000000000000010000006d0e000000"], &(0x7f0000000080)=""/122, 0x96, 0x7a, 0x1}, 0x20) r2 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000007c0)={&(0x7f0000000780)='./file0\x00', 0x0, 0x18}, 0x10) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000a80)={&(0x7f00000008c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@const={0xa, 0x0, 0x0, 0xa, 0x2}, @ptr={0x5, 0x0, 0x0, 0x2, 0x1}, @func={0x10, 0x0, 0x0, 0xc, 0x5}, @int={0x4, 0x0, 0x0, 0x1, 0x0, 0x42, 0x0, 0x2f, 0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x1}}, @int={0x2, 0x0, 0x0, 0x1, 0x0, 0xc, 0x0, 0x4, 0x4}, @int={0x6, 0x0, 0x0, 0x1, 0x0, 0x1f, 0x0, 0x66}, @volatile={0xb}]}, {0x0, [0x2e, 0x61, 0x0, 0x2e]}}, &(0x7f0000000980)=""/210, 0x96, 0xd2}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x18, 0x7, &(0x7f0000000800)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4}, [@call={0x85, 0x0, 0x0, 0xa3}, @map={0x18, 0x8, 0x1, 0x0, r2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}]}, &(0x7f0000000840)='syzkaller\x00', 0x0, 0x3f, &(0x7f0000000880)=""/63, 0x41100, 0x10, '\x00', 0x0, 0x0, r3, 0x8, &(0x7f0000000c80)={0x1, 0x3}, 0x8, 0x10, &(0x7f0000000cc0)={0x4, 0x8, 0x7, 0x8}, 0x10}, 0x78) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000740)={r1, 0x10, &(0x7f0000000440)={&(0x7f0000000680)=""/154, 0x9a}}, 0x10) 18:49:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt(r0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000240)="7a03f6c9d8ccf7b11d0bfebe4a43f5c73be363df691dba946365959ffd2c11cb753cf31713988714cb7c4d6b2c697501a38a0051b0393f4d76", &(0x7f0000000280)=@tcp6=r0, 0x4}, 0x20) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x54, 0x0, 0x4, 0x70bd27, 0x25dfdbfc, {}, [@L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x4c}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0xb7}, @L2TP_ATTR_UDP_CSUM={0x5}, @L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x2}, @L2TP_ATTR_IP_SADDR={0x8, 0x18, @initdev={0xac, 0x1e, 0x0, 0x0}}, @L2TP_ATTR_DEBUG={0x8}]}, 0x54}, 0x1, 0x0, 0x0, 0x4}, 0x0) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_CSUM]}, 0xfffffffffffffe61}}, 0x0) 18:49:21 executing program 4: unshare(0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:21 executing program 2: unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:22 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 18:49:22 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) socket$inet_sctp(0x2, 0x5, 0x84) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000380), r1) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan3\x00'}) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LIST_PHY(r2, &(0x7f0000000c80)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000c00)={0x14}, 0x14}}, 0x0) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r2, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {}, [@IEEE802154_ATTR_LLSEC_SECLEVELS={0x5}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x1}, @IEEE802154_ATTR_LLSEC_CMD_FRAME_ID={0x5, 0x34, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x44004}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 18:49:22 executing program 4: unshare(0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:22 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) socket$inet_sctp(0x2, 0x5, 0x84) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000380), r1) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan3\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LIST_PHY(r3, &(0x7f0000000c80)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000c00)={0x14}, 0x14}}, 0x0) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {}, [@IEEE802154_ATTR_LLSEC_SECLEVELS={0x5}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x1}, @IEEE802154_ATTR_LLSEC_CMD_FRAME_ID={0x5, 0x34, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x44004}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), r2) 18:49:22 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) socket$inet_sctp(0x2, 0x5, 0x84) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000380), r1) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan3\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LIST_PHY(r3, &(0x7f0000000c80)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000c00)={0x14}, 0x14}}, 0x0) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {}, [@IEEE802154_ATTR_LLSEC_SECLEVELS={0x5}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x1}, @IEEE802154_ATTR_LLSEC_CMD_FRAME_ID={0x5, 0x34, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x44004}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), r2) 18:49:22 executing program 4: unshare(0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:22 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) socket$inet_sctp(0x2, 0x5, 0x84) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000380), r1) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan3\x00', 0x0}) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LIST_PHY(r6, &(0x7f0000000c80)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000c00)={0x14}, 0x14}}, 0x0) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r6, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {}, [@IEEE802154_ATTR_LLSEC_SECLEVELS={0x5}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5}, @IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x1}, @IEEE802154_ATTR_LLSEC_CMD_FRAME_ID={0x5, 0x34, 0xff}]}, 0x34}, 0x1, 0x0, 0x0, 0x44004}, 0x0) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), r4) ioctl$sock_SIOCGIFINDEX_802154(r4, 0x8933, &(0x7f00000001c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_KEY(r7, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x134, r8, 0x0, 0x70bd27, 0x25dfdbfd, {}, [@NL802154_ATTR_SEC_KEY={0x7c, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x1f}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x87}, @NL802154_KEY_ATTR_USAGE_CMDS={0x24, 0x3, "5d974117705d6db643e719c14fa15e839f76807e2d30f74e455daf4ca5f14103"}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "6f5388d13f73d73e542492d9bfa2df10"}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "db2e8772239ac900c98faa0ffbbd7639"}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "45231f5cfc6168a2e32723b7f74d64f3"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x15}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r5}, @NL802154_ATTR_SEC_KEY={0x7c, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_CMDS={0x24, 0x3, "081d55243912e2709cf08330ac87b9340ed41c55ccded5cd0991e427ee40272d"}, @NL802154_KEY_ATTR_ID={0x40, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x1}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x34, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa0}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x3}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0xffff}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0102}}]}]}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "3a96a76b0c87c87b2e518a0ea02f402a"}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r9}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x134}, 0x1, 0x0, 0x0, 0x4040040}, 0x40010) sendmsg$IEEE802154_SET_MACPARAMS(r2, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x54, r3, 0x800, 0x70bd2a, 0x25dfdbff, {}, [@IEEE802154_ATTR_CCA_ED_LEVEL={0x8, 0x24, 0x4}, @IEEE802154_ATTR_CSMA_MIN_BE={0x5, 0x26, 0x3f}, @IEEE802154_ATTR_CCA_MODE={0x5, 0x23, 0x7f}, @IEEE802154_ATTR_CSMA_RETRIES={0x5, 0x25, 0x3}, @IEEE802154_ATTR_CCA_ED_LEVEL={0x8, 0x24, 0x80}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r5}, @IEEE802154_ATTR_FRAME_RETRIES={0x5, 0x28, 0x6}, @IEEE802154_ATTR_CCA_ED_LEVEL={0x8, 0x24, 0x7}]}, 0x54}}, 0x448d4) sendmsg$IEEE802154_LIST_PHY(r1, &(0x7f0000000c80)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000c00)={0x14}, 0x14}}, 0x0) 18:49:22 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) syz_extract_tcp_res(&(0x7f0000000080), 0x8, 0x401) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000001280)="e3123d9b22ea07730b1de21b2cc625d52186d6dac16b54957968999cd94ce962d9b86b060c1709dfd4f8f632caa24f52b94d6e45dbe0f32fe7a93f95254a0e2bf3796ab2a4f92f1b48b47549e9c52e044060ae667c53fa173b36c6d86bfb523f577bbeb4387d85a051a022d32e66fbb38c16caacb582e9224f", 0x79) syz_extract_tcp_res(&(0x7f00000000c0)={0x41424344, 0x41424344}, 0x569, 0x1) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) write$tun(r3, 0x0, 0x21) write$tun(r3, &(0x7f0000000100)={@void, @val={0x2, 0x1, 0x9, 0x0, 0x7fff, 0x5}, @llc={@snap={0xab, 0x1, "f2", 'bjn', 0x88e5, "38697de61840b51f69c3cc72e9ec1315d490759795fc3e48353944a9c1c2a4d5d10f98484d7440c86e4fcad4b0c66cce12ee4ed493867c982cff6ffc996b6df67b65e96c26bcc8b704a60152994121d06bdb050b"}}}, 0x66) write$tun(0xffffffffffffffff, &(0x7f00000001c0)={@val={0x0, 0x890d}, @void, @mpls={[{0x7, 0x0, 0x1}, {0x8000}, {0x2, 0x0, 0x1}, {0xfff}, {0x8}], @ipv4=@tcp={{0x12, 0x4, 0x2, 0x8, 0xa3, 0x67, 0x0, 0x6, 0x6, 0x0, @local, @multicast2, {[@ssrr={0x89, 0x1b, 0x2f, [@initdev={0xac, 0x1e, 0x1, 0x0}, @remote, @private=0xa010101, @loopback, @loopback, @local]}, @generic={0x44, 0xb, "3c0f337053a5908a52"}, @timestamp_addr={0x44, 0xc, 0x73, 0x1, 0x4, [{@dev={0xac, 0x14, 0x14, 0x1e}, 0x8}]}]}}, {{0x4e23, 0x4e21, r1, r2, 0x0, 0x0, 0xb, 0x80, 0x6, 0x0, 0x8, {[@window={0x3, 0x3, 0xf8}, @exp_smc={0xfe, 0x6}, @mptcp=@capable={0x1e, 0xc, 0xd, 0x8, 0xfe, 0x1}]}}, {"ca636f8a0c8908104624fda730031afd3f79fddb3cf5b7dfd173ec44402fe9d1199dcb9eefd55936734510b74f6d28"}}}}}, 0xbb) openat$cgroup_devices(r0, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) 18:49:22 executing program 3: getsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LIST_PHY(r0, &(0x7f0000000c80)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000c40)={&(0x7f0000000c00)={0x14}, 0x14}}, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan3\x00', 0x0}) sendmsg$IEEE802154_LLSEC_DEL_SECLEVEL(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="100026bd7000fbdbdf25310000000500350000000000050033000000000008000200", @ANYRES32=r2, @ANYBLOB="05003400ff8f2bdbaccec90000"], 0x34}, 0x1, 0x0, 0x0, 0x44004}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), r1) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f00000001c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_KEY(r3, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x134, r4, 0x0, 0x70bd27, 0x25dfdbfd, {}, [@NL802154_ATTR_SEC_KEY={0x7c, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x1f}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x87}, @NL802154_KEY_ATTR_USAGE_CMDS={0x24, 0x3, "5d974117705d6db643e719c14fa15e839f76807e2d30f74e455daf4ca5f14103"}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "6f5388d13f73d73e542492d9bfa2df10"}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "db2e8772239ac900c98faa0ffbbd7639"}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "45231f5cfc6168a2e32723b7f74d64f3"}, @NL802154_KEY_ATTR_USAGE_FRAMES={0x5, 0x2, 0x15}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r2}, @NL802154_ATTR_SEC_KEY={0x7c, 0x25, 0x0, 0x1, [@NL802154_KEY_ATTR_USAGE_CMDS={0x24, 0x3, "081d55243912e2709cf08330ac87b9340ed41c55ccded5cd0991e427ee40272d"}, @NL802154_KEY_ATTR_ID={0x40, 0x1, 0x0, 0x1, [@NL802154_KEY_ID_ATTR_SOURCE_SHORT={0x8, 0x4, 0x1}, @NL802154_KEY_ID_ATTR_IMPLICIT={0x34, 0x3, 0x0, 0x1, [@NL802154_DEV_ADDR_ATTR_SHORT={0x6, 0x3, 0xaaa0}, @NL802154_DEV_ADDR_ATTR_MODE={0x8, 0x2, 0x3}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc}, @NL802154_DEV_ADDR_ATTR_PAN_ID={0x6, 0x1, 0xffff}, @NL802154_DEV_ADDR_ATTR_EXTENDED={0xc, 0x4, {0xaaaaaaaaaaaa0102}}]}]}, @NL802154_KEY_ATTR_BYTES={0x14, 0x4, "3a96a76b0c87c87b2e518a0ea02f402a"}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r5}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x134}, 0x1, 0x0, 0x0, 0x4040000}, 0x90) sendmsg$IEEE802154_LIST_IFACE(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)={0x4c, 0x0, 0x22, 0x70bd2c, 0x25dfdbfd, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r5}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan0\x00'}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000091}, 0x40) getsockopt$CAN_RAW_JOIN_FILTERS(0xffffffffffffffff, 0x65, 0x6, &(0x7f0000000240), &(0x7f0000000280)=0x4) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340)={0x0, 0xee00, 0xee01}, 0xc) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wg1\x00'}) getsockopt$PNPIPE_INITSTATE(0xffffffffffffffff, 0x113, 0x4, &(0x7f0000000440), &(0x7f0000000480)=0x4) r6 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt(r6, 0x0, 0x0, 0x0, 0x0) sendmsg$can_raw(r6, &(0x7f0000000200)={&(0x7f0000000100), 0x10, &(0x7f00000001c0)={&(0x7f0000000140)=@canfd={{0x4, 0x1, 0x1}, 0x33, 0x0, 0x0, 0x0, "3eb02c1696307223c3e966887362d9a240b4e8fc77aedfb9ce05482c329ee5c5a8cd9fdb5d6e3277e3ec150b804274510ce083ad29d0749157214744c0692de2"}, 0x48}}, 0x2c008091) 18:49:22 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r0, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) 18:49:22 executing program 4: unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:22 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="280000000714000128bd7000fddbdf25050054000100000008004400", @ANYRES32, @ANYBLOB="0500540000000000973f3d0b5d530207b357c9f6772135119c938b3892f2ba07338eb713f5cdc0083f8c2ebccf0d413a8086c46651398f"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x40) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xfffffffffffffc5e, &(0x7f00000001c0)={&(0x7f0000000180)={0xffffffffffffff03, 0x0, 0x4, 0x70bd2b, 0x2ddfdbfd}, 0x6c}, 0x1, 0x0, 0x0, 0x2400c000}, 0x851) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LIST_PHY(r0, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24044004}, 0x44040) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r3, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r2, 0x1, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, r2, 0x100, 0x70bd2d, 0x25dfdbfe, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000080}, 0x24004080) 18:49:22 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB="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"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:49:22 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$RDMA_NLDEV_CMD_RES_GET(r0, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x18, 0x1409, 0x400, 0x70bd2c, 0x25dfdbfb, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}]}, 0x18}, 0x1, 0x0, 0x0, 0x24040011}, 0x4000804) ioctl$SIOCPNENABLEPIPE(0xffffffffffffffff, 0x89ed, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000380)={&(0x7f0000000100)={0x268, r1, 0x10, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0x10, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}]}, @TIPC_NLA_BEARER={0x110, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_PROP={0x4}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x1014, @private2, 0x3}}, {0x14, 0x2, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @local}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0xa562, @rand_addr=' \x01\x00', 0x5}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @local}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x200, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8}}}}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}]}]}, @TIPC_NLA_LINK={0x50, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}, @TIPC_NLA_NODE={0xa4, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x4c, 0x4, {'gcm(aes)\x00', 0x24, "87dec89f7b76c1d8589dda91a74db4836c2680cbc47f10698420a7281a0f11c77f0a9f8f"}}, @TIPC_NLA_NODE_KEY={0x4c, 0x4, {'gcm(aes)\x00', 0x24, "e8d1d08ae746c3e2a01bfc9762987c9066319d27fde8f6fb899a5dc0cc8431cb57bdae23"}}, @TIPC_NLA_NODE_ADDR={0x8}]}, @TIPC_NLA_PUBL={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x9}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xfff}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x8}]}, @TIPC_NLA_PUBL={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x81}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x2}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1000}]}]}, 0x268}, 0x1, 0x0, 0x0, 0x20004040}, 0x800) 18:49:22 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="9feb010018000000000000004c0000004c000000040000000e0000000000000700000000d40f00000000000903009318008f929a0cb806ae2dd480270000000000000000000803000000050000000000000e0300000001000000070000000000000202000000080000000000000c0300000000302e00"], &(0x7f0000000100)=""/66, 0x68, 0x42, 0x1}, 0x20) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x800) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1c, 0x1, 0x8, 0x8, 0x6, 0xffffffffffffffff, 0xfffffffa, '\x00', 0x0, r0, 0x0, 0x3}, 0x40) setsockopt(r1, 0x9, 0x3, &(0x7f0000000080)="72c424ef83b10182aeb22cd667", 0xd) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f00000003c0)={'wg1\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x6, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x80}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffb}, @map={0x18, 0x6, 0x1, 0x0, r2}]}, &(0x7f0000000240)='syzkaller\x00', 0x4, 0xe3, &(0x7f0000000280)=""/227, 0x40f00, 0x9, '\x00', r3, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x7, 0x1}, 0x8, 0x10, &(0x7f00000005c0)={0x5, 0x6, 0x80000000, 0xffffffff}, 0x10}, 0x78) 18:49:23 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB="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"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:49:23 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) socketpair(0x2, 0x800, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20401010}, 0xc, &(0x7f0000000380)={&(0x7f0000000680)=ANY=[@ANYBLOB="80010000", @ANYRES16=r1, @ANYBLOB="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"], 0x180}, 0x1, 0x0, 0x0, 0x20000080}, 0x20000010) ioctl$sock_bt_hidp_HIDPCONNDEL(r0, 0x400448c9, &(0x7f0000000040)={@any, 0x717}) r2 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt(r2, 0x0, 0x0, 0x0, 0x0) getsockopt$CAN_RAW_JOIN_FILTERS(r2, 0x65, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000340)={0x0, 0xee00, 0xee01}, 0xc) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000340), &(0x7f0000000400)=0x40) r4 = accept$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs, &(0x7f0000000180)=0x6e) sendto$unix(r4, &(0x7f00000001c0)="e82240a446c24069b6fc625bd2ea0d5ababf1aee4b005c02cf94df9cf3d1a4c94b35a112cdcebe440f3456fb82f9b76dadb6af60ee4c0a2243c32d6e0797fa91af31ad14477b4ceefe0956b1500dd3730fb4bed1e531cd9f4aa346165a6bfa3113792ee245dc4cf4f55d9345c350ec9e559ec0d77f5a10d41d1408dd5315d7edf205a48817ad9bfd4ca31e6a0d0caba8eee93ebb5a02b224f35cd7d75075a1ce57925bbcae8a546ecc33e80685669c3c87b267760c1d94cdf578c9", 0xbb, 0x1, 0x0, 0x0) 18:49:23 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="280000000714000128bd7000fddbdf25050054000100000008004400", @ANYRES32, @ANYBLOB="0500540000000000973f3d0b5d530207b357c9f6772135119c938b3892f2ba07338eb713f5cdc0083f8c2ebccf0d413a8086c46651398f"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x40) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xfffffffffffffc5e, &(0x7f00000001c0)={&(0x7f0000000180)={0xffffffffffffff03, 0x0, 0x4, 0x70bd2b, 0x2ddfdbfd}, 0x6c}, 0x1, 0x0, 0x0, 0x2400c000}, 0x851) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LIST_PHY(r0, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24044004}, 0x44040) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r3, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r2, 0x1, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, r2, 0x100, 0x70bd2d, 0x25dfdbfe, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000080}, 0x24004080) 18:49:23 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r0, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000016c0), &(0x7f0000001700)=0x4) socket$inet_sctp(0x2, 0x1, 0x84) ioctl$SIOCPNENABLEPIPE(0xffffffffffffffff, 0x89ed, 0x0) 18:49:23 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB="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"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) [ 2651.834849][ T3253] ieee802154 phy0 wpan0: encryption failed: -22 [ 2651.841351][ T3253] ieee802154 phy1 wpan1: encryption failed: -22 18:49:59 executing program 3: unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:59 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r0, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000016c0), &(0x7f0000001700)=0x4) socket$inet_sctp(0x2, 0x1, 0x84) ioctl$SIOCPNENABLEPIPE(0xffffffffffffffff, 0x89ed, 0x0) 18:49:59 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="280000000714000128bd7000fddbdf25050054000100000008004400", @ANYRES32, @ANYBLOB="0500540000000000973f3d0b5d530207b357c9f6772135119c938b3892f2ba07338eb713f5cdc0083f8c2ebccf0d413a8086c46651398f"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x40) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xfffffffffffffc5e, &(0x7f00000001c0)={&(0x7f0000000180)={0xffffffffffffff03, 0x0, 0x4, 0x70bd2b, 0x2ddfdbfd}, 0x6c}, 0x1, 0x0, 0x0, 0x2400c000}, 0x851) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LIST_PHY(r0, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24044004}, 0x44040) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r3, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r2, 0x1, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, r2, 0x100, 0x70bd2d, 0x25dfdbfe, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000080}, 0x24004080) 18:49:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 18:49:59 executing program 4: unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:49:59 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x30, r0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_LINK={0x18, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x30}}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0), r1) r2 = gettid() syz_open_procfs$namespace(r2, 0x0) r3 = getgid() setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={r2, 0xffffffffffffffff, r3}, 0xc) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000540)={'a', ' *:* ', 'w\x00'}, 0x8) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000440)={&(0x7f00000000c0)={0x37c, r0, 0x10, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x44, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}]}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x7}]}, @TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}]}, @TIPC_NLA_SOCK={0x10, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x40}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0x134, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x3f, 0x4, {'gcm(aes)\x00', 0x17, "1bfed3b85110f6d1590a0b1ba9eb2d50214e19f6a1c357"}}, @TIPC_NLA_NODE_KEY={0x44, 0x4, {'gcm(aes)\x00', 0x1c, "19f66bcb4382dcb9437046b7ebdb7586c79c1354914636ce8a041936"}}, @TIPC_NLA_NODE_ID={0x5, 0x3, "d4"}, @TIPC_NLA_NODE_ID={0x94, 0x3, "805bab917185ae4f43ee95df7b12e1e99039a747973e32ac7804700704eb4247e4f5d2826a915b31b37dd85dd6248038d14d46a9a2fc2a16f46f06fb5b33fdadc6ff453059186840dd826122b356d6d2c39390b8783324743128e7f450da1b3602d9818b2cec94aa75e62b1791040215f9dc3421b21aa84a99389a406cb456bb61c4efb619a105eea3f763ceed5528af"}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x170a}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}]}, @TIPC_NLA_NET={0x10, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}]}, @TIPC_NLA_MEDIA={0xa4, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5851314b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff0000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff8c5a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}]}, @TIPC_NLA_MON={0x44, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffd}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x800}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x21d75752}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffff}]}, @TIPC_NLA_MEDIA={0xc8, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xa2e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb50}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x894}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffe00}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}]}]}, 0x37c}, 0x1, 0x0, 0x0, 0x2040010}, 0x4006) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) 18:49:59 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 18:50:00 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0x10, &(0x7f0000000140)={&(0x7f00000000c0)=@canfd={{0x4, 0x1}, 0xc, 0x1, 0x0, 0x0, "bd469a5d07ec5144266a415e41523acf0e884fe319c472668f5bcc4ef0b09695c3ddd8897206e053e4cd5b2a2c06baf2219c9bd653bc2d9fe836aebfd8dbf8df"}, 0x48}, 0x1, 0x0, 0x0, 0x4004005}, 0x4) openat$cgroup_devices(r0, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) 18:50:00 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="280000000714000128bd7000fddbdf25050054000100000008004400", @ANYRES32, @ANYBLOB="0500540000000000973f3d0b5d530207b357c9f6772135119c938b3892f2ba07338eb713f5cdc0083f8c2ebccf0d413a8086c46651398f"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x40) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xfffffffffffffc5e, &(0x7f00000001c0)={&(0x7f0000000180)={0xffffffffffffff03, 0x0, 0x4, 0x70bd2b, 0x2ddfdbfd}, 0x6c}, 0x1, 0x0, 0x0, 0x2400c000}, 0x851) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LIST_PHY(r0, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24044004}, 0x44040) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 18:50:00 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x30, r0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_LINK={0x18, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x30}}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0), r1) r2 = gettid() syz_open_procfs$namespace(r2, 0x0) r3 = getgid() setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={r2, 0xffffffffffffffff, r3}, 0xc) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000540)={'a', ' *:* ', 'w\x00'}, 0x8) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000440)={&(0x7f00000000c0)={0x37c, r0, 0x10, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x44, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}]}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x7}]}, @TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}]}, @TIPC_NLA_SOCK={0x10, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x40}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0x134, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x3f, 0x4, {'gcm(aes)\x00', 0x17, "1bfed3b85110f6d1590a0b1ba9eb2d50214e19f6a1c357"}}, @TIPC_NLA_NODE_KEY={0x44, 0x4, {'gcm(aes)\x00', 0x1c, "19f66bcb4382dcb9437046b7ebdb7586c79c1354914636ce8a041936"}}, @TIPC_NLA_NODE_ID={0x5, 0x3, "d4"}, @TIPC_NLA_NODE_ID={0x94, 0x3, "805bab917185ae4f43ee95df7b12e1e99039a747973e32ac7804700704eb4247e4f5d2826a915b31b37dd85dd6248038d14d46a9a2fc2a16f46f06fb5b33fdadc6ff453059186840dd826122b356d6d2c39390b8783324743128e7f450da1b3602d9818b2cec94aa75e62b1791040215f9dc3421b21aa84a99389a406cb456bb61c4efb619a105eea3f763ceed5528af"}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x170a}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}]}, @TIPC_NLA_NET={0x10, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}]}, @TIPC_NLA_MEDIA={0xa4, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5851314b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff0000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff8c5a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}]}, @TIPC_NLA_MON={0x44, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffd}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x800}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x21d75752}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffff}]}, @TIPC_NLA_MEDIA={0xc8, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xa2e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb50}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x894}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffe00}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}]}]}, 0x37c}, 0x1, 0x0, 0x0, 0x2040010}, 0x4006) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) 18:50:00 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb0197c097be2d2fd5b1bac18d2829a1274828e3e1badd0468725e4e52ed9d36a803f2c33bf737a76d90cd0f58c49efb416e9ac93515018a1190cc0e26754cc55e13716e266e0a336ce0aba84ee65ebb690a57fba0835de26e9edd7230f75c9c60653ff052a3379e9e485c389d3aeb312ba11c29b03550d5434eaee4b4a139765bf21b2ebd5494235e2ce08ca87f89d7600bae15d5b95f6c845a4490a8435604c3f74b2ca78a52ad537fa81f5ba393b4f6226db9e80328a2e40b"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x93, 0x93, 0x8, [@datasec={0x9, 0xa, 0x0, 0xf, 0x3, [{0x2, 0x630, 0x7f}, {0x2, 0x800, 0x7}, {0x3, 0x1ff, 0x5}, {0x5, 0x10001, 0x6}, {0x1, 0x7, 0x4}, {0x3, 0x207dc67d, 0x1}, {0x2, 0x1}, {0x2, 0x1000, 0x8}, {0x4, 0x3f, 0x10000}, {0x1, 0x6}], '9N`'}, @const={0x9, 0x0, 0x0, 0xa, 0x5}]}, {0x0, [0x30, 0x5f, 0x30, 0x30, 0x0, 0x30]}}, &(0x7f0000000280)=""/223, 0xb4, 0xdf, 0x8000}, 0x20) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'team0\x00', 0x0}) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xa4, 0xa4, 0x6, [@datasec={0x7, 0x2, 0x0, 0xf, 0x1, [{0x5, 0x21c5}, {0x5, 0x94, 0x1}], "d0"}, @restrict={0xc, 0x0, 0x0, 0xb, 0x3}, @datasec={0xb, 0x1, 0x0, 0xf, 0x3, [{0x1, 0xd0e4, 0x2}], "aa0172"}, @var={0x8, 0x0, 0x0, 0xe, 0x2}, @volatile={0x7}, @union={0x1, 0x3, 0x0, 0x5, 0x1, 0x54, [{0xf, 0x4, 0xfff}, {0x3, 0x0, 0x40}, {0xb, 0x5}]}, @fwd={0xc}]}, {0x0, [0x61, 0x5f, 0x2e, 0x61]}}, &(0x7f0000000700)=""/150, 0xc2, 0x96, 0x1}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)={0x13, 0x4, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x1, '\x00', r0, r1, 0x5, 0x1, 0x2}, 0x40) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000009c0)={0x18, 0x9, &(0x7f0000000840)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, [@map={0x18, 0x4, 0x1, 0x0, r2}, @ldst={0x3, 0x3, 0x3, 0x0, 0x3, 0x18, 0xfffffffffffffff0}, @generic={0x3f, 0x3, 0x8, 0x1, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}]}, &(0x7f00000008c0)='GPL\x00', 0x9, 0x16, &(0x7f0000000900)=""/22, 0x41100, 0x15, '\x00', r0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000940)={0x9, 0x2}, 0x8, 0x10, &(0x7f0000000980)={0x0, 0x0, 0x6, 0xffff}, 0x10}, 0x78) 18:50:00 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_devices(r0, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x3) 18:50:00 executing program 4: unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:50:00 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="280000000714000128bd7000fddbdf25050054000100000008004400", @ANYRES32, @ANYBLOB="0500540000000000973f3d0b5d530207b357c9f6772135119c938b3892f2ba07338eb713f5cdc0083f8c2ebccf0d413a8086c46651398f"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x40) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xfffffffffffffc5e, &(0x7f00000001c0)={&(0x7f0000000180)={0xffffffffffffff03, 0x0, 0x4, 0x70bd2b, 0x2ddfdbfd}, 0x6c}, 0x1, 0x0, 0x0, 0x2400c000}, 0x851) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LIST_PHY(r0, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24044004}, 0x44040) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:00 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x30, r0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_LINK={0x18, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x30}}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0), r1) r2 = gettid() syz_open_procfs$namespace(r2, 0x0) r3 = getgid() setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={r2, 0xffffffffffffffff, r3}, 0xc) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000540)={'a', ' *:* ', 'w\x00'}, 0x8) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000440)={&(0x7f00000000c0)={0x37c, r0, 0x10, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x44, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}]}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x7}]}, @TIPC_NLA_MON={0x14, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}]}, @TIPC_NLA_SOCK={0x10, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x40}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0x134, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x3f, 0x4, {'gcm(aes)\x00', 0x17, "1bfed3b85110f6d1590a0b1ba9eb2d50214e19f6a1c357"}}, @TIPC_NLA_NODE_KEY={0x44, 0x4, {'gcm(aes)\x00', 0x1c, "19f66bcb4382dcb9437046b7ebdb7586c79c1354914636ce8a041936"}}, @TIPC_NLA_NODE_ID={0x5, 0x3, "d4"}, @TIPC_NLA_NODE_ID={0x94, 0x3, "805bab917185ae4f43ee95df7b12e1e99039a747973e32ac7804700704eb4247e4f5d2826a915b31b37dd85dd6248038d14d46a9a2fc2a16f46f06fb5b33fdadc6ff453059186840dd826122b356d6d2c39390b8783324743128e7f450da1b3602d9818b2cec94aa75e62b1791040215f9dc3421b21aa84a99389a406cb456bb61c4efb619a105eea3f763ceed5528af"}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x170a}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}]}, @TIPC_NLA_NET={0x10, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}]}, @TIPC_NLA_MEDIA={0xa4, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5851314b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff0000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff8c5a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}]}, @TIPC_NLA_MON={0x44, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffd}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x800}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x21d75752}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffff}]}, @TIPC_NLA_MEDIA={0xc8, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xa2e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb50}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x894}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffe00}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}]}]}, 0x37c}, 0x1, 0x0, 0x0, 0x2040010}, 0x4006) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) 18:50:00 executing program 5: unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:50:00 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="280000000714000128bd7000fddbdf25050054000100000008004400", @ANYRES32, @ANYBLOB="0500540000000000973f3d0b5d530207b357c9f6772135119c938b3892f2ba07338eb713f5cdc0083f8c2ebccf0d413a8086c46651398f"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x40) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xfffffffffffffc5e, &(0x7f00000001c0)={&(0x7f0000000180)={0xffffffffffffff03, 0x0, 0x4, 0x70bd2b, 0x2ddfdbfd}, 0x6c}, 0x1, 0x0, 0x0, 0x2400c000}, 0x851) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LIST_PHY(r0, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24044004}, 0x44040) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:00 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x30, r0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_LINK={0x18, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x30}}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0), r1) r2 = gettid() syz_open_procfs$namespace(r2, 0x0) r3 = getgid() setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={r2, 0xffffffffffffffff, r3}, 0xc) write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000540)={'a', ' *:* ', 'w\x00'}, 0x8) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) 18:50:00 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_devices(r0, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x1, &(0x7f0000000080), &(0x7f00000000c0)=0x3) 18:50:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:01 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="280000000714000128bd7000fddbdf25050054000100000008004400", @ANYRES32, @ANYBLOB="0500540000000000973f3d0b5d530207b357c9f6772135119c938b3892f2ba07338eb713f5cdc0083f8c2ebccf0d413a8086c46651398f"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x40) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xfffffffffffffc5e, &(0x7f00000001c0)={&(0x7f0000000180)={0xffffffffffffff03, 0x0, 0x4, 0x70bd2b, 0x2ddfdbfd}, 0x6c}, 0x1, 0x0, 0x0, 0x2400c000}, 0x851) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LIST_PHY(r0, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24044004}, 0x44040) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:01 executing program 4: unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:50:01 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x30, r0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_LINK={0x18, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x30}}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0), r1) r2 = gettid() syz_open_procfs$namespace(r2, 0x0) r3 = getgid() setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={r2, 0xffffffffffffffff, r3}, 0xc) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) 18:50:01 executing program 3: unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:50:01 executing program 5: unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:50:01 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="280000000714000128bd7000fddbdf25050054000100000008004400", @ANYRES32, @ANYBLOB="0500540000000000973f3d0b5d530207b357c9f6772135119c938b3892f2ba07338eb713f5cdc0083f8c2ebccf0d413a8086c46651398f"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x40) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xfffffffffffffc5e, &(0x7f00000001c0)={&(0x7f0000000180)={0xffffffffffffff03, 0x0, 0x4, 0x70bd2b, 0x2ddfdbfd}, 0x6c}, 0x1, 0x0, 0x0, 0x2400c000}, 0x851) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LIST_PHY(r0, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24044004}, 0x44040) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:01 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x30, r0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_LINK={0x18, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x30}}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0), r1) r2 = gettid() syz_open_procfs$namespace(r2, 0x0) getgid() mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) 18:50:01 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="280000000714000128bd7000fddbdf25050054000100000008004400", @ANYRES32, @ANYBLOB="0500540000000000973f3d0b5d530207b357c9f6772135119c938b3892f2ba07338eb713f5cdc0083f8c2ebccf0d413a8086c46651398f"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x40) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xfffffffffffffc5e, &(0x7f00000001c0)={&(0x7f0000000180)={0xffffffffffffff03, 0x0, 0x4, 0x70bd2b, 0x2ddfdbfd}, 0x6c}, 0x1, 0x0, 0x0, 0x2400c000}, 0x851) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LIST_PHY(r0, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24044004}, 0x44040) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:01 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x30, r0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_LINK={0x18, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x30}}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0), r1) r2 = gettid() syz_open_procfs$namespace(r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) 18:50:01 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="280000000714000128bd7000fddbdf25050054000100000008004400", @ANYRES32, @ANYBLOB="0500540000000000973f3d0b5d530207b357c9f6772135119c938b3892f2ba07338eb713f5cdc0083f8c2ebccf0d413a8086c46651398f"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x40) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xfffffffffffffc5e, &(0x7f00000001c0)={&(0x7f0000000180)={0xffffffffffffff03, 0x0, 0x4, 0x70bd2b, 0x2ddfdbfd}, 0x6c}, 0x1, 0x0, 0x0, 0x2400c000}, 0x851) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LIST_PHY(r0, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24044004}, 0x44040) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:01 executing program 4: unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:50:01 executing program 3: unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:50:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:01 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x30, r0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_LINK={0x18, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x30}}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0), r1) r2 = gettid() syz_open_procfs$namespace(r2, 0x0) getgid() mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) 18:50:02 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x30, r0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_LINK={0x18, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x30}}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0), r1) gettid() mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) 18:50:02 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="280000000714000128bd7000fddbdf25050054000100000008004400", @ANYRES32, @ANYBLOB="0500540000000000973f3d0b5d530207b357c9f6772135119c938b3892f2ba07338eb713f5cdc0083f8c2ebccf0d413a8086c46651398f"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x40) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xfffffffffffffc5e, &(0x7f00000001c0)={&(0x7f0000000180)={0xffffffffffffff03, 0x0, 0x4, 0x70bd2b, 0x2ddfdbfd}, 0x6c}, 0x1, 0x0, 0x0, 0x2400c000}, 0x851) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:02 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="280000000714000128bd7000fddbdf25050054000100000008004400", @ANYRES32, @ANYBLOB="0500540000000000973f3d0b5d530207b357c9f6772135119c938b3892f2ba07338eb713f5cdc0083f8c2ebccf0d413a8086c46651398f"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x40) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xfffffffffffffc5e, &(0x7f00000001c0)={&(0x7f0000000180)={0xffffffffffffff03, 0x0, 0x4, 0x70bd2b, 0x2ddfdbfd}, 0x6c}, 0x1, 0x0, 0x0, 0x2400c000}, 0x851) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LIST_PHY(r0, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, 0x0, 0x20, 0x70bd25, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x24044004}, 0x44040) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:02 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x30, r0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_LINK={0x18, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x30}}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0), r1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) 18:50:02 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="280000000714000128bd7000fddbdf25050054000100000008004400", @ANYRES32, @ANYBLOB="0500540000000000973f3d0b5d530207b357c9f6772135119c938b3892f2ba07338eb713f5cdc0083f8c2ebccf0d413a8086c46651398f"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x40) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(r0, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xfffffffffffffc5e, &(0x7f00000001c0)={&(0x7f0000000180)={0xffffffffffffff03, 0x0, 0x4, 0x70bd2b, 0x2ddfdbfd}, 0x6c}, 0x1, 0x0, 0x0, 0x2400c000}, 0x851) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:02 executing program 4: unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:50:02 executing program 5: unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000000), 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:50:02 executing program 3: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x30, r0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_LINK={0x18, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x30}}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0), r1) r2 = gettid() syz_open_procfs$namespace(r2, 0x0) r3 = getgid() setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000500)={r2, 0xffffffffffffffff, r3}, 0xc) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) 18:50:02 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000000), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x30, r0, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_MON={0x4}, @TIPC_NLA_LINK={0x18, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}]}, 0x30}}, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) 18:50:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:02 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="280000000714000128bd7000fddbdf25050054000100000008004400", @ANYRES32, @ANYBLOB="0500540000000000973f3d0b5d530207b357c9f6772135119c938b3892f2ba07338eb713f5cdc0083f8c2ebccf0d413a8086c46651398f"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x40) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:03 executing program 3: getpid() r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000007c0)={0x1c, 0x1407, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x1c}}, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x5c, 0x1402, 0x1, 0x70bd29, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x40800) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r2, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) 18:50:03 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) 18:50:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb01970200000088f4174c276bdd48658e9f7cb04fee52fb52c60af3dade8ce1ec86c4d72a34d5aa3f0b9ac2e681f60e77df9033d426778089f95cc180589d551567e3d7141bdfa69b11babf29f26bee61b61690c83ea6a34875e1ca430c0a700dcb61f67a773ac2dc52acf60ba2c3d6b11e20105e0ca65dbeab9ec9d1e8e8c77debb351d561441a7281472155ba0cbeef33bb3ad710f5fa1d679e1dd2f24e956bcfac0b42759fc004"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:03 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="280000000714000128bd7000fddbdf25050054000100000008004400", @ANYRES32, @ANYBLOB="0500540000000000973f3d0b5d530207b357c9f6772135119c938b3892f2ba07338eb713f5cdc0083f8c2ebccf0d413a8086c46651398f"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x40) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:03 executing program 4: unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:50:03 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000), 0xffffffffffffffff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) 18:50:03 executing program 3: getpid() r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000007c0)={0x1c, 0x1407, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x1c}}, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x5c, 0x1402, 0x1, 0x70bd29, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x40800) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r2, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) 18:50:03 executing program 5: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) 18:50:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:03 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="280000000714000128bd7000fddbdf25050054000100000008004400", @ANYRES32, @ANYBLOB="0500540000000000973f3d0b5d530207b357c9f6772135119c938b3892f2ba07338eb713f5cdc0083f8c2ebccf0d413a8086c46651398f"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x40) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:03 executing program 3: getpid() r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000007c0)={0x1c, 0x1407, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x1c}}, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x5c, 0x1402, 0x1, 0x70bd29, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x40800) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r2, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) 18:50:03 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) 18:50:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:03 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="280000000714000128bd7000fddbdf25050054000100000008004400", @ANYRES32, @ANYBLOB="0500540000000000973f3d0b5d530207b357c9f6772135119c938b3892f2ba07338eb713f5cdc0083f8c2ebccf0d413a8086c46651398f"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x40) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:03 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, 0x0, 0x4, 0x70bd25, 0x25dfdbfb, {}, [@WGDEVICE_A_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0xc0c0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0x6, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x3, {}, [@L2TP_ATTR_SEND_SEQ={0x0, 0x13, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40010}, 0x0) 18:50:03 executing program 4: unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:50:03 executing program 3: getpid() r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000007c0)={0x1c, 0x1407, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x1c}}, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x5c, 0x1402, 0x1, 0x70bd29, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x40800) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) 18:50:03 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) 18:50:03 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="280000000714000128bd7000fddbdf25050054000100000008004400", @ANYRES32, @ANYBLOB="0500540000000000973f3d0b5d530207b357c9f6772135119c938b3892f2ba07338eb713f5cdc0083f8c2ebccf0d413a8086c46651398f"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x40) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:03 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:03 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, 0x0, 0x4, 0x70bd25, 0x25dfdbfb, {}, [@WGDEVICE_A_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0xc0c0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0x6, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x3, {}, [@L2TP_ATTR_SEND_SEQ={0x0, 0x13, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40010}, 0x0) 18:50:04 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) 18:50:04 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_GET_DEVICE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, 0x0, 0x4, 0x70bd25, 0x25dfdbfb, {}, [@WGDEVICE_A_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0xc0c0) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0x6, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x3, {}, [@L2TP_ATTR_SEND_SEQ={0x0, 0x13, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40010}, 0x0) 18:50:04 executing program 3: getpid() r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000007c0)={0x1c, 0x1407, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x1c}}, 0x0) r1 = syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/pid\x00') sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x5c, 0x1402, 0x1, 0x70bd29, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8, 0x44, r1}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x40800) 18:50:04 executing program 2: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb01970200000088f4174c276bdd48658e9f7cb04fee52fb52c60af3dade8ce1ec86c4d72a34d5aa3f0b9ac2e681f60e77df9033d426778089f95cc180589d551567e3d7141bdfa69b11babf29f26bee61b61690"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:04 executing program 4: unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:50:04 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) 18:50:04 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0x6, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x3, {}, [@L2TP_ATTR_SEND_SEQ={0x0, 0x13, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40010}, 0x0) 18:50:04 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:04 executing program 3: getpid() r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000007c0)={0x1c, 0x1407, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x1c}}, 0x0) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x5c, 0x1402, 0x1, 0x70bd29, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x40800) 18:50:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:04 executing program 3: getpid() r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x5c, 0x1402, 0x1, 0x70bd29, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x40800) 18:50:04 executing program 5: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0x6, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x3, {}, [@L2TP_ATTR_SEND_SEQ={0x0, 0x13, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40010}, 0x0) 18:50:04 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) 18:50:04 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:04 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(0x0, r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:04 executing program 3: getpid() sendmsg$RDMA_NLDEV_CMD_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x5c, 0x1402, 0x1, 0x70bd29, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x40800) 18:50:04 executing program 4: unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, 0x0, &(0x7f00000000c0)) 18:50:04 executing program 5: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0x6, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x3, {}, [@L2TP_ATTR_SEND_SEQ={0x0, 0x13, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40010}, 0x0) 18:50:05 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(0x0, r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:05 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) 18:50:05 executing program 3: getpid() sendmsg$RDMA_NLDEV_CMD_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x5c, 0x1402, 0x1, 0x70bd29, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x40800) 18:50:05 executing program 5: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0x6, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x3, {}, [@L2TP_ATTR_SEND_SEQ={0x0, 0x13, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40010}, 0x0) 18:50:05 executing program 0: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) 18:50:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb01970200000088f4174c276bdd48658e9f7cb04fee52fb52c60af3dade8ce1ec86c4d72a34d5aa3f0b"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:05 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(0x0, r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:05 executing program 3: getpid() sendmsg$RDMA_NLDEV_CMD_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x5c, 0x1402, 0x1, 0x70bd29, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x40800) 18:50:05 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0x6, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x3, {}, [@L2TP_ATTR_SEND_SEQ={0x0, 0x13, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40010}, 0x0) 18:50:05 executing program 4: unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, 0x0, &(0x7f00000000c0)) 18:50:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB="9f"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:05 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) 18:50:05 executing program 2: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:05 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x5c, 0x1402, 0x1, 0x70bd29, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x40800) 18:50:05 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0x6, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x3, {}, [@L2TP_ATTR_SEND_SEQ={0x0, 0x13, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40010}, 0x0) 18:50:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB="9f"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:05 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) 18:50:05 executing program 2: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:05 executing program 3: socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x5c, 0x1402, 0x1, 0x70bd29, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x40800) 18:50:06 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0x6, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x3, {}, [@L2TP_ATTR_SEND_SEQ={0x0, 0x13, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40010}, 0x0) 18:50:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB="9f"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:06 executing program 4: unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, 0x0, &(0x7f00000000c0)) 18:50:06 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) 18:50:06 executing program 2: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:06 executing program 3: socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x5c, 0x1402, 0x1, 0x70bd29, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x40800) 18:50:06 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, 0x0, 0x0) 18:50:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb01970200000088f4174c276bdd48658e9f7cb04f"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:06 executing program 0: unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, 0x0, &(0x7f00000000c0)) 18:50:06 executing program 3: socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x5c, 0x1402, 0x1, 0x70bd29, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x40800) 18:50:06 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:06 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, 0x0, 0x0) 18:50:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB="9f"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:06 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, 0x0, 0x40800) 18:50:06 executing program 4: unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), 0x0) 18:50:06 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:06 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, 0x0, 0x0) 18:50:06 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB="9f"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:06 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, 0x0, 0x40800) 18:50:07 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:07 executing program 0: unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, 0x0, &(0x7f00000000c0)) 18:50:07 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x3, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40010}, 0x0) 18:50:07 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, 0x0, 0x40800) 18:50:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB="9f"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:07 executing program 4: unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), 0x0) 18:50:07 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, 0x0, 0x6) 18:50:07 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x3, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40010}, 0x0) 18:50:07 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x5c, 0x1402, 0x1, 0x70bd29, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x40800) 18:50:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb01970200000088f4174c"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:07 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x3, {}, [@L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40010}, 0x0) 18:50:07 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, 0x0, 0x6) 18:50:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:07 executing program 0: unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), 0x0) 18:50:07 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x40800) 18:50:07 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x0) 18:50:07 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:08 executing program 4: unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), 0x0) 18:50:08 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x40800) 18:50:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:08 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x0) 18:50:08 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, 0x0, 0x6) 18:50:08 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb0197020000"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:08 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x40800) 18:50:08 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0, 0x1, 0x0, 0x0, 0x40010}, 0x0) 18:50:09 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x40800) 18:50:09 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:09 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x40010}, 0x0) 18:50:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:09 executing program 0: unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), 0x0) 18:50:09 executing program 4: unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), 0x0) 18:50:09 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x40010}, 0x0) 18:50:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:09 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:09 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x40800) 18:50:09 executing program 4: unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), 0x0) 18:50:09 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:09 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={0x0}, 0x1, 0x0, 0x0, 0x40010}, 0x0) 18:50:10 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb019702"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:10 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x40800) 18:50:10 executing program 0: unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, 0x0, &(0x7f00000000c0)) 18:50:10 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:10 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb01"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:10 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0x6, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ={0x0, 0x13, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40010}, 0x0) 18:50:10 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:10 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x40010}, 0x0) 18:50:10 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb01"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:11 executing program 4: unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000080), 0x0) 18:50:11 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x5c, 0x1402, 0x0, 0x70bd29, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x40800) 18:50:11 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:11 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x5c, 0x1402, 0x0, 0x70bd29, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x40800) 18:50:11 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:11 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:11 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb01"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:11 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x40010}, 0x0) 18:50:11 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x5c, 0x1402, 0x0, 0x70bd29, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x40800) 18:50:11 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:11 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:12 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x5c, 0x1402, 0x1, 0x0, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x40800) 18:50:12 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x40010}, 0x0) 18:50:12 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:12 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb0197"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:12 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0x6, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ]}, 0x1c}, 0x1, 0x0, 0x0, 0x40010}, 0x0) 18:50:12 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x5c, 0x1402, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x5c}, 0x1, 0x0, 0x0, 0x80}, 0x40800) 18:50:12 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:12 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:12 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0x6, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_SEND_SEQ]}, 0x1c}}, 0x0) 18:50:12 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:12 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, 0x0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:12 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb0197"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:12 executing program 5: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:12 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x50, 0x1402, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x80}, 0x40800) 18:50:12 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) 18:50:13 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x0, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:13 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) 18:50:13 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb0197"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:13 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x0, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:13 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x48, 0x1402, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}]}, 0x48}, 0x1, 0x0, 0x0, 0x80}, 0x40800) 18:50:13 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb019702"], 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:13 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x0, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:13 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x0, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:13 executing program 0: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:13 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb019702"], 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:13 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:14 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x40, 0x1402, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x40}, 0x1, 0x0, 0x0, 0x80}, 0x40800) 18:50:14 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x0, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:14 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:14 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb019702"], 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:14 executing program 0: unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, 0x0, &(0x7f00000000c0)) 18:50:14 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(0x0, r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:14 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x38, 0x1402, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5}]}, 0x38}, 0x1, 0x0, 0x0, 0x80}, 0x40800) 18:50:14 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb019702"], &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x20) 18:50:14 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(0x0, r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:14 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb019702"], &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x20) 18:50:14 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:14 executing program 5: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x1ff) 18:50:14 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x30, 0x1402, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_DIM={0x5, 0x54, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x80}, 0x40800) 18:50:14 executing program 4: unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:50:15 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb019702"], &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x20) 18:50:15 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:15 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:15 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:15 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:15 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:15 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x28, 0x1402, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x40800) 18:50:15 executing program 5: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) sendmsg$RDMA_NLDEV_CMD_SYS_SET(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="280000000714000128bd7000fddbdf25050054000100000008004400", @ANYRES32, @ANYBLOB="0500540000000000973f3d0b5d530207b357c9f6772135119c938b3892f2ba07338eb713f5cdc0083f8c2ebccf0d413a8086c46651398f"], 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x40) socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r0, 0x1, 0x70bd2d, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:15 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:15 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:15 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:16 executing program 4: unshare(0x42000000) r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 18:50:16 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'wlan1\x00'}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x44050}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340)={0x0, 0xee00, 0xee01}, 0xc) getsockopt$bt_hci(r1, 0x0, 0x2, &(0x7f0000000100)=""/239, &(0x7f0000000200)=0xef) 18:50:16 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x20, 0x1402, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}, @RDMA_NLDEV_NET_NS_FD={0x8}]}, 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x40800) 18:50:16 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:16 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:16 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:16 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000000c0)=@req={0x28, &(0x7f0000000080)={'veth0_virt_wifi\x00', @ifru_map}}) openat$cgroup_devices(r0, &(0x7f0000000040)='devices.deny\x00', 0x2, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x4, 0x4, 0x6, 0xfe, 0x10, 0x1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x2, 0x2}, 0x40) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000440)={0x0, 0x0}, 0x8) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000300)=@raw=[@alu], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r2}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x17, 0x8, &(0x7f0000000140)=@raw=[@exit, @initr0={0x18, 0x0, 0x0, 0x0, 0xfffffc79, 0x0, 0x0, 0x0, 0x9}, @exit, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @call={0x85, 0x0, 0x0, 0x86}, @map_val={0x18, 0x5, 0x2, 0x0, r1, 0x0, 0x0, 0x0, 0x5}], &(0x7f0000000180)='syzkaller\x00', 0xa1c, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, 0x5, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000200)={0x2, 0xb, 0x8, 0x3ff}, 0x10, r2}, 0x78) 18:50:16 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x18, 0x1402, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}]}, 0x18}, 0x1, 0x0, 0x0, 0x80}, 0x40800) 18:50:16 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:16 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:16 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:16 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1000000, 0xcf, 0x1}, 0x20) 18:50:16 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x5}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e21, 0x15c, @empty, 0x6}], 0xe8) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f00000001c0)='devices.allow\x00', 0x2, 0x0) openat$cgroup_devices(r1, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) 18:50:16 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x0, 0x80}, 0x40800) 18:50:16 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:16 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:16 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:16 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x0, 0x80}, 0x40800) 18:50:16 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:17 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x5}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e21, 0x15c, @empty, 0x6}], 0xe8) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f00000001c0)='devices.allow\x00', 0x2, 0x0) openat$cgroup_devices(r1, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) 18:50:17 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:17 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:17 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x0, 0x80}, 0x40800) 18:50:17 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1000000, 0xcf, 0x1}, 0x20) 18:50:17 executing program 0: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, 0x0, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:17 executing program 1: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, 0x0, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:17 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:17 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x5}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e21, 0x15c, @empty, 0x6}], 0xe8) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f00000001c0)='devices.allow\x00', 0x2, 0x0) openat$cgroup_devices(r1, &(0x7f0000000080)='devices.deny\x00', 0x2, 0x0) 18:50:17 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x18, 0x1402, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x18}, 0x1, 0x0, 0x0, 0x80}, 0x40800) 18:50:17 executing program 0: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, 0x0, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:17 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x5}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e21, 0x15c, @empty, 0x6}], 0xe8) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f00000001c0)='devices.allow\x00', 0x2, 0x0) 18:50:17 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x18, 0x1402, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x18}}, 0x40800) 18:50:17 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:17 executing program 1: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, 0x0, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:18 executing program 0: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, 0x0, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:18 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x5}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e21, 0x15c, @empty, 0x6}], 0xe8) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f00000001c0)='devices.allow\x00', 0x2, 0x0) 18:50:18 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x5}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e21, 0x15c, @empty, 0x6}], 0xe8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) 18:50:18 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1}, 0x14}}, 0x6) 18:50:18 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x18, 0x1402, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8}]}, 0x18}}, 0x0) 18:50:18 executing program 1: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, 0x0, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:18 executing program 0: r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r0, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:18 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 18:50:18 executing program 0: r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r0, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:18 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:18 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x5}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e21, 0x15c, @empty, 0x6}], 0xe8) 18:50:18 executing program 1: r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r0, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:18 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x5}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e21, 0x15c, @empty, 0x6}], 0xe8) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f00000001c0)='devices.allow\x00', 0x2, 0x0) 18:50:18 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:18 executing program 0: r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r0, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:18 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:18 executing program 1: r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r0, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:18 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x5}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e21, 0x15c, @empty, 0x6}], 0xe8) 18:50:18 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x5}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e21, 0x15c, @empty, 0x6}], 0xe8) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_devices(r1, &(0x7f00000001c0)='devices.allow\x00', 0x2, 0x0) 18:50:19 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:19 executing program 1: r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r0, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:19 executing program 4: setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x5}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e21, 0x15c, @empty, 0x6}], 0xe8) 18:50:19 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x0, 0x80}, 0x40800) 18:50:19 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x5}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e21, 0x15c, @empty, 0x6}], 0xe8) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) 18:50:19 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(0x0, r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:19 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x0, 0x80}, 0x40800) 18:50:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x8}, 0x20) 18:50:19 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(0x0, r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:19 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(0x0, r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:19 executing program 4: setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x5}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e21, 0x15c, @empty, 0x6}], 0xe8) 18:50:19 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000), 0x4) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x5}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e21, 0x15c, @empty, 0x6}], 0xe8) [ 2701.549762][T26170] BPF:btf_header not found 18:50:19 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x0, 0x80}, 0x40800) 18:50:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x8}, 0x20) 18:50:19 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(0x0, r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:19 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(0x0, r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:19 executing program 4: setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x5}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e21, 0x15c, @empty, 0x6}], 0xe8) 18:50:19 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x5}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e21, 0x15c, @empty, 0x6}], 0xe8) [ 2701.808345][T26187] BPF:btf_header not found 18:50:19 executing program 2: sendmsg$RDMA_NLDEV_CMD_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x0, 0x80}, 0x40800) 18:50:19 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(0x0, r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:19 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x8}, 0x20) 18:50:19 executing program 4: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x5}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e21, 0x15c, @empty, 0x6}], 0xe8) 18:50:19 executing program 5: setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x5}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e21, 0x15c, @empty, 0x6}], 0xe8) 18:50:19 executing program 0: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r0, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:20 executing program 2: sendmsg$RDMA_NLDEV_CMD_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x0, 0x80}, 0x40800) [ 2702.098800][T26203] BPF:btf_header not found 18:50:20 executing program 1: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r0, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:20 executing program 5: setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x5}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e21, 0x15c, @empty, 0x6}], 0xe8) 18:50:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 18:50:20 executing program 0: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r0, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:20 executing program 4: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x5}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e21, 0x15c, @empty, 0x6}], 0xe8) 18:50:20 executing program 2: sendmsg$RDMA_NLDEV_CMD_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x0, 0x80}, 0x40800) 18:50:20 executing program 1: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r0, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:20 executing program 5: setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x5}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e21, 0x15c, @empty, 0x6}], 0xe8) 18:50:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 18:50:20 executing program 0: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r0, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:20 executing program 1: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r0, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:20 executing program 4: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x5}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e21, 0x15c, @empty, 0x6}], 0xe8) 18:50:20 executing program 2: socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x0, 0x80}, 0x40800) 18:50:20 executing program 5: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x5}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e21, 0x15c, @empty, 0x6}], 0xe8) 18:50:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 18:50:20 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:20 executing program 2: socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x0, 0x80}, 0x40800) 18:50:20 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x8}, 0x20) 18:50:20 executing program 4: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x5}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e21, 0x15c, @empty, 0x6}], 0xe8) 18:50:21 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:21 executing program 5: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x5}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e21, 0x15c, @empty, 0x6}], 0xe8) 18:50:21 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:21 executing program 2: socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x1402, 0x1}, 0x10}, 0x1, 0x0, 0x0, 0x80}, 0x40800) 18:50:21 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x8}, 0x20) 18:50:21 executing program 4: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x5}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e21, 0x15c, @empty, 0x6}], 0xe8) 18:50:21 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:21 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:21 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, 0x0, 0x40800) 18:50:21 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x8}, 0x20) 18:50:21 executing program 5: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x5}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e21, 0x15c, @empty, 0x6}], 0xe8) 18:50:21 executing program 4: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x5}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e21, 0x15c, @empty, 0x6}], 0xe8) 18:50:21 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, 0x0, 0x6) 18:50:21 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, 0x0, 0x6) 18:50:21 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, 0x0, 0x40800) 18:50:21 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x8}, 0x20) 18:50:21 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:50:21 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, 0x0, 0x6) 18:50:21 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, 0x0, 0x6) 18:50:21 executing program 5: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x5}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e21, 0x15c, @empty, 0x6}], 0xe8) [ 2703.863615][T26301] BPF:Invalid magic 18:50:21 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, 0x0, 0x40800) 18:50:21 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[], 0x0, 0x1a, 0x0, 0x8}, 0x20) 18:50:21 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:50:22 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, 0x0, 0x6) 18:50:22 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, 0x0, 0x6) 18:50:22 executing program 5: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x5}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e21, 0x15c, @empty, 0x6}], 0xe8) 18:50:22 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[], 0x0, 0x1a, 0x0, 0x8}, 0x20) 18:50:22 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x40800) 18:50:22 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:50:22 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:22 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:22 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[], 0x0, 0x1a, 0x0, 0x8}, 0x20) 18:50:22 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x40800) 18:50:22 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x5}, @in={0x2, 0x4e22, @empty}], 0xcc) 18:50:22 executing program 5: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x5}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e21, 0x15c, @empty, 0x6}], 0xe8) 18:50:22 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:22 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x80}, 0x40800) 18:50:22 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x20) 18:50:22 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:22 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x5}], 0xbc) 18:50:22 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:50:22 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:22 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x40800) 18:50:22 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:22 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x20) 18:50:22 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:50:22 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}], 0xa0) 18:50:22 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:23 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x40800) 18:50:23 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:50:23 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:23 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x20) 18:50:23 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}], 0x90) 18:50:23 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:23 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x5}, @in={0x2, 0x4e22, @empty}], 0xcc) 18:50:23 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x40800) 18:50:23 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:23 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:23 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:23 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}], 0x74) 18:50:23 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x10}, 0x10}, 0x1, 0x0, 0x0, 0x80}, 0x40800) 18:50:23 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x5}], 0xbc) 18:50:23 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, 0x0, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:23 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:23 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:23 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}], 0x58) 18:50:23 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}], 0xa0) 18:50:23 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x10}, 0x10}, 0x1, 0x0, 0x0, 0x80}, 0x40800) 18:50:23 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, 0x0, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:23 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, 0x0, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:23 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x5}, @in={0x2, 0x4e22, @empty}], 0xcc) 18:50:23 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}], 0x3c) 18:50:23 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}], 0x90) 18:50:23 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x10}, 0x10}, 0x1, 0x0, 0x0, 0x80}, 0x40800) 18:50:24 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, 0x0, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:24 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, 0x0, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:24 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}], 0x74) 18:50:24 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}], 0x20) 18:50:24 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x5}, @in={0x2, 0x4e22, @empty}], 0xcc) 18:50:24 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x1402, 0x1}, 0x10}}, 0x40800) 18:50:24 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, 0x0, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:24 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x0, 0x0, 0x0, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:24 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}], 0x58) 18:50:24 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x10) 18:50:24 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x5}, @in={0x2, 0x4e22, @empty}], 0xcc) 18:50:24 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x1402, 0x1}, 0x10}}, 0x0) 18:50:24 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x0, 0x0, 0x0, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:24 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}], 0x3c) 18:50:24 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x0, 0x0, 0x0, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:24 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x0, 0x0, 0x0, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:24 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x0, 0x0, 0x0, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:24 executing program 3: setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x5}, @in={0x2, 0x4e22, @empty}], 0xcc) 18:50:24 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x0, 0x0, 0x0, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:24 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}], 0x20) 18:50:25 executing program 3: setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x5}, @in={0x2, 0x4e22, @empty}], 0xcc) 18:50:25 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x10) 18:50:25 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x0, 0x0, 0x0, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:25 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x0, 0x0, 0x0, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:25 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:25 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x10) 18:50:25 executing program 3: setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x5}, @in={0x2, 0x4e22, @empty}], 0xcc) 18:50:25 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:25 executing program 3: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x5}, @in={0x2, 0x4e22, @empty}], 0xcc) 18:50:25 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}], 0x20) 18:50:25 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:25 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}], 0x20) 18:50:25 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:26 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x10) 18:50:26 executing program 3: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x5}, @in={0x2, 0x4e22, @empty}], 0xcc) 18:50:26 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:26 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}], 0x20) 18:50:26 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:26 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x10) 18:50:26 executing program 2: setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}], 0x20) 18:50:26 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:26 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:26 executing program 3: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x5}, @in={0x2, 0x4e22, @empty}], 0xcc) 18:50:26 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:26 executing program 2: setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}], 0x20) 18:50:27 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x0, @multicast1}], 0x20) 18:50:27 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:27 executing program 3: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x5}, @in={0x2, 0x4e22, @empty}], 0xcc) 18:50:27 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:27 executing program 2: setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}], 0x20) 18:50:27 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x10) 18:50:27 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:27 executing program 3: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x5}, @in={0x2, 0x4e22, @empty}], 0xcc) 18:50:27 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:27 executing program 2: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}], 0x20) 18:50:27 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x0, @multicast1}], 0x10) 18:50:27 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:27 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:27 executing program 3: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x5}, @in={0x2, 0x4e22, @empty}], 0xcc) 18:50:27 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x0, @multicast1}], 0x10) 18:50:27 executing program 2: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}], 0x20) 18:50:28 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1}, 0x14}}, 0x6) 18:50:28 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x0, @multicast1}], 0x20) 18:50:28 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:28 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:50:28 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x0, @multicast1}], 0x10) 18:50:28 executing program 2: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}], 0x20) 18:50:28 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 18:50:28 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:50:28 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:28 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x0, @multicast1}], 0x20) 18:50:28 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x10) 18:50:28 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x0, @multicast1}], 0x10) 18:50:28 executing program 2: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}], 0x20) 18:50:28 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x0, @multicast1}], 0x20) 18:50:28 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1}, 0x14}}, 0x6) 18:50:28 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:50:28 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x0, @multicast1}], 0x10) 18:50:28 executing program 2: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}], 0x20) 18:50:29 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x0, @multicast1}], 0x20) 18:50:29 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 18:50:29 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x5}], 0xbc) 18:50:29 executing program 2: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}], 0x20) 18:50:29 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:29 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x0, @multicast1}], 0x10) 18:50:29 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}], 0xa0) 18:50:29 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x0, @multicast1}], 0x20) 18:50:29 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:50:29 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1}, 0x14}}, 0x6) 18:50:29 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x0, @multicast1}], 0x20) 18:50:29 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x10) 18:50:29 executing program 4: setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x0, @multicast1}], 0x20) 18:50:29 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:50:29 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}], 0x90) 18:50:29 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}], 0xa0) 18:50:30 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:50:30 executing program 4: setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x0, @multicast1}], 0x20) 18:50:30 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}], 0x74) 18:50:30 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}], 0x90) 18:50:30 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}], 0x58) 18:50:30 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x10) 18:50:30 executing program 4: setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x0, @multicast1}], 0x20) 18:50:30 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}], 0xa0) 18:50:30 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}], 0x20) 18:50:30 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}], 0x58) 18:50:30 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}], 0x74) 18:50:30 executing program 4: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x0, @multicast1}], 0x20) 18:50:31 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}], 0x3c) 18:50:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x8}, 0x20) 18:50:31 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:31 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), r0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:31 executing program 4: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x0, @multicast1}], 0x20) [ 2713.260548][ T3253] ieee802154 phy0 wpan0: encryption failed: -22 [ 2713.266978][ T3253] ieee802154 phy1 wpan1: encryption failed: -22 [ 2713.291425][T26725] BPF:Invalid magic 18:50:31 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x10) 18:50:31 executing program 5: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r0, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) 18:50:31 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}], 0x20) 18:50:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x8}, 0x20) 18:50:31 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}], 0x3c) 18:50:31 executing program 4: r0 = socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x0, @multicast1}], 0x20) [ 2713.610251][T26746] BPF:Invalid magic 18:50:31 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x10) 18:50:31 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}], 0x20) 18:50:31 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e22, 0x18f8, @local, 0x3}, @in6={0xa, 0x4e24, 0x9, @empty, 0x8001}, @in6={0xa, 0x4e23, 0x7, @private2={0xfc, 0x2, '\x00', 0xfc}, 0x33}, @in6={0xa, 0x4e20, 0x1, @private0}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x5}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e21, 0x15c, @empty, 0x6}], 0xe8) 18:50:31 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x8}, 0x20) 18:50:31 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(0x0, r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000003c0)={0x14, r1, 0x1, 0x0, 0x0, {}, ["", "", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000005}, 0x6) [ 2713.884866][T26761] BPF:Invalid magic 18:50:31 executing program 4: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x0, @multicast1}], 0x20) 18:50:32 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x10) 18:50:32 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb01971a"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 18:50:32 executing program 4: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x0, @multicast1}], 0x20) 18:50:32 executing program 5: bpf$BPF_BTF_LOAD(0x22, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 18:50:32 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x10) 18:50:32 executing program 4: socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x0, @multicast1}], 0x20) 18:50:32 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb01971a"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:32 executing program 5: bpf$BPF_BTF_LOAD(0x22, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:32 executing program 1: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 18:50:32 executing program 5: bpf$BPF_BTF_LOAD(0x22, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:33 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x0, @multicast1}], 0x20) 18:50:33 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:50:33 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x8}, 0x20) 18:50:33 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb01971a"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:33 executing program 5: bpf$BPF_BTF_LOAD(0x22, 0x0, 0x0) 18:50:33 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 18:50:33 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x10) 18:50:33 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:50:33 executing program 5: bpf$BPF_BTF_LOAD(0x22, 0x0, 0x0) 18:50:33 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x8}, 0x20) 18:50:33 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x0, @multicast1}], 0x10) 18:50:33 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 18:50:33 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) 18:50:33 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x0, @multicast1}], 0x10) 18:50:33 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x8}, 0x20) 18:50:33 executing program 5: bpf$BPF_BTF_LOAD(0x22, 0x0, 0x0) 18:50:34 executing program 0: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 18:50:34 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x10) 18:50:34 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x0, @multicast1}], 0x20) 18:50:34 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x0, @multicast1}], 0x10) 18:50:34 executing program 5: bpf$BPF_BTF_LOAD(0x22, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[], 0x0, 0x1a, 0x0, 0x8}, 0x20) 18:50:34 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:34 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[], 0x0, 0x1a, 0x0, 0x8}, 0x20) 18:50:34 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x0, @multicast1}], 0x20) 18:50:34 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:34 executing program 5: bpf$BPF_BTF_LOAD(0x22, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:34 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x0, @multicast1}], 0x10) 18:50:35 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x10) 18:50:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[], 0x0, 0x1a, 0x0, 0x8}, 0x20) 18:50:35 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:35 executing program 5: bpf$BPF_BTF_LOAD(0x22, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:35 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x10) 18:50:35 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x0, @multicast1}], 0x10) 18:50:35 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:35 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x0, @multicast1}], 0x20) 18:50:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x20) 18:50:35 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x0, @multicast1}], 0x10) 18:50:35 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:35 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x20) 18:50:36 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x10) 18:50:36 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x0, @multicast1}], 0x20) 18:50:36 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x10) 18:50:36 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:36 executing program 2: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x10) 18:50:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[], &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x20) 18:50:36 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:36 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x10) 18:50:36 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x0, @multicast1}], 0x20) 18:50:36 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x10) 18:50:36 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:36 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:37 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x0, @multicast1}], 0x10) 18:50:37 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb01"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:37 executing program 5: bpf$BPF_BTF_LOAD(0x21, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:37 executing program 2: bpf$BPF_BTF_LOAD(0x1e, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:37 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb01"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:37 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb01"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:37 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x0, @multicast1}], 0x10) 18:50:37 executing program 5: bpf$BPF_BTF_LOAD(0x21, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:37 executing program 2: bpf$BPF_BTF_LOAD(0x1e, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:37 executing program 1: bpf$BPF_BTF_LOAD(0x1d, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:37 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb01"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:37 executing program 3: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:37 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f00000000c0)=[@in={0x2, 0x0, @multicast1}], 0x10) 18:50:37 executing program 5: bpf$BPF_BTF_LOAD(0x21, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:37 executing program 2: bpf$BPF_BTF_LOAD(0x1e, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:37 executing program 1: bpf$BPF_BTF_LOAD(0x1d, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:37 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:37 executing program 3: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:37 executing program 4: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:37 executing program 5: bpf$BPF_BTF_LOAD(0x21, 0x0, 0x0) 18:50:37 executing program 2: bpf$BPF_BTF_LOAD(0x1e, 0x0, 0x0) 18:50:37 executing program 1: bpf$BPF_BTF_LOAD(0x1d, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:37 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:37 executing program 3: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:37 executing program 4: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:37 executing program 5: bpf$BPF_BTF_LOAD(0x21, 0x0, 0x0) 18:50:37 executing program 2: bpf$BPF_BTF_LOAD(0x1e, 0x0, 0x0) 18:50:37 executing program 1: bpf$BPF_BTF_LOAD(0x1d, 0x0, 0x0) 18:50:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:38 executing program 5: bpf$BPF_BTF_LOAD(0x21, 0x0, 0x0) 18:50:38 executing program 3: bpf$BPF_BTF_LOAD(0x13, 0x0, 0x0) 18:50:38 executing program 4: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:38 executing program 2: bpf$BPF_BTF_LOAD(0x1e, 0x0, 0x0) 18:50:38 executing program 1: bpf$BPF_BTF_LOAD(0x1d, 0x0, 0x0) 18:50:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb01971a"], 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:38 executing program 5: bpf$BPF_BTF_LOAD(0x21, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:38 executing program 3: bpf$BPF_BTF_LOAD(0x13, 0x0, 0x0) 18:50:38 executing program 4: bpf$BPF_BTF_LOAD(0x11, 0x0, 0x0) 18:50:38 executing program 2: bpf$BPF_BTF_LOAD(0x1e, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:38 executing program 1: bpf$BPF_BTF_LOAD(0x1d, 0x0, 0x0) 18:50:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb01971a"], 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:38 executing program 4: bpf$BPF_BTF_LOAD(0x11, 0x0, 0x0) 18:50:38 executing program 3: bpf$BPF_BTF_LOAD(0x13, 0x0, 0x0) 18:50:38 executing program 5: bpf$BPF_BTF_LOAD(0x21, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:38 executing program 2: bpf$BPF_BTF_LOAD(0x1e, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb01971a"], 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:38 executing program 1: bpf$BPF_BTF_LOAD(0x1d, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:38 executing program 3: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:38 executing program 4: bpf$BPF_BTF_LOAD(0x11, 0x0, 0x0) 18:50:38 executing program 2: bpf$BPF_BTF_LOAD(0x1e, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:38 executing program 5: bpf$BPF_BTF_LOAD(0x21, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:38 executing program 1: bpf$BPF_BTF_LOAD(0x1d, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:38 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb01971a"], &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x20) 18:50:38 executing program 3: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:39 executing program 4: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:39 executing program 2: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:39 executing program 5: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:39 executing program 1: bpf$BPF_BTF_LOAD(0x1d, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb01971a"], &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x20) 18:50:39 executing program 3: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:39 executing program 4: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:39 executing program 2: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:39 executing program 5: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:39 executing program 1: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:39 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb01971a"], &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x20) 18:50:39 executing program 3: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:39 executing program 4: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:39 executing program 5: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:39 executing program 1: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:39 executing program 2: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:39 executing program 0: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:39 executing program 3: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:39 executing program 5: bpf$BPF_BTF_LOAD(0xe, 0x0, 0x0) 18:50:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0x2000000c, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_CSUM]}, 0xfffffffffffffe61}}, 0x0) 18:50:39 executing program 5: bpf$BPF_BTF_LOAD(0xe, 0x0, 0x0) 18:50:39 executing program 2: bpf$BPF_BTF_LOAD(0x10, 0x0, 0x0) 18:50:39 executing program 1: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:39 executing program 0: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0x2000000c, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_CSUM]}, 0xfffffffffffffe61}}, 0x0) 18:50:39 executing program 3: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:39 executing program 5: bpf$BPF_BTF_LOAD(0xe, 0x0, 0x0) 18:50:40 executing program 2: bpf$BPF_BTF_LOAD(0x10, 0x0, 0x0) 18:50:40 executing program 1: bpf$BPF_BTF_LOAD(0xd, 0x0, 0x0) 18:50:40 executing program 0: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:40 executing program 3: bpf$BPF_BTF_LOAD(0xb, 0x0, 0x0) 18:50:40 executing program 5: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0x2000000c, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_CSUM]}, 0xfffffffffffffe61}}, 0x0) 18:50:40 executing program 2: bpf$BPF_BTF_LOAD(0x10, 0x0, 0x0) 18:50:40 executing program 1: bpf$BPF_BTF_LOAD(0xd, 0x0, 0x0) 18:50:40 executing program 3: bpf$BPF_BTF_LOAD(0xb, 0x0, 0x0) 18:50:40 executing program 0: bpf$BPF_BTF_LOAD(0x9, 0x0, 0x0) 18:50:40 executing program 5: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:40 executing program 4: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0x2000000c, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_CSUM]}, 0xfffffffffffffe61}}, 0x0) 18:50:40 executing program 2: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:40 executing program 1: bpf$BPF_BTF_LOAD(0xd, 0x0, 0x0) 18:50:40 executing program 3: bpf$BPF_BTF_LOAD(0xb, 0x0, 0x0) 18:50:40 executing program 0: bpf$BPF_BTF_LOAD(0x9, 0x0, 0x0) 18:50:40 executing program 5: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:40 executing program 2: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:40 executing program 4: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0x2000000c, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_CSUM]}, 0xfffffffffffffe61}}, 0x0) 18:50:40 executing program 1: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:40 executing program 3: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:40 executing program 0: bpf$BPF_BTF_LOAD(0x9, 0x0, 0x0) 18:50:40 executing program 4: sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0x2000000c, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_CSUM]}, 0xfffffffffffffe61}}, 0x0) 18:50:40 executing program 2: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:40 executing program 5: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:40 executing program 1: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:40 executing program 3: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:40 executing program 0: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:41 executing program 5: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:41 executing program 2: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:41 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0x2000000c, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_CSUM]}, 0xfffffffffffffe61}}, 0x0) 18:50:41 executing program 3: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:41 executing program 1: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:41 executing program 0: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:41 executing program 5: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:41 executing program 2: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf}, 0x20) 18:50:41 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0x2000000c, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_CSUM]}, 0xfffffffffffffe61}}, 0x0) 18:50:41 executing program 3: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:41 executing program 1: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:41 executing program 5: bpf$BPF_BTF_LOAD(0x8, 0x0, 0x0) 18:50:41 executing program 0: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:41 executing program 2: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:41 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000), 0x2000000c, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_CSUM]}, 0xfffffffffffffe61}}, 0x0) 18:50:41 executing program 3: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:41 executing program 1: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:41 executing program 0 (fault-call:0 fault-nth:0): bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:41 executing program 5: bpf$BPF_BTF_LOAD(0x8, 0x0, 0x0) 18:50:41 executing program 2: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, 0x0, 0x0) 18:50:41 executing program 3: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:41 executing program 5: bpf$BPF_BTF_LOAD(0x8, 0x0, 0x0) [ 2723.779036][T27243] FAULT_INJECTION: forcing a failure. [ 2723.779036][T27243] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2723.832744][T27243] CPU: 0 PID: 27243 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2723.841572][T27243] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2723.851652][T27243] Call Trace: [ 2723.854951][T27243] dump_stack+0x141/0x1d7 [ 2723.859313][T27243] should_fail.cold+0x5/0xa [ 2723.863847][T27243] _copy_from_user+0x2c/0x180 [ 2723.868579][T27243] __sys_bpf+0x2fb/0x5520 [ 2723.872938][T27243] ? bpf_link_get_from_fd+0x110/0x110 18:50:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, 0x0, 0x0) [ 2723.878339][T27243] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2723.884474][T27243] ? find_held_lock+0x2d/0x110 [ 2723.889325][T27243] ? trace_hardirqs_on+0x38/0x1c0 [ 2723.894488][T27243] __x64_sys_bpf+0x75/0xb0 [ 2723.898943][T27243] ? syscall_enter_from_user_mode+0x27/0x70 [ 2723.905047][T27243] do_syscall_64+0x3a/0xb0 [ 2723.909592][T27243] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2723.915522][T27243] RIP: 0033:0x4665d9 18:50:41 executing program 5: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) [ 2723.919451][T27243] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2723.939091][T27243] RSP: 002b:00007f46a4130188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2723.947646][T27243] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2723.955736][T27243] RDX: 0000000000000020 RSI: 0000000020000580 RDI: 0000000000000009 [ 2723.963862][T27243] RBP: 00007f46a41301d0 R08: 0000000000000000 R09: 0000000000000000 [ 2723.971863][T27243] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 18:50:41 executing program 1: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) [ 2723.979864][T27243] R13: 00007ffe505b029f R14: 00007f46a4130300 R15: 0000000000022000 18:50:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, 0x0, 0x0) 18:50:42 executing program 3: bpf$BPF_BTF_LOAD(0x7, 0x0, 0x0) 18:50:42 executing program 2: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="9feb0197c0"], &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:42 executing program 0 (fault-call:0 fault-nth:1): bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:42 executing program 1: bpf$BPF_BTF_LOAD(0x6, 0x0, 0x0) 18:50:42 executing program 5: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_CSUM={0x5}]}, 0x1c}}, 0x0) 18:50:42 executing program 3: bpf$BPF_BTF_LOAD(0x7, 0x0, 0x0) 18:50:42 executing program 2: bpf$BPF_BTF_LOAD(0x3, 0x0, 0x0) 18:50:42 executing program 3: bpf$BPF_BTF_LOAD(0x7, 0x0, 0x0) 18:50:42 executing program 2: bpf$BPF_BTF_LOAD(0x3, 0x0, 0x0) 18:50:42 executing program 5: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_CSUM={0x5}]}, 0x1c}}, 0x0) [ 2724.461877][T27278] FAULT_INJECTION: forcing a failure. [ 2724.461877][T27278] name fail_usercopy, interval 1, probability 0, space 0, times 0 18:50:42 executing program 1: bpf$BPF_BTF_LOAD(0x6, 0x0, 0x0) [ 2724.550940][T27278] CPU: 0 PID: 27278 Comm: syz-executor.0 Not tainted 5.13.0-rc3-syzkaller #0 [ 2724.559880][T27278] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2724.569964][T27278] Call Trace: [ 2724.573263][T27278] dump_stack+0x141/0x1d7 [ 2724.577628][T27278] should_fail.cold+0x5/0xa [ 2724.582168][T27278] _copy_to_user+0x2c/0x150 [ 2724.586715][T27278] simple_read_from_buffer+0xcc/0x160 [ 2724.592140][T27278] proc_fail_nth_read+0x187/0x220 [ 2724.597230][T27278] ? proc_exe_link+0x1d0/0x1d0 [ 2724.602036][T27278] ? security_file_permission+0x248/0x560 [ 2724.607817][T27278] ? proc_exe_link+0x1d0/0x1d0 [ 2724.612606][T27278] vfs_read+0x1b5/0x570 [ 2724.616808][T27278] ksys_read+0x12d/0x250 [ 2724.621074][T27278] ? vfs_write+0xa30/0xa30 [ 2724.625512][T27278] ? syscall_enter_from_user_mode+0x27/0x70 [ 2724.631437][T27278] do_syscall_64+0x3a/0xb0 [ 2724.635891][T27278] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2724.641810][T27278] RIP: 0033:0x41935c 18:50:42 executing program 2: bpf$BPF_BTF_LOAD(0x3, 0x0, 0x0) [ 2724.645726][T27278] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2724.665372][T27278] RSP: 002b:00007f46a4130170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2724.673832][T27278] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000041935c [ 2724.681835][T27278] RDX: 000000000000000f RSI: 00007f46a41301e0 RDI: 0000000000000003 [ 2724.689931][T27278] RBP: 00007f46a41301d0 R08: 0000000000000000 R09: 0000000000000000 [ 2724.700448][T27278] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2724.708485][T27278] R13: 00007ffe505b029f R14: 00007f46a4130300 R15: 0000000000022000 18:50:42 executing program 0: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:42 executing program 5: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:42 executing program 1: bpf$BPF_BTF_LOAD(0x6, 0x0, 0x0) 18:50:42 executing program 3: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:42 executing program 2: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_CSUM={0x5}]}, 0x1c}}, 0x0) 18:50:43 executing program 3: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x0) 18:50:43 executing program 1: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000580)={0x0, &(0x7f0000000480)=""/207, 0x1a, 0xcf, 0x1}, 0x20) 18:50:43 executing program 2: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:43 executing program 5: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:43 executing program 0: bpf$BPF_BTF_LOAD(0x2, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x0) 18:50:43 executing program 3: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:43 executing program 2: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:43 executing program 1: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:43 executing program 5 (fault-call:0 fault-nth:0): bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:43 executing program 0: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, 0x0}, 0x0) 18:50:43 executing program 3 (fault-call:0 fault-nth:0): bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) [ 2725.551661][T27337] FAULT_INJECTION: forcing a failure. [ 2725.551661][T27337] name fail_usercopy, interval 1, probability 0, space 0, times 0 18:50:43 executing program 2 (fault-call:0 fault-nth:0): bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:43 executing program 1: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) [ 2725.619053][T27337] CPU: 0 PID: 27337 Comm: syz-executor.5 Not tainted 5.13.0-rc3-syzkaller #0 [ 2725.627891][T27337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2725.637976][T27337] Call Trace: [ 2725.641280][T27337] dump_stack+0x141/0x1d7 [ 2725.645761][T27337] should_fail.cold+0x5/0xa [ 2725.650313][T27337] _copy_from_user+0x2c/0x180 [ 2725.655041][T27337] __sys_bpf+0x2fb/0x5520 [ 2725.659409][T27337] ? bpf_link_get_from_fd+0x110/0x110 18:50:43 executing program 0: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) [ 2725.664863][T27337] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2725.670902][T27337] ? find_held_lock+0x2d/0x110 [ 2725.675749][T27337] ? trace_hardirqs_on+0x38/0x1c0 [ 2725.680815][T27337] __x64_sys_bpf+0x75/0xb0 [ 2725.685411][T27337] ? syscall_enter_from_user_mode+0x27/0x70 [ 2725.691340][T27337] do_syscall_64+0x3a/0xb0 [ 2725.695797][T27337] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2725.701746][T27337] RIP: 0033:0x4665d9 [ 2725.705662][T27337] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2725.725311][T27337] RSP: 002b:00007f83d761a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2725.733842][T27337] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2725.741849][T27337] RDX: 0000000000000020 RSI: 0000000020000580 RDI: 0000000000000008 [ 2725.746132][T27346] FAULT_INJECTION: forcing a failure. [ 2725.746132][T27346] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2725.749834][T27337] RBP: 00007f83d761a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2725.749857][T27337] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2725.749874][T27337] R13: 00007fff526fd92f R14: 00007f83d761a300 R15: 0000000000022000 [ 2725.803010][T27348] FAULT_INJECTION: forcing a failure. [ 2725.803010][T27348] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2725.838971][T27348] CPU: 1 PID: 27348 Comm: syz-executor.2 Not tainted 5.13.0-rc3-syzkaller #0 [ 2725.847961][T27348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2725.858321][T27348] Call Trace: [ 2725.861629][T27348] dump_stack+0x141/0x1d7 [ 2725.866003][T27348] should_fail.cold+0x5/0xa [ 2725.870550][T27348] _copy_from_user+0x2c/0x180 [ 2725.875269][T27348] __sys_bpf+0x2fb/0x5520 [ 2725.879638][T27348] ? bpf_link_get_from_fd+0x110/0x110 [ 2725.885067][T27348] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2725.891093][T27348] ? find_held_lock+0x2d/0x110 [ 2725.895916][T27348] ? trace_hardirqs_on+0x38/0x1c0 [ 2725.901241][T27348] __x64_sys_bpf+0x75/0xb0 [ 2725.905690][T27348] ? syscall_enter_from_user_mode+0x27/0x70 [ 2725.911618][T27348] do_syscall_64+0x3a/0xb0 [ 2725.916090][T27348] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2725.922026][T27348] RIP: 0033:0x4665d9 [ 2725.926046][T27348] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2725.945681][T27348] RSP: 002b:00007f9d47d9a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2725.954129][T27348] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2725.962149][T27348] RDX: 0000000000000020 RSI: 0000000020000580 RDI: 0000000000000003 [ 2725.970150][T27348] RBP: 00007f9d47d9a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2725.978149][T27348] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 18:50:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={0x0}}, 0x0) 18:50:43 executing program 1 (fault-call:0 fault-nth:0): bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) [ 2725.986146][T27348] R13: 00007fff2dcbcebf R14: 00007f9d47d9a300 R15: 0000000000022000 18:50:44 executing program 0: bpf$BPF_BTF_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) [ 2726.077342][T27356] FAULT_INJECTION: forcing a failure. [ 2726.077342][T27356] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2726.103126][T27356] CPU: 1 PID: 27356 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2726.111950][T27356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2726.122032][T27356] Call Trace: [ 2726.125331][T27356] dump_stack+0x141/0x1d7 [ 2726.129694][T27356] should_fail.cold+0x5/0xa [ 2726.134226][T27356] _copy_from_user+0x2c/0x180 [ 2726.138943][T27356] __sys_bpf+0x2fb/0x5520 [ 2726.143309][T27356] ? bpf_link_get_from_fd+0x110/0x110 [ 2726.148708][T27356] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2726.154733][T27356] ? find_held_lock+0x2d/0x110 [ 2726.159629][T27356] ? trace_hardirqs_on+0x38/0x1c0 [ 2726.164678][T27356] __x64_sys_bpf+0x75/0xb0 [ 2726.169207][T27356] ? syscall_enter_from_user_mode+0x27/0x70 [ 2726.175128][T27356] do_syscall_64+0x3a/0xb0 [ 2726.179559][T27356] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2726.185564][T27356] RIP: 0033:0x4665d9 [ 2726.189493][T27356] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2726.209130][T27356] RSP: 002b:00007f47400d7188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2726.217593][T27356] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 18:50:44 executing program 5 (fault-call:0 fault-nth:1): bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={0x0}}, 0x0) [ 2726.225589][T27356] RDX: 0000000000000020 RSI: 0000000020000580 RDI: 0000000000000006 [ 2726.233581][T27356] RBP: 00007f47400d71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2726.241578][T27356] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2726.249567][T27356] R13: 00007ffcd9aee3cf R14: 00007f47400d7300 R15: 0000000000022000 [ 2726.283360][T27346] CPU: 0 PID: 27346 Comm: syz-executor.3 Not tainted 5.13.0-rc3-syzkaller #0 [ 2726.292285][T27346] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2726.302394][T27346] Call Trace: [ 2726.305688][T27346] dump_stack+0x141/0x1d7 [ 2726.310040][T27346] should_fail.cold+0x5/0xa [ 2726.314561][T27346] _copy_from_user+0x2c/0x180 [ 2726.319261][T27346] __sys_bpf+0x2fb/0x5520 [ 2726.323611][T27346] ? bpf_link_get_from_fd+0x110/0x110 [ 2726.329274][T27346] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2726.335300][T27346] ? find_held_lock+0x2d/0x110 [ 2726.340141][T27346] ? trace_hardirqs_on+0x38/0x1c0 [ 2726.345282][T27346] __x64_sys_bpf+0x75/0xb0 [ 2726.349717][T27346] ? syscall_enter_from_user_mode+0x27/0x70 [ 2726.355634][T27346] do_syscall_64+0x3a/0xb0 [ 2726.360073][T27346] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2726.366015][T27346] RIP: 0033:0x4665d9 [ 2726.369919][T27346] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2726.389943][T27346] RSP: 002b:00007f061e9de188 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 2726.398407][T27346] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2726.406478][T27346] RDX: 0000000000000020 RSI: 0000000020000580 RDI: 0000000000000007 [ 2726.414474][T27346] RBP: 00007f061e9de1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2726.422470][T27346] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 18:50:44 executing program 0: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={0x0}}, 0x0) [ 2726.430457][T27346] R13: 00007ffd76df8b1f R14: 00007f061e9de300 R15: 0000000000022000 [ 2726.535899][T27366] FAULT_INJECTION: forcing a failure. [ 2726.535899][T27366] name fail_usercopy, interval 1, probability 0, space 0, times 0 18:50:44 executing program 1 (fault-call:0 fault-nth:1): bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) [ 2726.617371][T27366] CPU: 0 PID: 27366 Comm: syz-executor.5 Not tainted 5.13.0-rc3-syzkaller #0 [ 2726.626196][T27366] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2726.636349][T27366] Call Trace: [ 2726.639650][T27366] dump_stack+0x141/0x1d7 [ 2726.644020][T27366] should_fail.cold+0x5/0xa [ 2726.648563][T27366] _copy_to_user+0x2c/0x150 [ 2726.653097][T27366] simple_read_from_buffer+0xcc/0x160 [ 2726.658504][T27366] proc_fail_nth_read+0x187/0x220 [ 2726.663572][T27366] ? proc_exe_link+0x1d0/0x1d0 [ 2726.668367][T27366] ? security_file_permission+0x248/0x560 [ 2726.674140][T27366] ? proc_exe_link+0x1d0/0x1d0 [ 2726.678940][T27366] vfs_read+0x1b5/0x570 [ 2726.683128][T27366] ksys_read+0x12d/0x250 [ 2726.685566][T27374] FAULT_INJECTION: forcing a failure. [ 2726.685566][T27374] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2726.687388][T27366] ? vfs_write+0xa30/0xa30 [ 2726.687434][T27366] ? syscall_enter_from_user_mode+0x27/0x70 [ 2726.687468][T27366] do_syscall_64+0x3a/0xb0 [ 2726.716016][T27366] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2726.722012][T27366] RIP: 0033:0x41935c [ 2726.725918][T27366] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2726.745732][T27366] RSP: 002b:00007f83d761a170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2726.754176][T27366] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000041935c [ 2726.762258][T27366] RDX: 000000000000000f RSI: 00007f83d761a1e0 RDI: 0000000000000003 [ 2726.770249][T27366] RBP: 00007f83d761a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2726.778394][T27366] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2726.786397][T27366] R13: 00007fff526fd92f R14: 00007f83d761a300 R15: 0000000000022000 [ 2726.794404][T27374] CPU: 1 PID: 27374 Comm: syz-executor.1 Not tainted 5.13.0-rc3-syzkaller #0 [ 2726.803387][T27374] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2726.813611][T27374] Call Trace: [ 2726.816883][T27374] dump_stack+0x141/0x1d7 [ 2726.821212][T27374] should_fail.cold+0x5/0xa [ 2726.825711][T27374] _copy_to_user+0x2c/0x150 [ 2726.830212][T27374] simple_read_from_buffer+0xcc/0x160 [ 2726.835754][T27374] proc_fail_nth_read+0x187/0x220 [ 2726.840780][T27374] ? proc_exe_link+0x1d0/0x1d0 [ 2726.845539][T27374] ? security_file_permission+0x248/0x560 [ 2726.851251][T27374] ? proc_exe_link+0x1d0/0x1d0 [ 2726.856005][T27374] vfs_read+0x1b5/0x570 [ 2726.860157][T27374] ksys_read+0x12d/0x250 [ 2726.864480][T27374] ? vfs_write+0xa30/0xa30 [ 2726.868892][T27374] ? syscall_enter_from_user_mode+0x27/0x70 [ 2726.874898][T27374] do_syscall_64+0x3a/0xb0 [ 2726.879349][T27374] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2726.885252][T27374] RIP: 0033:0x41935c [ 2726.889234][T27374] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2726.909193][T27374] RSP: 002b:00007f47400d7170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2726.917608][T27374] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000041935c [ 2726.925575][T27374] RDX: 000000000000000f RSI: 00007f47400d71e0 RDI: 0000000000000003 [ 2726.933623][T27374] RBP: 00007f47400d71d0 R08: 0000000000000000 R09: 0000000000000000 [ 2726.941584][T27374] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2726.949546][T27374] R13: 00007ffcd9aee3cf R14: 00007f47400d7300 R15: 0000000000022000 18:50:44 executing program 3: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:44 executing program 2 (fault-call:0 fault-nth:1): bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) 18:50:44 executing program 5: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:45 executing program 1: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:45 executing program 0: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) [ 2727.105386][T27378] FAULT_INJECTION: forcing a failure. [ 2727.105386][T27378] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2727.198203][T27378] CPU: 0 PID: 27378 Comm: syz-executor.2 Not tainted 5.13.0-rc3-syzkaller #0 [ 2727.207035][T27378] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2727.217117][T27378] Call Trace: [ 2727.220419][T27378] dump_stack+0x141/0x1d7 [ 2727.224810][T27378] should_fail.cold+0x5/0xa [ 2727.229352][T27378] _copy_to_user+0x2c/0x150 [ 2727.233892][T27378] simple_read_from_buffer+0xcc/0x160 [ 2727.239294][T27378] proc_fail_nth_read+0x187/0x220 [ 2727.244348][T27378] ? proc_exe_link+0x1d0/0x1d0 [ 2727.249240][T27378] ? security_file_permission+0x248/0x560 [ 2727.254996][T27378] ? proc_exe_link+0x1d0/0x1d0 [ 2727.259877][T27378] vfs_read+0x1b5/0x570 [ 2727.264068][T27378] ksys_read+0x12d/0x250 [ 2727.268347][T27378] ? vfs_write+0xa30/0xa30 [ 2727.272803][T27378] ? syscall_enter_from_user_mode+0x27/0x70 [ 2727.278846][T27378] do_syscall_64+0x3a/0xb0 [ 2727.283292][T27378] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2727.289214][T27378] RIP: 0033:0x41935c 18:50:45 executing program 3: bpf$BPF_BTF_LOAD(0x2, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) [ 2727.293128][T27378] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2727.312932][T27378] RSP: 002b:00007f9d47d9a170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2727.321383][T27378] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000041935c [ 2727.329406][T27378] RDX: 000000000000000f RSI: 00007f9d47d9a1e0 RDI: 0000000000000003 [ 2727.337405][T27378] RBP: 00007f9d47d9a1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2727.345403][T27378] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2727.353398][T27378] R13: 00007fff2dcbcebf R14: 00007f9d47d9a300 R15: 0000000000022000 18:50:45 executing program 0: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) 18:50:45 executing program 5: bpf$BPF_BTF_LOAD(0x2, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:45 executing program 1: bpf$BPF_BTF_LOAD(0x2, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:45 executing program 3: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:45 executing program 5: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:45 executing program 2: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:45 executing program 0: bpf$BPF_BTF_LOAD(0xa, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) 18:50:45 executing program 1: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:45 executing program 3: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:45 executing program 5: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:45 executing program 0: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:45 executing program 3: bpf$BPF_BTF_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:45 executing program 1: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:45 executing program 4 (fault-call:1 fault-nth:0): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0x2000000c, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_CSUM]}, 0xfffffffffffffe61}}, 0x0) 18:50:45 executing program 2: bpf$BPF_BTF_LOAD(0x2, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:46 executing program 3: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:46 executing program 5: bpf$BPF_BTF_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:46 executing program 0: bpf$BPF_BTF_LOAD(0xc, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:46 executing program 1: bpf$BPF_BTF_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) [ 2728.177303][T27429] FAULT_INJECTION: forcing a failure. [ 2728.177303][T27429] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2728.244434][T27429] CPU: 0 PID: 27429 Comm: syz-executor.4 Not tainted 5.13.0-rc3-syzkaller #0 [ 2728.253258][T27429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2728.263333][T27429] Call Trace: [ 2728.266660][T27429] dump_stack+0x141/0x1d7 [ 2728.271029][T27429] should_fail.cold+0x5/0xa [ 2728.275560][T27429] _copy_from_user+0x2c/0x180 [ 2728.280385][T27429] __copy_msghdr_from_user+0x91/0x4b0 [ 2728.285795][T27429] ? __ia32_sys_shutdown+0x70/0x70 [ 2728.290947][T27429] ? mark_lock+0xef/0x17b0 [ 2728.295401][T27429] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2728.301425][T27429] sendmsg_copy_msghdr+0xa1/0x160 [ 2728.306484][T27429] ? do_recvmmsg+0x6d0/0x6d0 [ 2728.311103][T27429] ? lock_chain_count+0x20/0x20 [ 2728.315993][T27429] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2728.322023][T27429] ? _parse_integer+0x132/0x180 [ 2728.326918][T27429] ___sys_sendmsg+0xc6/0x170 [ 2728.331628][T27429] ? sendmsg_copy_msghdr+0x160/0x160 [ 2728.337130][T27429] ? __fget_files+0x266/0x3d0 [ 2728.342047][T27429] ? lock_downgrade+0x6e0/0x6e0 [ 2728.346956][T27429] ? __fget_files+0x288/0x3d0 [ 2728.351688][T27429] ? __fget_light+0xea/0x280 [ 2728.356299][T27429] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 2728.362577][T27429] __sys_sendmsg+0xe5/0x1b0 [ 2728.367113][T27429] ? __sys_sendmsg_sock+0x30/0x30 [ 2728.372188][T27429] ? syscall_enter_from_user_mode+0x27/0x70 [ 2728.378111][T27429] do_syscall_64+0x3a/0xb0 [ 2728.382568][T27429] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2728.388477][T27429] RIP: 0033:0x4665d9 18:50:46 executing program 3: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) [ 2728.392400][T27429] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2728.412029][T27429] RSP: 002b:00007eff7e7c0188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2728.420467][T27429] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2728.428556][T27429] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000003 [ 2728.436795][T27429] RBP: 00007eff7e7c01d0 R08: 0000000000000000 R09: 0000000000000000 18:50:46 executing program 2: bpf$BPF_BTF_LOAD(0x4, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) [ 2728.444898][T27429] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2728.452914][T27429] R13: 00007ffdc79aa83f R14: 00007eff7e7c0300 R15: 0000000000022000 18:50:46 executing program 0: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:46 executing program 3: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:46 executing program 2: bpf$BPF_BTF_LOAD(0x5, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:46 executing program 5: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:46 executing program 4 (fault-call:1 fault-nth:1): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0x2000000c, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_CSUM]}, 0xfffffffffffffe61}}, 0x0) 18:50:46 executing program 1: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:46 executing program 3: bpf$BPF_BTF_LOAD(0xa, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:46 executing program 0: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:46 executing program 2: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:46 executing program 5: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:47 executing program 5: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:47 executing program 0: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:47 executing program 3: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:47 executing program 1: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:47 executing program 2: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) [ 2729.041235][T27465] FAULT_INJECTION: forcing a failure. [ 2729.041235][T27465] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2729.121225][T27465] CPU: 1 PID: 27465 Comm: syz-executor.4 Not tainted 5.13.0-rc3-syzkaller #0 [ 2729.130100][T27465] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2729.140269][T27465] Call Trace: [ 2729.143571][T27465] dump_stack+0x141/0x1d7 [ 2729.147935][T27465] should_fail.cold+0x5/0xa [ 2729.152470][T27465] _copy_from_user+0x2c/0x180 [ 2729.157182][T27465] move_addr_to_kernel.part.0+0x31/0x110 [ 2729.163026][T27465] __copy_msghdr_from_user+0x3da/0x4b0 [ 2729.168519][T27465] ? __ia32_sys_shutdown+0x70/0x70 [ 2729.173784][T27465] sendmsg_copy_msghdr+0xa1/0x160 [ 2729.178845][T27465] ? do_recvmmsg+0x6d0/0x6d0 [ 2729.183558][T27465] ? lock_chain_count+0x20/0x20 [ 2729.188457][T27465] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2729.194466][T27465] ? _parse_integer+0x132/0x180 [ 2729.199352][T27465] ___sys_sendmsg+0xc6/0x170 [ 2729.203973][T27465] ? sendmsg_copy_msghdr+0x160/0x160 [ 2729.209300][T27465] ? __fget_files+0x266/0x3d0 [ 2729.213999][T27465] ? lock_downgrade+0x6e0/0x6e0 [ 2729.218898][T27465] ? __fget_files+0x288/0x3d0 [ 2729.223603][T27465] ? __fget_light+0xea/0x280 [ 2729.228213][T27465] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 2729.234489][T27465] __sys_sendmsg+0xe5/0x1b0 [ 2729.239016][T27465] ? __sys_sendmsg_sock+0x30/0x30 [ 2729.244080][T27465] ? syscall_enter_from_user_mode+0x27/0x70 [ 2729.250011][T27465] do_syscall_64+0x3a/0xb0 [ 2729.254463][T27465] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2729.260393][T27465] RIP: 0033:0x4665d9 [ 2729.264314][T27465] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2729.283966][T27465] RSP: 002b:00007eff7e7c0188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2729.292413][T27465] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2729.300410][T27465] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000003 [ 2729.308398][T27465] RBP: 00007eff7e7c01d0 R08: 0000000000000000 R09: 0000000000000000 18:50:47 executing program 2: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) [ 2729.316398][T27465] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2729.324386][T27465] R13: 00007ffdc79aa83f R14: 00007eff7e7c0300 R15: 0000000000022000 18:50:47 executing program 2: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:47 executing program 3: bpf$BPF_BTF_LOAD(0xc, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:47 executing program 1: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:47 executing program 4 (fault-call:1 fault-nth:2): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0x2000000c, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_CSUM]}, 0xfffffffffffffe61}}, 0x0) 18:50:47 executing program 5: bpf$BPF_BTF_LOAD(0xa, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:47 executing program 0: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:47 executing program 3: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:47 executing program 2: bpf$BPF_BTF_LOAD(0xa, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:47 executing program 5: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) [ 2729.597885][T27491] FAULT_INJECTION: forcing a failure. [ 2729.597885][T27491] name fail_usercopy, interval 1, probability 0, space 0, times 0 18:50:47 executing program 1: bpf$BPF_BTF_LOAD(0xa, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) [ 2729.672667][T27491] CPU: 0 PID: 27491 Comm: syz-executor.4 Not tainted 5.13.0-rc3-syzkaller #0 [ 2729.681494][T27491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2729.691571][T27491] Call Trace: [ 2729.694873][T27491] dump_stack+0x141/0x1d7 [ 2729.699240][T27491] should_fail.cold+0x5/0xa [ 2729.703780][T27491] _copy_from_user+0x2c/0x180 [ 2729.708512][T27491] iovec_from_user+0x242/0x3c0 [ 2729.713411][T27491] __import_iovec+0x65/0x500 [ 2729.718042][T27491] import_iovec+0x10c/0x150 [ 2729.722604][T27491] sendmsg_copy_msghdr+0x12d/0x160 [ 2729.727749][T27491] ? do_recvmmsg+0x6d0/0x6d0 [ 2729.732371][T27491] ? lock_chain_count+0x20/0x20 [ 2729.737255][T27491] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2729.743283][T27491] ? _parse_integer+0x132/0x180 [ 2729.748265][T27491] ___sys_sendmsg+0xc6/0x170 [ 2729.752891][T27491] ? sendmsg_copy_msghdr+0x160/0x160 [ 2729.758211][T27491] ? __fget_files+0x266/0x3d0 [ 2729.762912][T27491] ? lock_downgrade+0x6e0/0x6e0 [ 2729.767816][T27491] ? __fget_light+0xea/0x280 18:50:47 executing program 1: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) [ 2729.772427][T27491] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 2729.778702][T27491] __sys_sendmsg+0xe5/0x1b0 [ 2729.783245][T27491] ? __sys_sendmsg_sock+0x30/0x30 [ 2729.788314][T27491] ? syscall_enter_from_user_mode+0x27/0x70 [ 2729.794233][T27491] do_syscall_64+0x3a/0xb0 [ 2729.798688][T27491] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2729.804615][T27491] RIP: 0033:0x4665d9 [ 2729.808524][T27491] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2729.828153][T27491] RSP: 002b:00007eff7e7c0188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2729.836684][T27491] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2729.844686][T27491] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000003 [ 2729.852685][T27491] RBP: 00007eff7e7c01d0 R08: 0000000000000000 R09: 0000000000000000 [ 2729.860689][T27491] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 18:50:47 executing program 1: bpf$BPF_BTF_LOAD(0xc, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) [ 2729.868693][T27491] R13: 00007ffdc79aa83f R14: 00007eff7e7c0300 R15: 0000000000022000 18:50:48 executing program 1: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:48 executing program 5: bpf$BPF_BTF_LOAD(0xc, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:48 executing program 4 (fault-call:1 fault-nth:3): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0x2000000c, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_CSUM]}, 0xfffffffffffffe61}}, 0x0) 18:50:48 executing program 3: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:48 executing program 0: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:48 executing program 2: bpf$BPF_BTF_LOAD(0xb, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:48 executing program 5: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:48 executing program 2: bpf$BPF_BTF_LOAD(0xc, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) [ 2730.216357][T27516] FAULT_INJECTION: forcing a failure. [ 2730.216357][T27516] name fail_usercopy, interval 1, probability 0, space 0, times 0 18:50:48 executing program 3: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:48 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) [ 2730.306761][T27516] CPU: 0 PID: 27516 Comm: syz-executor.4 Not tainted 5.13.0-rc3-syzkaller #0 [ 2730.315602][T27516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2730.325698][T27516] Call Trace: [ 2730.328997][T27516] dump_stack+0x141/0x1d7 [ 2730.333367][T27516] should_fail.cold+0x5/0xa [ 2730.337906][T27516] _copy_to_user+0x2c/0x150 [ 2730.342452][T27516] simple_read_from_buffer+0xcc/0x160 [ 2730.347861][T27516] proc_fail_nth_read+0x187/0x220 [ 2730.352924][T27516] ? proc_exe_link+0x1d0/0x1d0 [ 2730.357717][T27516] ? security_file_permission+0x248/0x560 [ 2730.363476][T27516] ? proc_exe_link+0x1d0/0x1d0 [ 2730.368280][T27516] vfs_read+0x1b5/0x570 [ 2730.372467][T27516] ksys_read+0x12d/0x250 [ 2730.376736][T27516] ? vfs_write+0xa30/0xa30 [ 2730.381230][T27516] ? syscall_enter_from_user_mode+0x27/0x70 [ 2730.387160][T27516] do_syscall_64+0x3a/0xb0 [ 2730.391605][T27516] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2730.397531][T27516] RIP: 0033:0x41935c 18:50:48 executing program 2: bpf$BPF_BTF_LOAD(0xd, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) [ 2730.401449][T27516] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2730.421171][T27516] RSP: 002b:00007eff7e7c0170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2730.429705][T27516] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 000000000041935c [ 2730.437706][T27516] RDX: 000000000000000f RSI: 00007eff7e7c01e0 RDI: 0000000000000004 [ 2730.445792][T27516] RBP: 00007eff7e7c01d0 R08: 0000000000000000 R09: 0000000000000000 18:50:48 executing program 1: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) [ 2730.453787][T27516] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2730.461781][T27516] R13: 00007ffdc79aa83f R14: 00007eff7e7c0300 R15: 0000000000022000 18:50:48 executing program 3: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:48 executing program 5: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0x2000000c, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_CSUM]}, 0xfffffffffffffe61}}, 0x0) 18:50:48 executing program 0: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:48 executing program 1: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:48 executing program 2: bpf$BPF_BTF_LOAD(0xe, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:48 executing program 0: bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:48 executing program 2: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:48 executing program 5: bpf$BPF_BTF_LOAD(0xf, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:48 executing program 3: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:48 executing program 1: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0x2000000c, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_CSUM]}, 0xfffffffffffffe61}}, 0x0) 18:50:49 executing program 2: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:49 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:49 executing program 5: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:49 executing program 1: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:49 executing program 0: bpf$BPF_BTF_LOAD(0x15, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x7}, 0x2000000c, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_CSUM]}, 0xfffffffffffffe61}}, 0x0) 18:50:49 executing program 2: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:49 executing program 3: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:49 executing program 0: bpf$BPF_BTF_LOAD(0x16, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:49 executing program 5: bpf$BPF_BTF_LOAD(0x11, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:49 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x700}, 0x2000000c, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_CSUM]}, 0xfffffffffffffe61}}, 0x0) 18:50:49 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:49 executing program 3: bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:49 executing program 0: bpf$BPF_BTF_LOAD(0x17, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:49 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:49 executing program 1: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0x2000000c, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_CSUM]}, 0xfffffffffffffe61}}, 0x0) 18:50:49 executing program 2: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:49 executing program 3: bpf$BPF_BTF_LOAD(0x15, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:49 executing program 0: bpf$BPF_BTF_LOAD(0x18, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:49 executing program 5: bpf$BPF_BTF_LOAD(0x13, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:49 executing program 1: bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x7}, 0x2000000c, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_CSUM]}, 0xfffffffffffffe61}}, 0x0) 18:50:49 executing program 2: bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:49 executing program 0: bpf$BPF_BTF_LOAD(0x19, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:49 executing program 3: bpf$BPF_BTF_LOAD(0x16, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:50 executing program 2: bpf$BPF_BTF_LOAD(0x15, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:50 executing program 1: bpf$BPF_BTF_LOAD(0x15, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:50 executing program 5: bpf$BPF_BTF_LOAD(0x14, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:50 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x700}, 0x2000000c, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_CSUM]}, 0xfffffffffffffe61}}, 0x0) 18:50:50 executing program 0: bpf$BPF_BTF_LOAD(0x1a, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:50 executing program 3: bpf$BPF_BTF_LOAD(0x17, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:50 executing program 1: bpf$BPF_BTF_LOAD(0x16, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:50 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x7000000}, 0x2000000c, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_CSUM]}, 0xfffffffffffffe61}}, 0x0) 18:50:50 executing program 2: bpf$BPF_BTF_LOAD(0x16, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:50 executing program 5: bpf$BPF_BTF_LOAD(0x15, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:50 executing program 0: bpf$BPF_BTF_LOAD(0x1b, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:50 executing program 3: bpf$BPF_BTF_LOAD(0x18, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:50 executing program 1: bpf$BPF_BTF_LOAD(0x17, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:50 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0x2000000c, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_CSUM]}, 0xfffffffffffffe61}}, 0x0) 18:50:50 executing program 2: bpf$BPF_BTF_LOAD(0x17, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:50 executing program 5: bpf$BPF_BTF_LOAD(0x16, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:50 executing program 0: bpf$BPF_BTF_LOAD(0x1c, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:50 executing program 1: bpf$BPF_BTF_LOAD(0x18, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:50 executing program 3: bpf$BPF_BTF_LOAD(0x19, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:50 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x7}, 0x2000000c, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_CSUM]}, 0xfffffffffffffe61}}, 0x0) 18:50:50 executing program 2: bpf$BPF_BTF_LOAD(0x18, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:50 executing program 5: bpf$BPF_BTF_LOAD(0x17, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:50 executing program 0: bpf$BPF_BTF_LOAD(0x1d, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:50 executing program 3: bpf$BPF_BTF_LOAD(0x1a, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:50 executing program 1: bpf$BPF_BTF_LOAD(0x19, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x700}, 0x2000000c, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_CSUM]}, 0xfffffffffffffe61}}, 0x0) 18:50:51 executing program 0: bpf$BPF_BTF_LOAD(0x1e, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:51 executing program 5: bpf$BPF_BTF_LOAD(0x18, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:51 executing program 3: bpf$BPF_BTF_LOAD(0x1b, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:51 executing program 2: bpf$BPF_BTF_LOAD(0x19, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:51 executing program 1: bpf$BPF_BTF_LOAD(0x1a, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x7000000}, 0x2000000c, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_CSUM]}, 0xfffffffffffffe61}}, 0x0) 18:50:51 executing program 0: bpf$BPF_BTF_LOAD(0x21, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:51 executing program 3: bpf$BPF_BTF_LOAD(0x1c, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:51 executing program 5: bpf$BPF_BTF_LOAD(0x19, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:51 executing program 2: bpf$BPF_BTF_LOAD(0x1a, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:51 executing program 1: bpf$BPF_BTF_LOAD(0x1b, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0x2000000c, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_CSUM]}, 0xfffffffffffffe61}}, 0x0) 18:50:51 executing program 0: bpf$BPF_BTF_LOAD(0x22, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:51 executing program 3: bpf$BPF_BTF_LOAD(0x1d, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:51 executing program 5: bpf$BPF_BTF_LOAD(0x1a, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:51 executing program 2: bpf$BPF_BTF_LOAD(0x1b, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:51 executing program 0: bpf$BPF_BTF_LOAD(0x23, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:51 executing program 1: bpf$BPF_BTF_LOAD(0x1c, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0x2000000c, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x7, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_CSUM]}, 0xfffffffffffffe61}}, 0x0) 18:50:51 executing program 3: bpf$BPF_BTF_LOAD(0x1e, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:51 executing program 0: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:51 executing program 2: bpf$BPF_BTF_LOAD(0x1c, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:51 executing program 5: bpf$BPF_BTF_LOAD(0x1b, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:51 executing program 1: bpf$BPF_BTF_LOAD(0x1d, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0x2000000c, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x700, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_CSUM]}, 0xfffffffffffffe61}}, 0x0) 18:50:52 executing program 5: bpf$BPF_BTF_LOAD(0x1c, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:52 executing program 0: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x7}, 0x20) 18:50:52 executing program 2: bpf$BPF_BTF_LOAD(0x1d, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:52 executing program 3: bpf$BPF_BTF_LOAD(0x21, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:52 executing program 1: bpf$BPF_BTF_LOAD(0x1e, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:52 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0x2000000c, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_CSUM]}, 0xfffffffffffffe61}}, 0x0) 18:50:52 executing program 0: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x700}, 0x20) 18:50:52 executing program 5: bpf$BPF_BTF_LOAD(0x1d, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:52 executing program 2: bpf$BPF_BTF_LOAD(0x1e, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:52 executing program 3: bpf$BPF_BTF_LOAD(0x22, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:52 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0x2000000c, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x7, 0x0, {}, [@L2TP_ATTR_UDP_CSUM]}, 0xfffffffffffffe61}}, 0x0) 18:50:52 executing program 1: bpf$BPF_BTF_LOAD(0x21, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:52 executing program 0: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x7000000}, 0x20) 18:50:52 executing program 5: bpf$BPF_BTF_LOAD(0x1e, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:52 executing program 2: bpf$BPF_BTF_LOAD(0x21, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:52 executing program 3: bpf$BPF_BTF_LOAD(0x23, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:52 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0x2000000c, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x700, 0x0, {}, [@L2TP_ATTR_UDP_CSUM]}, 0xfffffffffffffe61}}, 0x0) 18:50:52 executing program 0: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:52 executing program 5: bpf$BPF_BTF_LOAD(0x21, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:52 executing program 1: bpf$BPF_BTF_LOAD(0x22, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:52 executing program 2: bpf$BPF_BTF_LOAD(0x22, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:52 executing program 3: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x200005a0) 18:50:52 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0x2000000c, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x7000000, 0x0, {}, [@L2TP_ATTR_UDP_CSUM]}, 0xfffffffffffffe61}}, 0x0) 18:50:52 executing program 0: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x7}, 0x20) 18:50:52 executing program 5: bpf$BPF_BTF_LOAD(0x22, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:52 executing program 1: bpf$BPF_BTF_LOAD(0x23, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:52 executing program 2: bpf$BPF_BTF_LOAD(0x23, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:52 executing program 3: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000000), &(0x7f0000000040)=0x4) socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_ERR_FILTER(r1, 0x65, 0x2, &(0x7f0000000080)=0x20, 0x4) 18:50:53 executing program 5: bpf$BPF_BTF_LOAD(0x23, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:53 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0x2000000c, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, [@L2TP_ATTR_UDP_CSUM]}, 0xfffffffffffffe61}}, 0x0) 18:50:53 executing program 0: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x700}, 0x20) 18:50:53 executing program 2: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x200005a0) 18:50:53 executing program 1: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x20) 18:50:53 executing program 0: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x7000000}, 0x20) 18:50:53 executing program 2: bpf$BPF_BTF_LOAD(0x3, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x47}, 0x20) 18:50:53 executing program 5: bpf$BPF_BTF_LOAD(0x8, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x0, 0x1}, 0x20) 18:50:53 executing program 1: bpf$BPF_BTF_LOAD(0x6, &(0x7f0000000580)={0x0, 0x0, 0x1a, 0x7}, 0x20) 18:50:53 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0x2000000c, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x7, {}, [@L2TP_ATTR_UDP_CSUM]}, 0xfffffffffffffe61}}, 0x0) 18:50:53 executing program 0: bpf$BPF_BTF_LOAD(0x9, &(0x7f0000000580)={0x0, 0x0, 0x1a}, 0x200005a0) [ 2774.700952][ T3253] ieee802154 phy0 wpan0: encryption failed: -22 [ 2774.707294][ T3253] ieee802154 phy1 wpan1: encryption failed: -22 [ 2836.149832][ T3253] ieee802154 phy0 wpan0: encryption failed: -22 [ 2836.156186][ T3253] ieee802154 phy1 wpan1: encryption failed: -22 [ 2882.858754][ T1644] INFO: task syz-executor.3:27789 blocked for more than 143 seconds. [ 2882.878060][ T1644] Not tainted 5.13.0-rc3-syzkaller #0 [ 2882.898557][ T1644] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2882.907271][ T1644] task:syz-executor.3 state:D stack:29592 pid:27789 ppid: 8472 flags:0x00004004 [ 2882.938664][ T1644] Call Trace: [ 2882.941999][ T1644] __schedule+0x916/0x23e0 [ 2882.946465][ T1644] ? io_schedule_timeout+0x140/0x140 [ 2882.968509][ T1644] ? mark_held_locks+0x9f/0xe0 [ 2882.973349][ T1644] ? rwlock_bug.part.0+0x90/0x90 [ 2882.978306][ T1644] schedule+0xcf/0x270 [ 2882.998504][ T1644] rwsem_down_write_slowpath+0x7e5/0x1200 [ 2883.004293][ T1644] ? rwsem_mark_wake+0x830/0x830 [ 2883.021628][ T1644] ? lock_release+0x720/0x720 [ 2883.037941][ T1644] down_write+0x137/0x150 [ 2883.042834][ T1644] ? down_write_killable+0x170/0x170 [ 2883.048158][ T1644] register_netdevice_notifier+0x1e/0x260 [ 2883.065765][ T1644] raw_init+0x296/0x340 [ 2883.074631][ T1644] ? raw_sock_no_ioctlcmd+0x10/0x10 [ 2883.091613][ T1644] can_create+0x27c/0x4d0 [ 2883.096305][ T1644] __sock_create+0x3de/0x780 [ 2883.110388][ T1644] __sys_socket+0xef/0x200 [ 2883.119229][ T1644] ? move_addr_to_kernel+0x70/0x70 [ 2883.138529][ T1644] __x64_sys_socket+0x6f/0xb0 [ 2883.152312][ T1644] ? syscall_enter_from_user_mode+0x27/0x70 [ 2883.176301][ T1644] do_syscall_64+0x3a/0xb0 [ 2883.189262][ T1644] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2883.218597][ T1644] RIP: 0033:0x4665d9 [ 2883.222552][ T1644] RSP: 002b:00007f061e9de188 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 2883.249305][ T1644] RAX: ffffffffffffffda RBX: 000000000056bf80 RCX: 00000000004665d9 [ 2883.257333][ T1644] RDX: 0000000000000001 RSI: 0000000000000003 RDI: 000000000000001d [ 2883.288661][ T1644] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 2883.296682][ T1644] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056bf80 [ 2883.328548][ T1644] R13: 00007ffd76df8b1f R14: 00007f061e9de300 R15: 0000000000022000 [ 2883.337117][ T1644] INFO: task syz-executor.3:27793 blocked for more than 143 seconds. [ 2883.360641][ T1644] Not tainted 5.13.0-rc3-syzkaller #0 [ 2883.366605][ T1644] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2883.398495][ T1644] task:syz-executor.3 state:D stack:29592 pid:27793 ppid: 8472 flags:0x00000004 [ 2883.407785][ T1644] Call Trace: [ 2883.428586][ T1644] __schedule+0x916/0x23e0 [ 2883.434704][ T1644] ? io_schedule_timeout+0x140/0x140 [ 2883.448489][ T1644] ? mark_held_locks+0x9f/0xe0 [ 2883.453398][ T1644] ? rwlock_bug.part.0+0x90/0x90 [ 2883.458367][ T1644] schedule+0xcf/0x270 [ 2883.479324][ T1644] rwsem_down_write_slowpath+0x7e5/0x1200 [ 2883.485989][ T1644] ? rwsem_mark_wake+0x830/0x830 [ 2883.508520][ T1644] ? lock_release+0x720/0x720 [ 2883.514071][ T1644] down_write+0x137/0x150 [ 2883.518419][ T1644] ? down_write_killable+0x170/0x170 [ 2883.534581][ T1644] register_netdevice_notifier+0x1e/0x260 [ 2883.548486][ T1644] raw_init+0x296/0x340 [ 2883.552701][ T1644] ? raw_sock_no_ioctlcmd+0x10/0x10 [ 2883.558128][ T1644] can_create+0x27c/0x4d0 [ 2883.580632][ T1644] __sock_create+0x3de/0x780 [ 2883.585297][ T1644] __sys_socket+0xef/0x200 [ 2883.598521][ T1644] ? move_addr_to_kernel+0x70/0x70 [ 2883.603854][ T1644] __x64_sys_socket+0x6f/0xb0 [ 2883.635938][ T1644] ? syscall_enter_from_user_mode+0x27/0x70 [ 2883.648514][ T1644] do_syscall_64+0x3a/0xb0 [ 2883.652995][ T1644] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2883.682918][ T1644] RIP: 0033:0x4665d9 [ 2883.688896][ T1644] RSP: 002b:00007f061e9bd188 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 2883.708575][ T1644] RAX: ffffffffffffffda RBX: 000000000056c038 RCX: 00000000004665d9 [ 2883.728140][ T1644] RDX: 0000000000000001 RSI: 0000000000000003 RDI: 000000000000001d [ 2883.759690][ T1644] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 2883.783924][ T1644] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056c038 [ 2883.806633][ T1644] R13: 00007ffd76df8b1f R14: 00007f061e9bd300 R15: 0000000000022000 [ 2883.828620][ T1644] INFO: task syz-executor.3:27800 blocked for more than 144 seconds. [ 2883.836731][ T1644] Not tainted 5.13.0-rc3-syzkaller #0 [ 2883.868503][ T1644] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2883.877220][ T1644] task:syz-executor.3 state:D stack:29592 pid:27800 ppid: 8472 flags:0x00000004 [ 2883.898474][ T1644] Call Trace: [ 2883.901884][ T1644] __schedule+0x916/0x23e0 [ 2883.906345][ T1644] ? io_schedule_timeout+0x140/0x140 [ 2883.928488][ T1644] ? mark_held_locks+0x9f/0xe0 [ 2883.933399][ T1644] ? rwlock_bug.part.0+0x90/0x90 [ 2883.938369][ T1644] schedule+0xcf/0x270 [ 2883.968495][ T1644] rwsem_down_write_slowpath+0x7e5/0x1200 [ 2883.974291][ T1644] ? rwsem_mark_wake+0x830/0x830 [ 2883.988481][ T1644] ? lock_release+0x720/0x720 [ 2883.993225][ T1644] down_write+0x137/0x150 [ 2883.997673][ T1644] ? down_write_killable+0x170/0x170 [ 2884.019264][ T1644] register_netdevice_notifier+0x1e/0x260 [ 2884.025066][ T1644] raw_init+0x296/0x340 [ 2884.038478][ T1644] ? raw_sock_no_ioctlcmd+0x10/0x10 [ 2884.043730][ T1644] can_create+0x27c/0x4d0 [ 2884.068479][ T1644] __sock_create+0x3de/0x780 [ 2884.073190][ T1644] __sys_socket+0xef/0x200 [ 2884.077630][ T1644] ? move_addr_to_kernel+0x70/0x70 [ 2884.098487][ T1644] __x64_sys_socket+0x6f/0xb0 [ 2884.103232][ T1644] ? syscall_enter_from_user_mode+0x27/0x70 [ 2884.118496][ T1644] do_syscall_64+0x3a/0xb0 [ 2884.122964][ T1644] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2884.138849][ T1644] RIP: 0033:0x4665d9 [ 2884.142800][ T1644] RSP: 002b:00007f061e99c188 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 2884.168514][ T1644] RAX: ffffffffffffffda RBX: 000000000056c0f0 RCX: 00000000004665d9 [ 2884.176723][ T1644] RDX: 0000000000000001 RSI: 0000000000000003 RDI: 000000000000001d [ 2884.208493][ T1644] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 2884.216605][ T1644] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056c0f0 [ 2884.239280][ T1644] R13: 00007ffd76df8b1f R14: 00007f061e99c300 R15: 0000000000022000 [ 2884.253990][ T1644] INFO: task syz-executor.3:27805 blocked for more than 144 seconds. [ 2884.280750][ T1644] Not tainted 5.13.0-rc3-syzkaller #0 [ 2884.286704][ T1644] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2884.318516][ T1644] task:syz-executor.3 state:D stack:29592 pid:27805 ppid: 8472 flags:0x00000004 [ 2884.327911][ T1644] Call Trace: [ 2884.350484][ T1644] __schedule+0x916/0x23e0 [ 2884.355715][ T1644] ? io_schedule_timeout+0x140/0x140 [ 2884.368565][ T1644] ? mark_held_locks+0x9f/0xe0 [ 2884.373381][ T1644] ? rwlock_bug.part.0+0x90/0x90 [ 2884.378341][ T1644] schedule+0xcf/0x270 [ 2884.398500][ T1644] rwsem_down_write_slowpath+0x7e5/0x1200 [ 2884.406217][ T1644] ? rwsem_mark_wake+0x830/0x830 [ 2884.428591][ T1644] ? lock_release+0x720/0x720 [ 2884.433354][ T1644] down_write+0x137/0x150 [ 2884.437795][ T1644] ? down_write_killable+0x170/0x170 [ 2884.444798][ T1644] register_netdevice_notifier+0x1e/0x260 [ 2884.453352][ T1644] raw_init+0x296/0x340 [ 2884.458159][ T1644] ? raw_sock_no_ioctlcmd+0x10/0x10 [ 2884.473838][ T1644] can_create+0x27c/0x4d0 [ 2884.483013][ T1644] __sock_create+0x3de/0x780 [ 2884.487819][ T1644] __sys_socket+0xef/0x200 [ 2884.498814][ T1644] ? move_addr_to_kernel+0x70/0x70 [ 2884.504205][ T1644] __x64_sys_socket+0x6f/0xb0 [ 2884.520643][ T1644] ? syscall_enter_from_user_mode+0x27/0x70 [ 2884.526577][ T1644] do_syscall_64+0x3a/0xb0 [ 2884.543127][ T1644] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2884.555124][ T1644] RIP: 0033:0x4665d9 [ 2884.563623][ T1644] RSP: 002b:00007f061e97b188 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 2884.578881][ T1644] RAX: ffffffffffffffda RBX: 000000000056c1a8 RCX: 00000000004665d9 [ 2884.587193][ T1644] RDX: 0000000000000001 RSI: 0000000000000003 RDI: 000000000000001d [ 2884.604385][ T1644] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 2884.615612][ T1644] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056c1a8 [ 2884.631955][ T1644] R13: 00007ffd76df8b1f R14: 00007f061e97b300 R15: 0000000000022000 [ 2884.646541][ T1644] INFO: task syz-executor.3:27830 blocked for more than 145 seconds. [ 2884.664274][ T1644] Not tainted 5.13.0-rc3-syzkaller #0 [ 2884.675173][ T1644] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2884.694080][ T1644] task:syz-executor.3 state:D stack:28792 pid:27830 ppid: 8472 flags:0x00000004 [ 2884.715612][ T1644] Call Trace: [ 2884.719848][ T1644] __schedule+0x916/0x23e0 [ 2884.724639][ T1644] ? io_schedule_timeout+0x140/0x140 [ 2884.740047][ T1644] ? mark_held_locks+0x9f/0xe0 [ 2884.744983][ T1644] ? rwlock_bug.part.0+0x90/0x90 [ 2884.760310][ T1644] schedule+0xcf/0x270 [ 2884.766017][ T1644] rwsem_down_write_slowpath+0x7e5/0x1200 [ 2884.781397][ T1644] ? rwsem_mark_wake+0x830/0x830 [ 2884.786499][ T1644] ? lock_release+0x720/0x720 [ 2884.804037][ T1644] down_write+0x137/0x150 [ 2884.812104][ T1644] ? down_write_killable+0x170/0x170 [ 2884.818178][ T1644] register_netdevice_notifier+0x1e/0x260 [ 2884.829122][ T1644] raw_init+0x296/0x340 [ 2884.833405][ T1644] ? raw_sock_no_ioctlcmd+0x10/0x10 [ 2884.846519][ T1644] can_create+0x27c/0x4d0 [ 2884.852541][ T1644] __sock_create+0x3de/0x780 [ 2884.858019][ T1644] __sys_socket+0xef/0x200 [ 2884.871921][ T1644] ? move_addr_to_kernel+0x70/0x70 [ 2884.877181][ T1644] __x64_sys_socket+0x6f/0xb0 [ 2884.888411][ T1644] ? syscall_enter_from_user_mode+0x27/0x70 [ 2884.904422][ T1644] do_syscall_64+0x3a/0xb0 [ 2884.914461][ T1644] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2884.925480][ T1644] RIP: 0033:0x4665d9 [ 2884.934173][ T1644] RSP: 002b:00007f061e95a188 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 2884.952288][ T1644] RAX: ffffffffffffffda RBX: 000000000056c260 RCX: 00000000004665d9 [ 2884.967123][ T1644] RDX: 0000000000000001 RSI: 0000000000000003 RDI: 000000000000001d [ 2884.975954][ T1644] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 2884.984674][ T1644] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056c260 [ 2884.995278][ T1644] R13: 00007ffd76df8b1f R14: 00007f061e95a300 R15: 0000000000022000 [ 2885.004072][ T1644] INFO: task syz-executor.3:27831 blocked for more than 145 seconds. [ 2885.014087][ T1644] Not tainted 5.13.0-rc3-syzkaller #0 [ 2885.025150][ T1644] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2885.043559][ T1644] task:syz-executor.3 state:D stack:29048 pid:27831 ppid: 8472 flags:0x00000004 [ 2885.063785][ T1644] Call Trace: [ 2885.067182][ T1644] __schedule+0x916/0x23e0 [ 2885.079934][ T1644] ? io_schedule_timeout+0x140/0x140 [ 2885.085282][ T1644] ? mark_held_locks+0x9f/0xe0 [ 2885.098543][ T1644] ? rwlock_bug.part.0+0x90/0x90 [ 2885.103555][ T1644] schedule+0xcf/0x270 [ 2885.107730][ T1644] rwsem_down_write_slowpath+0x7e5/0x1200 [ 2885.126891][ T1644] ? rwsem_mark_wake+0x830/0x830 [ 2885.134941][ T1644] ? lock_release+0x720/0x720 [ 2885.147677][ T1644] down_write+0x137/0x150 [ 2885.155021][ T1644] ? down_write_killable+0x170/0x170 [ 2885.167341][ T1644] register_netdevice_notifier+0x1e/0x260 [ 2885.175819][ T1644] raw_init+0x296/0x340 [ 2885.180745][ T1644] ? raw_sock_no_ioctlcmd+0x10/0x10 [ 2885.185981][ T1644] can_create+0x27c/0x4d0 [ 2885.192549][ T1644] __sock_create+0x3de/0x780 [ 2885.197178][ T1644] __sys_socket+0xef/0x200 [ 2885.202584][ T1644] ? move_addr_to_kernel+0x70/0x70 [ 2885.207740][ T1644] __x64_sys_socket+0x6f/0xb0 [ 2885.213528][ T1644] ? syscall_enter_from_user_mode+0x27/0x70 [ 2885.221287][ T1644] do_syscall_64+0x3a/0xb0 [ 2885.225738][ T1644] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2885.232719][ T1644] RIP: 0033:0x4665d9 [ 2885.236637][ T1644] RSP: 002b:00007f061e939188 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 2885.246921][ T1644] RAX: ffffffffffffffda RBX: 000000000056c318 RCX: 00000000004665d9 [ 2885.255500][ T1644] RDX: 0000000000000001 RSI: 0000000000000003 RDI: 000000000000001d [ 2885.264146][ T1644] RBP: 00000000004bfcb9 R08: 0000000000000000 R09: 0000000000000000 [ 2885.279292][ T1644] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000056c318 [ 2885.287303][ T1644] R13: 00007ffd76df8b1f R14: 00007f061e939300 R15: 0000000000022000 [ 2885.318498][ T1644] [ 2885.318498][ T1644] Showing all locks held in the system: [ 2885.326347][ T1644] 3 locks held by kworker/u4:5/190: [ 2885.357842][ T1644] 1 lock held by khungtaskd/1644: [ 2885.363615][ T1644] #0: ffffffff8bf79320 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x53/0x260 [ 2885.374158][ T1644] 1 lock held by systemd-udevd/4864: [ 2885.381480][ T1644] 1 lock held by in:imklog/8137: [ 2885.386789][ T1644] #0: ffff88802791c870 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0xe9/0x100 [ 2885.397083][ T1644] 1 lock held by syz-executor.3/27789: [ 2885.403487][ T1644] #0: ffffffff8d692b50 (pernet_ops_rwsem){++++}-{3:3}, at: register_netdevice_notifier+0x1e/0x260 [ 2885.414974][ T1644] 1 lock held by syz-executor.3/27793: [ 2885.423148][ T1644] #0: ffffffff8d692b50 (pernet_ops_rwsem){++++}-{3:3}, at: register_netdevice_notifier+0x1e/0x260 [ 2885.434577][ T1644] 1 lock held by syz-executor.3/27800: [ 2885.442020][ T1644] #0: ffffffff8d692b50 (pernet_ops_rwsem){++++}-{3:3}, at: register_netdevice_notifier+0x1e/0x260 [ 2885.476072][ T1644] 1 lock held by syz-executor.3/27805: [ 2885.499228][ T1644] #0: ffffffff8d692b50 (pernet_ops_rwsem){++++}-{3:3}, at: register_netdevice_notifier+0x1e/0x260 [ 2885.538489][ T1644] 1 lock held by syz-executor.3/27830: [ 2885.544055][ T1644] #0: ffffffff8d692b50 (pernet_ops_rwsem){++++}-{3:3}, at: register_netdevice_notifier+0x1e/0x260 [ 2885.568479][ T1644] 1 lock held by syz-executor.3/27831: [ 2885.573984][ T1644] #0: ffffffff8d692b50 (pernet_ops_rwsem){++++}-{3:3}, at: register_netdevice_notifier+0x1e/0x260 [ 2885.608655][ T1644] [ 2885.611034][ T1644] ============================================= [ 2885.611034][ T1644] [ 2885.631447][ T1644] NMI backtrace for cpu 0 [ 2885.635810][ T1644] CPU: 0 PID: 1644 Comm: khungtaskd Not tainted 5.13.0-rc3-syzkaller #0 [ 2885.644150][ T1644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2885.654224][ T1644] Call Trace: [ 2885.657531][ T1644] dump_stack+0x141/0x1d7 [ 2885.661890][ T1644] nmi_cpu_backtrace.cold+0x44/0xd7 [ 2885.667112][ T1644] ? lapic_can_unplug_cpu+0x80/0x80 [ 2885.672586][ T1644] nmi_trigger_cpumask_backtrace+0x1b3/0x230 [ 2885.678582][ T1644] watchdog+0xd48/0xfb0 [ 2885.682757][ T1644] ? reset_hung_task_detector+0x30/0x30 [ 2885.688413][ T1644] kthread+0x3b1/0x4a0 [ 2885.692571][ T1644] ? __kthread_bind_mask+0xc0/0xc0 [ 2885.697700][ T1644] ret_from_fork+0x1f/0x30 [ 2885.703008][ T1644] Sending NMI from CPU 0 to CPUs 1: [ 2885.708924][ C1] NMI backtrace for cpu 1 [ 2885.708934][ C1] CPU: 1 PID: 4864 Comm: systemd-udevd Not tainted 5.13.0-rc3-syzkaller #0 [ 2885.708942][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2885.708950][ C1] RIP: 0010:set_root+0x23f/0x5a0 [ 2885.708958][ C1] Code: 0f 85 3d 03 00 00 48 b9 00 00 00 00 00 fc ff df 48 8b 45 b0 48 c1 e8 03 66 83 3c 08 00 0f 85 2e 03 00 00 49 8b 86 88 00 00 00 <48> b9 00 00 00 00 00 fc ff df 49 8b 96 90 00 00 00 48 89 43 20 48 [ 2885.708971][ C1] RSP: 0018:ffffc9000154f970 EFLAGS: 00000246 [ 2885.708981][ C1] RAX: ffff8881459416a0 RBX: ffffc9000154fc50 RCX: dffffc0000000000 [ 2885.708988][ C1] RDX: ffff88801d6e54c0 RSI: ffffffff81c87c1d RDI: 0000000000000003 [ 2885.708995][ C1] RBP: ffffc9000154f9e8 R08: 0000000000000000 R09: 0000000000000001 [ 2885.709002][ C1] R10: ffffffff81c87bde R11: 000000000000002f R12: 0000000000000004 [ 2885.709009][ C1] R13: 0000000000000000 R14: ffff8880181c1e00 R15: ffff8880181c1e50 [ 2885.709017][ C1] FS: 00007f54110928c0(0000) GS:ffff8880b9d00000(0000) knlGS:0000000000000000 [ 2885.709024][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2885.709030][ C1] CR2: 00007f5411092710 CR3: 00000000185a1000 CR4: 00000000001506e0 [ 2885.709037][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2885.709044][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2885.709049][ C1] Call Trace: [ 2885.709053][ C1] ? nd_jump_root+0xa0/0x570 [ 2885.709058][ C1] nd_jump_root+0x3c7/0x570 [ 2885.709062][ C1] path_init+0x1028/0x1910 [ 2885.709067][ C1] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2885.709073][ C1] ? percpu_counter_add_batch+0xbd/0x180 [ 2885.709078][ C1] ? path_openat+0x16c/0x27e0 [ 2885.709083][ C1] path_openat+0x185/0x27e0 [ 2885.709087][ C1] ? __lock_acquire+0x16a7/0x5230 [ 2885.709092][ C1] ? path_lookupat+0x850/0x850 [ 2885.709097][ C1] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2885.709102][ C1] do_filp_open+0x190/0x3d0 [ 2885.709107][ C1] ? may_open_dev+0xf0/0xf0 [ 2885.709111][ C1] ? alloc_fd+0x2e6/0x660 [ 2885.709116][ C1] ? do_raw_spin_lock+0x120/0x2b0 [ 2885.709121][ C1] ? rwlock_bug.part.0+0x90/0x90 [ 2885.709126][ C1] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 2885.709131][ C1] ? _find_next_bit+0x1e3/0x260 [ 2885.709136][ C1] ? _raw_spin_unlock+0x24/0x40 [ 2885.709140][ C1] ? alloc_fd+0x2e6/0x660 [ 2885.709145][ C1] do_sys_openat2+0x16d/0x420 [ 2885.709150][ C1] ? build_open_flags+0x6f0/0x6f0 [ 2885.709155][ C1] ? __context_tracking_exit+0xb8/0xe0 [ 2885.709160][ C1] __x64_sys_open+0x119/0x1c0 [ 2885.709165][ C1] ? do_sys_open+0x140/0x140 [ 2885.709169][ C1] ? __secure_computing+0x104/0x360 [ 2885.709174][ C1] do_syscall_64+0x3a/0xb0 [ 2885.709179][ C1] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 2885.709184][ C1] RIP: 0033:0x7f54101d8840 [ 2885.709192][ C1] Code: 73 01 c3 48 8b 0d 68 77 20 00 f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 83 3d 89 bb 20 00 00 75 10 b8 02 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 1e f6 ff ff 48 89 04 24 [ 2885.709204][ C1] RSP: 002b:00007ffc3396abb8 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 2885.709220][ C1] RAX: ffffffffffffffda RBX: 00007ffc3396ac70 RCX: 00007f54101d8840 [ 2885.709227][ C1] RDX: 00005565e9dfffe3 RSI: 00000000000a0800 RDI: 00005565eaf4ed30 [ 2885.709233][ C1] RBP: 0000000000000000 R08: 00005565e9dff670 R09: 0000000000000010 [ 2885.709241][ C1] R10: 0000000000000020 R11: 0000000000000246 R12: 00007ffc3396ad60 [ 2885.709248][ C1] R13: 00005565ea9f7010 R14: 00005565eaafc320 R15: 00007ffc3396ac30 [ 2886.318574][ T1644] Kernel panic - not syncing: hung_task: blocked tasks [ 2886.325562][ T1644] CPU: 1 PID: 1644 Comm: khungtaskd Not tainted 5.13.0-rc3-syzkaller #0 [ 2886.334089][ T1644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2886.344165][ T1644] Call Trace: [ 2886.347471][ T1644] dump_stack+0x141/0x1d7 [ 2886.351892][ T1644] panic+0x306/0x73d [ 2886.355869][ T1644] ? __warn_printk+0xf3/0xf3 [ 2886.360486][ T1644] ? lapic_can_unplug_cpu+0x80/0x80 [ 2886.365711][ T1644] ? preempt_schedule_thunk+0x16/0x18 [ 2886.371109][ T1644] ? nmi_trigger_cpumask_backtrace+0x196/0x230 [ 2886.377296][ T1644] ? watchdog.cold+0x5/0x158 [ 2886.381946][ T1644] watchdog.cold+0x16/0x158 [ 2886.386483][ T1644] ? reset_hung_task_detector+0x30/0x30 [ 2886.393018][ T1644] kthread+0x3b1/0x4a0 [ 2886.397116][ T1644] ? __kthread_bind_mask+0xc0/0xc0 [ 2886.402309][ T1644] ret_from_fork+0x1f/0x30 [ 2886.407953][ T1644] Kernel Offset: disabled [ 2886.412293][ T1644] Rebooting in 86400 seconds..