t_family_id$wireguard(&(0x7f0000000340), r0) bpf$MAP_CREATE(0x4, &(0x7f0000002600)=@base={0x0, 0x0, 0x0, 0x5, 0x100, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0}, 0x48) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) keyctl$update(0x2, 0x0, &(0x7f0000000440)="977f8625a65882c70ae30499b45c71384510adb6a9d0f283a5098a318d2e10f0ebd9277d803fac8b5cd341ae3ccf0a86a6d8bff70f1ddb8a8cf777b7a4e3c783083cb9286a893f7a26deef624ba6f9c211c2dacc7c68ad208a1c82858122053ed136d3d778879a67559bd346757e980e8b253ae7ba8843899cc3cce7", 0x7c) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000800000000000003000000851ac0ff04000000180000000200000000000000010000002594f0fffcffffff08310000030000000000000000000000183000000400"/80], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0, r0, 0x1, r1]}, 0x80) prctl$PR_SET_FP_MODE(0x2d, 0x0) 05:13:37 executing program 1: socketpair(0x0, 0x0, 0x7fffffff, &(0x7f0000000000)) 05:13:37 executing program 0: pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) bpf$MAP_CREATE(0x4, &(0x7f0000002600)=@base={0x0, 0x0, 0x0, 0x5, 0x100, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0}, 0x48) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) keyctl$update(0x2, 0x0, &(0x7f0000000440)="977f8625a65882c70ae30499b45c71384510adb6a9d0f283a5098a318d2e10f0ebd9277d803fac8b5cd341ae3ccf0a86a6d8bff70f1ddb8a8cf777b7a4e3c783083cb9286a893f7a26deef624ba6f9c211c2dacc7c68ad208a1c82858122053ed136d3d778879a67559bd346757e980e8b253ae7ba8843899cc3cce7", 0x7c) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000800000000000003000000851ac0ff04000000180000000200000000000000010000002594f0fffcffffff08310000030000000000000000000000183000000400"/80], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0, r0, 0x1, r1]}, 0x80) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000300), r2) prctl$PR_SET_FP_MODE(0x2d, 0x0) 05:13:37 executing program 4: socketpair(0xa, 0x6, 0x7fffffff, 0x0) 05:13:37 executing program 2: syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/mnt\x00') 05:13:37 executing program 5: pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) bpf$MAP_CREATE(0x4, &(0x7f0000002600)=@base={0x0, 0x0, 0x0, 0x5, 0x100, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0}, 0x48) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) keyctl$update(0x2, 0x0, &(0x7f0000000440)="977f8625a65882c70ae30499b45c71384510adb6a9d0f283a5098a318d2e10f0ebd9277d803fac8b5cd341ae3ccf0a86a6d8bff70f1ddb8a8cf777b7a4e3c783083cb9286a893f7a26deef624ba6f9c211c2dacc7c68ad208a1c82858122053ed136d3d778879a67559bd346757e980e8b253ae7ba8843899cc3cce7", 0x7c) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r1) prctl$PR_SET_FP_MODE(0x2d, 0x0) 05:13:37 executing program 3: bpf$MAP_CREATE(0x5, &(0x7f0000002600), 0x48) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/module/dvb_usb_az6027', 0x400, 0x2) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r1) syz_genetlink_get_family_id$gtp(&(0x7f0000000000), 0xffffffffffffffff) pipe2$watch_queue(&(0x7f0000000380), 0x80) 05:13:37 executing program 2: socketpair(0xa, 0x6, 0x0, &(0x7f0000000000)) 05:13:37 executing program 1: socketpair(0x0, 0x0, 0x7fffffff, &(0x7f0000000000)) 05:13:37 executing program 0: pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) bpf$MAP_CREATE(0x4, &(0x7f0000002600)=@base={0x0, 0x0, 0x0, 0x5, 0x100, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0}, 0x48) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) keyctl$update(0x2, 0x0, &(0x7f0000000440)="977f8625a65882c70ae30499b45c71384510adb6a9d0f283a5098a318d2e10f0ebd9277d803fac8b5cd341ae3ccf0a86a6d8bff70f1ddb8a8cf777b7a4e3c783083cb9286a893f7a26deef624ba6f9c211c2dacc7c68ad208a1c82858122053ed136d3d778879a67559bd346757e980e8b253ae7ba8843899cc3cce7", 0x7c) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000800000000000003000000851ac0ff04000000180000000200000000000000010000002594f0fffcffffff08310000030000000000000000000000183000000400"/80], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0, r0, 0x1, r1]}, 0x80) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000300), r2) 05:13:37 executing program 5: pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) bpf$MAP_CREATE(0x4, &(0x7f0000002600)=@base={0x0, 0x0, 0x0, 0x5, 0x100, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0}, 0x48) pipe2$watch_queue(&(0x7f0000000380), 0x80) keyctl$update(0x2, 0x0, &(0x7f0000000440)="977f8625a65882c70ae30499b45c71384510adb6a9d0f283a5098a318d2e10f0ebd9277d803fac8b5cd341ae3ccf0a86a6d8bff70f1ddb8a8cf777b7a4e3c783083cb9286a893f7a26deef624ba6f9c211c2dacc7c68ad208a1c82858122053ed136d3d778879a67559bd346757e980e8b253ae7ba8843899cc3cce7", 0x7c) prctl$PR_SET_FP_MODE(0x2d, 0x0) 05:13:37 executing program 4: bpf$MAP_CREATE(0x4, &(0x7f0000002600), 0x48) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x80, 0x7, 0x8000, 0x6, {{0x2b, 0x4, 0x0, 0x0, 0xac, 0x66, 0x0, 0x3, 0x4, 0x0, @local, @loopback, {[@timestamp_prespec={0x44, 0x24, 0x4a, 0x3, 0xa, [{@empty, 0x3ff}, {@rand_addr=0x64010100, 0xfffffffe}, {@multicast1, 0x8}, {@broadcast, 0xebe0000}]}, @timestamp={0x44, 0x1c, 0xf, 0x0, 0x2, [0x200, 0x5, 0x30, 0x4, 0x200, 0x3]}, @timestamp_prespec={0x44, 0x1c, 0xbd, 0x3, 0x4, [{@empty, 0x2}, {@private=0xa010102, 0x4}, {@broadcast, 0xca0}]}, @timestamp_addr={0x44, 0x14, 0x88, 0x1, 0x1, [{@local, 0x1}, {@rand_addr=0x64010102, 0x9}]}, @noop, @noop, @timestamp_addr={0x44, 0x24, 0x18, 0x1, 0x0, [{@multicast1, 0x8001}, {@dev={0xac, 0x14, 0x14, 0x14}, 0x5}, {@empty, 0x400}, {@empty, 0xa3}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', r1, 0x7800, 0x1, 0x1ff, 0x5, {{0x1c, 0x4, 0x2, 0x5, 0x70, 0x65, 0x0, 0x40, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x83, 0xc, "965bc963e4404d56e32b"}, @lsrr={0x83, 0xf, 0x12, [@broadcast, @dev={0xac, 0x14, 0x14, 0x3d}, @local]}]}}}}}) 05:13:37 executing program 3: bpf$MAP_CREATE(0x5, &(0x7f0000002600), 0x48) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/module/dvb_usb_az6027', 0x400, 0x2) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r1) syz_genetlink_get_family_id$gtp(&(0x7f0000000000), 0xffffffffffffffff) pipe2$watch_queue(&(0x7f0000000380), 0x80) 05:13:37 executing program 2: socketpair(0xa, 0x6, 0x0, &(0x7f0000000000)) 05:13:37 executing program 1: socketpair(0xa, 0x0, 0x0, &(0x7f0000000000)) 05:13:37 executing program 0: pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) bpf$MAP_CREATE(0x4, &(0x7f0000002600)=@base={0x0, 0x0, 0x0, 0x5, 0x100, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0}, 0x48) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) keyctl$update(0x2, 0x0, &(0x7f0000000440)="977f8625a65882c70ae30499b45c71384510adb6a9d0f283a5098a318d2e10f0ebd9277d803fac8b5cd341ae3ccf0a86a6d8bff70f1ddb8a8cf777b7a4e3c783083cb9286a893f7a26deef624ba6f9c211c2dacc7c68ad208a1c82858122053ed136d3d778879a67559bd346757e980e8b253ae7ba8843899cc3cce7", 0x7c) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000800000000000003000000851ac0ff04000000180000000200000000000000010000002594f0fffcffffff08310000030000000000000000000000183000000400"/80], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0, r0, 0x1, r1]}, 0x80) socket$nl_generic(0x10, 0x3, 0x10) 05:13:37 executing program 2: socketpair(0xa, 0x6, 0x0, &(0x7f0000000000)) 05:13:37 executing program 4: bpf$MAP_CREATE(0x4, &(0x7f0000002600), 0x48) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x80, 0x7, 0x8000, 0x6, {{0x2b, 0x4, 0x0, 0x0, 0xac, 0x66, 0x0, 0x3, 0x4, 0x0, @local, @loopback, {[@timestamp_prespec={0x44, 0x24, 0x4a, 0x3, 0xa, [{@empty, 0x3ff}, {@rand_addr=0x64010100, 0xfffffffe}, {@multicast1, 0x8}, {@broadcast, 0xebe0000}]}, @timestamp={0x44, 0x1c, 0xf, 0x0, 0x2, [0x200, 0x5, 0x30, 0x4, 0x200, 0x3]}, @timestamp_prespec={0x44, 0x1c, 0xbd, 0x3, 0x4, [{@empty, 0x2}, {@private=0xa010102, 0x4}, {@broadcast, 0xca0}]}, @timestamp_addr={0x44, 0x14, 0x88, 0x1, 0x1, [{@local, 0x1}, {@rand_addr=0x64010102, 0x9}]}, @noop, @noop, @timestamp_addr={0x44, 0x24, 0x18, 0x1, 0x0, [{@multicast1, 0x8001}, {@dev={0xac, 0x14, 0x14, 0x14}, 0x5}, {@empty, 0x400}, {@empty, 0xa3}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', r1, 0x7800, 0x1, 0x1ff, 0x5, {{0x1c, 0x4, 0x2, 0x5, 0x70, 0x65, 0x0, 0x40, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x83, 0xc, "965bc963e4404d56e32b"}, @lsrr={0x83, 0xf, 0x12, [@broadcast, @dev={0xac, 0x14, 0x14, 0x3d}, @local]}]}}}}}) 05:13:37 executing program 5: pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) bpf$MAP_CREATE(0x4, &(0x7f0000002600)=@base={0x0, 0x0, 0x0, 0x5, 0x100, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0}, 0x48) pipe2$watch_queue(&(0x7f0000000380), 0x80) prctl$PR_SET_FP_MODE(0x2d, 0x0) 05:13:37 executing program 3: bpf$MAP_CREATE(0x5, &(0x7f0000002600), 0x48) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/module/dvb_usb_az6027', 0x400, 0x2) pipe2$watch_queue(&(0x7f0000000380), 0x80) socket$packet(0x11, 0x2, 0x300) syz_genetlink_get_family_id$gtp(&(0x7f0000000000), 0xffffffffffffffff) pipe2$watch_queue(&(0x7f0000000380), 0x80) 05:13:37 executing program 0: pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) bpf$MAP_CREATE(0x4, &(0x7f0000002600)=@base={0x0, 0x0, 0x0, 0x5, 0x100, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0}, 0x48) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) keyctl$update(0x2, 0x0, &(0x7f0000000440)="977f8625a65882c70ae30499b45c71384510adb6a9d0f283a5098a318d2e10f0ebd9277d803fac8b5cd341ae3ccf0a86a6d8bff70f1ddb8a8cf777b7a4e3c783083cb9286a893f7a26deef624ba6f9c211c2dacc7c68ad208a1c82858122053ed136d3d778879a67559bd346757e980e8b253ae7ba8843899cc3cce7", 0x7c) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000800000000000003000000851ac0ff04000000180000000200000000000000010000002594f0fffcffffff08310000030000000000000000000000183000000400"/80], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0, r0, 0x1, r1]}, 0x80) 05:13:37 executing program 3: bpf$MAP_CREATE(0x5, &(0x7f0000002600), 0x48) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/module/dvb_usb_az6027', 0x400, 0x2) socket$packet(0x11, 0x2, 0x300) syz_genetlink_get_family_id$gtp(&(0x7f0000000000), 0xffffffffffffffff) pipe2$watch_queue(&(0x7f0000000380), 0x80) 05:13:37 executing program 2: socketpair(0x0, 0x6, 0x0, &(0x7f0000000000)) 05:13:37 executing program 5: pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) bpf$MAP_CREATE(0x4, &(0x7f0000002600)=@base={0x0, 0x0, 0x0, 0x5, 0x100, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0}, 0x48) prctl$PR_SET_FP_MODE(0x2d, 0x0) 05:13:37 executing program 4: bpf$MAP_CREATE(0x4, &(0x7f0000002600), 0x48) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000100)={'tunl0\x00', &(0x7f0000000000)={'syztnl0\x00', 0x0, 0x80, 0x7, 0x8000, 0x6, {{0x2b, 0x4, 0x0, 0x0, 0xac, 0x66, 0x0, 0x3, 0x4, 0x0, @local, @loopback, {[@timestamp_prespec={0x44, 0x24, 0x4a, 0x3, 0xa, [{@empty, 0x3ff}, {@rand_addr=0x64010100, 0xfffffffe}, {@multicast1, 0x8}, {@broadcast, 0xebe0000}]}, @timestamp={0x44, 0x1c, 0xf, 0x0, 0x2, [0x200, 0x5, 0x30, 0x4, 0x200, 0x3]}, @timestamp_prespec={0x44, 0x1c, 0xbd, 0x3, 0x4, [{@empty, 0x2}, {@private=0xa010102, 0x4}, {@broadcast, 0xca0}]}, @timestamp_addr={0x44, 0x14, 0x88, 0x1, 0x1, [{@local, 0x1}, {@rand_addr=0x64010102, 0x9}]}, @noop, @noop, @timestamp_addr={0x44, 0x24, 0x18, 0x1, 0x0, [{@multicast1, 0x8001}, {@dev={0xac, 0x14, 0x14, 0x14}, 0x5}, {@empty, 0x400}, {@empty, 0xa3}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', r1, 0x7800, 0x1, 0x1ff, 0x5, {{0x1c, 0x4, 0x2, 0x5, 0x70, 0x65, 0x0, 0x40, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x83, 0xc, "965bc963e4404d56e32b"}, @lsrr={0x83, 0xf, 0x12, [@broadcast, @dev={0xac, 0x14, 0x14, 0x3d}, @local]}]}}}}}) 05:13:37 executing program 0: pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) bpf$MAP_CREATE(0x4, &(0x7f0000002600)=@base={0x0, 0x0, 0x0, 0x5, 0x100, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0}, 0x48) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) keyctl$update(0x2, 0x0, &(0x7f0000000440)="977f8625a65882c70ae30499b45c71384510adb6a9d0f283a5098a318d2e10f0ebd9277d803fac8b5cd341ae3ccf0a86a6d8bff70f1ddb8a8cf777b7a4e3c783083cb9286a893f7a26deef624ba6f9c211c2dacc7c68ad208a1c82858122053ed136d3d778879a67559bd346757e980e8b253ae7ba8843899cc3cce7", 0x7c) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000800000000000003000000851ac0ff04000000180000000200000000000000010000002594f0fffcffffff08310000030000000000000000000000183000000400"/80], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0, r0, 0x1, r1]}, 0x80) 05:13:37 executing program 1: socketpair(0xa, 0x0, 0x0, &(0x7f0000000000)) 05:13:37 executing program 4: bpf$MAP_CREATE(0x4, &(0x7f0000002600), 0x48) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x7800, 0x1, 0x1ff, 0x5, {{0x1c, 0x4, 0x2, 0x5, 0x70, 0x65, 0x0, 0x40, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x83, 0xc, "965bc963e4404d56e32b"}, @lsrr={0x83, 0xf, 0x12, [@broadcast, @dev={0xac, 0x14, 0x14, 0x3d}, @local]}]}}}}}) 05:13:37 executing program 3: bpf$MAP_CREATE(0x5, &(0x7f0000002600), 0x48) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) socket$packet(0x11, 0x2, 0x300) syz_genetlink_get_family_id$gtp(&(0x7f0000000000), 0xffffffffffffffff) pipe2$watch_queue(&(0x7f0000000380), 0x80) 05:13:37 executing program 5: pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) prctl$PR_SET_FP_MODE(0x2d, 0x0) 05:13:37 executing program 0: pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) bpf$MAP_CREATE(0x4, &(0x7f0000002600)=@base={0x0, 0x0, 0x0, 0x5, 0x100, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0}, 0x48) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000800000000000003000000851ac0ff04000000180000000200000000000000010000002594f0fffcffffff08310000030000000000000000000000183000000400"/80], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0, r0, 0x1, r1]}, 0x80) 05:13:37 executing program 4: bpf$MAP_CREATE(0x4, &(0x7f0000002600), 0x48) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x7800, 0x1, 0x1ff, 0x5, {{0x1c, 0x4, 0x2, 0x5, 0x70, 0x65, 0x0, 0x40, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x83, 0xc, "965bc963e4404d56e32b"}, @lsrr={0x83, 0xf, 0x12, [@broadcast, @dev={0xac, 0x14, 0x14, 0x3d}, @local]}]}}}}}) 05:13:38 executing program 3: bpf$MAP_CREATE(0x5, &(0x7f0000002600), 0x48) pipe2$watch_queue(&(0x7f0000000380), 0x80) socket$packet(0x11, 0x2, 0x300) syz_genetlink_get_family_id$gtp(&(0x7f0000000000), 0xffffffffffffffff) pipe2$watch_queue(&(0x7f0000000380), 0x80) 05:13:38 executing program 2: socketpair(0x0, 0x6, 0x0, &(0x7f0000000000)) 05:13:38 executing program 5: pipe2$watch_queue(&(0x7f0000000380), 0x80) prctl$PR_SET_FP_MODE(0x2d, 0x0) 05:13:38 executing program 0: pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) bpf$MAP_CREATE(0x4, &(0x7f0000002600)=@base={0x0, 0x0, 0x0, 0x5, 0x100, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000800000000000003000000851ac0ff04000000180000000200000000000000010000002594f0fffcffffff08310000030000000000000000000000183000000400"/80], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0, r0, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:38 executing program 4: bpf$MAP_CREATE(0x4, &(0x7f0000002600), 0x48) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x7800, 0x1, 0x1ff, 0x5, {{0x1c, 0x4, 0x2, 0x5, 0x70, 0x65, 0x0, 0x40, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x83, 0xc, "965bc963e4404d56e32b"}, @lsrr={0x83, 0xf, 0x12, [@broadcast, @dev={0xac, 0x14, 0x14, 0x3d}, @local]}]}}}}}) 05:13:38 executing program 3: bpf$MAP_CREATE(0x5, &(0x7f0000002600), 0x48) socket$packet(0x11, 0x2, 0x300) syz_genetlink_get_family_id$gtp(&(0x7f0000000000), 0xffffffffffffffff) pipe2$watch_queue(&(0x7f0000000380), 0x80) 05:13:38 executing program 1: socketpair(0xa, 0x0, 0x0, &(0x7f0000000000)) 05:13:38 executing program 5: prctl$PR_SET_FP_MODE(0x2d, 0x0) 05:13:38 executing program 0: pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000800000000000003000000851ac0ff04000000180000000200000000000000010000002594f0fffcffffff08310000030000000000000000000000183000000400"/80], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0, r0, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:38 executing program 4: bpf$MAP_CREATE(0x4, &(0x7f0000002600), 0x48) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x7800, 0x1, 0x1ff, 0x5, {{0x1c, 0x4, 0x2, 0x5, 0x70, 0x65, 0x0, 0x40, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x83, 0xc, "965bc963e4404d56e32b"}, @lsrr={0x83, 0xf, 0x12, [@broadcast, @dev={0xac, 0x14, 0x14, 0x3d}, @local]}]}}}}}) 05:13:38 executing program 2: socketpair(0x0, 0x6, 0x0, &(0x7f0000000000)) 05:13:38 executing program 3: socket$packet(0x11, 0x2, 0x300) syz_genetlink_get_family_id$gtp(&(0x7f0000000000), 0xffffffffffffffff) pipe2$watch_queue(&(0x7f0000000380), 0x80) 05:13:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x7800, 0x1, 0x1ff, 0x5, {{0x1c, 0x4, 0x2, 0x5, 0x70, 0x65, 0x0, 0x40, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x83, 0xc, "965bc963e4404d56e32b"}, @lsrr={0x83, 0xf, 0x12, [@broadcast, @dev={0xac, 0x14, 0x14, 0x3d}, @local]}]}}}}}) 05:13:38 executing program 5: socketpair(0xa, 0x0, 0x0, &(0x7f0000000000)) 05:13:38 executing program 0: pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000800000000000003000000851ac0ff04000000180000000200000000000000010000002594f0fffcffffff08310000030000000000000000000000183000000400"/80], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r0, r0, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:38 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x7800, 0x1, 0x1ff, 0x5, {{0x1c, 0x4, 0x2, 0x5, 0x70, 0x65, 0x0, 0x40, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x83, 0xc, "965bc963e4404d56e32b"}, @lsrr={0x83, 0xf, 0x12, [@broadcast, @dev={0xac, 0x14, 0x14, 0x3d}, @local]}]}}}}}) 05:13:38 executing program 3: socket$packet(0x11, 0x0, 0x300) syz_genetlink_get_family_id$gtp(&(0x7f0000000000), 0xffffffffffffffff) pipe2$watch_queue(&(0x7f0000000380), 0x80) 05:13:38 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x7800, 0x1, 0x1ff, 0x5, {{0x1c, 0x4, 0x2, 0x5, 0x70, 0x65, 0x0, 0x40, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x83, 0xc, "965bc963e4404d56e32b"}, @lsrr={0x83, 0xf, 0x12, [@broadcast, @dev={0xac, 0x14, 0x14, 0x3d}, @local]}]}}}}}) 05:13:38 executing program 1: socketpair(0xa, 0x0, 0x7fffffff, 0x0) 05:13:38 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000800000000000003000000851ac0ff04000000180000000200000000000000010000002594f0fffcffffff08310000030000000000000000000000183000000400"/80], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:38 executing program 2: socketpair(0xa, 0x0, 0x0, &(0x7f0000000000)) 05:13:38 executing program 3: socket$packet(0x11, 0x0, 0x300) syz_genetlink_get_family_id$gtp(&(0x7f0000000000), 0xffffffffffffffff) pipe2$watch_queue(&(0x7f0000000380), 0x80) 05:13:38 executing program 1: socketpair(0xa, 0x0, 0x7fffffff, 0x0) 05:13:38 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x7800, 0x1, 0x1ff, 0x5, {{0x1c, 0x4, 0x2, 0x5, 0x70, 0x65, 0x0, 0x40, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x83, 0xc, "965bc963e4404d56e32b"}, @lsrr={0x83, 0xf, 0x12, [@broadcast, @dev={0xac, 0x14, 0x14, 0x3d}, @local]}]}}}}}) 05:13:38 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 05:13:38 executing program 5: socketpair(0xa, 0x0, 0x0, &(0x7f0000000000)) 05:13:38 executing program 3: socket$packet(0x11, 0x0, 0x300) syz_genetlink_get_family_id$gtp(&(0x7f0000000000), 0xffffffffffffffff) pipe2$watch_queue(&(0x7f0000000380), 0x80) 05:13:38 executing program 3: socket$packet(0x11, 0x2, 0x300) syz_genetlink_get_family_id$gtp(0x0, 0xffffffffffffffff) pipe2$watch_queue(&(0x7f0000000380), 0x80) 05:13:38 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 05:13:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) 05:13:38 executing program 1: socketpair(0xa, 0x0, 0x7fffffff, 0x0) 05:13:38 executing program 3: socket$packet(0x11, 0x2, 0x300) syz_genetlink_get_family_id$gtp(0x0, 0xffffffffffffffff) pipe2$watch_queue(&(0x7f0000000380), 0x80) 05:13:38 executing program 2: socketpair(0xa, 0x0, 0x0, &(0x7f0000000000)) 05:13:38 executing program 1: socketpair(0xa, 0x0, 0x0, &(0x7f0000000000)) 05:13:38 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 05:13:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) 05:13:38 executing program 5: socketpair(0xa, 0x0, 0x0, &(0x7f0000000000)) 05:13:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) 05:13:38 executing program 3: socket$packet(0x11, 0x2, 0x300) syz_genetlink_get_family_id$gtp(0x0, 0xffffffffffffffff) pipe2$watch_queue(&(0x7f0000000380), 0x80) 05:13:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', 0x0}) 05:13:38 executing program 3: socket$packet(0x11, 0x2, 0x300) syz_genetlink_get_family_id$gtp(&(0x7f0000000000), 0xffffffffffffffff) pipe2$watch_queue(0x0, 0x80) 05:13:38 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000800000000000003000000851ac0ff04000000180000000200000000000000010000002594f0fffcffffff08310000030000000000000000000000183000000400"/80], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:38 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) 05:13:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', 0x0}) 05:13:38 executing program 2: socketpair(0xa, 0x0, 0x0, &(0x7f0000000000)) 05:13:38 executing program 1: socketpair(0xa, 0x0, 0x0, &(0x7f0000000000)) 05:13:38 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000800000000000003000000851ac0ff04000000180000000200000000000000010000002594f0fffcffffff08310000030000000000000000000000183000000400"/80], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:38 executing program 3: syz_open_dev$vcsn(&(0x7f0000000000), 0x80000000, 0x200000) pipe2$watch_queue(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) getpeername$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r0, r1, 0x25, 0x8}, 0x10) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000180)={'syztnl2\x00', &(0x7f0000000200)={'syztnl0\x00', r1, 0x10, 0x8, 0x10001, 0x7, {{0x1e, 0x4, 0x0, 0x3, 0x78, 0x65, 0x0, 0x9, 0x4, 0x0, @private=0xa010101, @multicast2, {[@end, @timestamp_addr={0x44, 0x24, 0xc1, 0x1, 0x4, [{@private=0xa010101, 0x8}, {@loopback, 0x8}, {@broadcast, 0x9}, {@broadcast, 0x6}]}, @timestamp_prespec={0x44, 0x3c, 0x54, 0x3, 0xc, [{@multicast2, 0x55d}, {@empty, 0x7}, {@rand_addr=0x64010100, 0x8}, {@dev={0xac, 0x14, 0x14, 0x1d}, 0x8}, {@dev={0xac, 0x14, 0x14, 0x25}, 0x9}, {@local, 0xbe}, {@broadcast, 0x2}]}]}}}}}) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x9, 0x3, 0x9, 0x50a, r2, 0xfff, '\x00', r3, 0xffffffffffffffff, 0x3, 0x3, 0x5, 0xb}, 0x48) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/security', 0xadfe90e9b0efe728, 0x41) write$P9_RLOPEN(r4, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x10, 0x4, 0x6}, 0x8}}, 0x18) bpf$MAP_CREATE(0x4, &(0x7f0000002600)=@bloom_filter={0x1e, 0xd013, 0x3, 0xfffffffb, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x8000000, 0x3}, 0x48) 05:13:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', 0x0}) 05:13:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x1, 0x1ff, 0x5, {{0x1c, 0x4, 0x2, 0x5, 0x70, 0x65, 0x0, 0x40, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x83, 0xc, "965bc963e4404d56e32b"}, @lsrr={0x83, 0xf, 0x12, [@broadcast, @dev={0xac, 0x14, 0x14, 0x3d}, @local]}]}}}}}) 05:13:38 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) 05:13:38 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000800000000000003000000851ac0ff04000000180000000200000000000000010000002594f0fffcffffff08310000030000000000000000000000183000000400"/80], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:38 executing program 2: socketpair(0xa, 0x6, 0x0, 0x0) 05:13:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x1ff, 0x5, {{0x1c, 0x4, 0x2, 0x5, 0x70, 0x65, 0x0, 0x40, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x83, 0xc, "965bc963e4404d56e32b"}, @lsrr={0x83, 0xf, 0x12, [@broadcast, @dev={0xac, 0x14, 0x14, 0x3d}, @local]}]}}}}}) 05:13:38 executing program 3: syz_open_dev$vcsn(&(0x7f0000000000), 0x80000000, 0x200000) pipe2$watch_queue(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) getpeername$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r0, r1, 0x25, 0x8}, 0x10) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000180)={'syztnl2\x00', &(0x7f0000000200)={'syztnl0\x00', r1, 0x10, 0x8, 0x10001, 0x7, {{0x1e, 0x4, 0x0, 0x3, 0x78, 0x65, 0x0, 0x9, 0x4, 0x0, @private=0xa010101, @multicast2, {[@end, @timestamp_addr={0x44, 0x24, 0xc1, 0x1, 0x4, [{@private=0xa010101, 0x8}, {@loopback, 0x8}, {@broadcast, 0x9}, {@broadcast, 0x6}]}, @timestamp_prespec={0x44, 0x3c, 0x54, 0x3, 0xc, [{@multicast2, 0x55d}, {@empty, 0x7}, {@rand_addr=0x64010100, 0x8}, {@dev={0xac, 0x14, 0x14, 0x1d}, 0x8}, {@dev={0xac, 0x14, 0x14, 0x25}, 0x9}, {@local, 0xbe}, {@broadcast, 0x2}]}]}}}}}) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x9, 0x3, 0x9, 0x50a, r2, 0xfff, '\x00', r3, 0xffffffffffffffff, 0x3, 0x3, 0x5, 0xb}, 0x48) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/security', 0xadfe90e9b0efe728, 0x41) write$P9_RLOPEN(r4, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x10, 0x4, 0x6}, 0x8}}, 0x18) bpf$MAP_CREATE(0x4, &(0x7f0000002600)=@bloom_filter={0x1e, 0xd013, 0x3, 0xfffffffb, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x8000000, 0x3}, 0x48) 05:13:38 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, 0x0, &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:38 executing program 2: socketpair(0xa, 0x6, 0x0, 0x0) 05:13:38 executing program 1: socketpair(0xa, 0x0, 0x0, &(0x7f0000000000)) 05:13:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x5, {{0x1c, 0x4, 0x2, 0x5, 0x70, 0x65, 0x0, 0x40, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x83, 0xc, "965bc963e4404d56e32b"}, @lsrr={0x83, 0xf, 0x12, [@broadcast, @dev={0xac, 0x14, 0x14, 0x3d}, @local]}]}}}}}) 05:13:38 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) 05:13:38 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, 0x0, &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:38 executing program 3: syz_open_dev$vcsn(&(0x7f0000000000), 0x80000000, 0x200000) pipe2$watch_queue(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) getpeername$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r0, r1, 0x25, 0x8}, 0x10) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000180)={'syztnl2\x00', &(0x7f0000000200)={'syztnl0\x00', r1, 0x10, 0x8, 0x10001, 0x7, {{0x1e, 0x4, 0x0, 0x3, 0x78, 0x65, 0x0, 0x9, 0x4, 0x0, @private=0xa010101, @multicast2, {[@end, @timestamp_addr={0x44, 0x24, 0xc1, 0x1, 0x4, [{@private=0xa010101, 0x8}, {@loopback, 0x8}, {@broadcast, 0x9}, {@broadcast, 0x6}]}, @timestamp_prespec={0x44, 0x3c, 0x54, 0x3, 0xc, [{@multicast2, 0x55d}, {@empty, 0x7}, {@rand_addr=0x64010100, 0x8}, {@dev={0xac, 0x14, 0x14, 0x1d}, 0x8}, {@dev={0xac, 0x14, 0x14, 0x25}, 0x9}, {@local, 0xbe}, {@broadcast, 0x2}]}]}}}}}) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x9, 0x3, 0x9, 0x50a, r2, 0xfff, '\x00', r3, 0xffffffffffffffff, 0x3, 0x3, 0x5, 0xb}, 0x48) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/security', 0xadfe90e9b0efe728, 0x41) write$P9_RLOPEN(r4, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x10, 0x4, 0x6}, 0x8}}, 0x18) bpf$MAP_CREATE(0x4, &(0x7f0000002600)=@bloom_filter={0x1e, 0xd013, 0x3, 0xfffffffb, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x8000000, 0x3}, 0x48) 05:13:38 executing program 2: socketpair(0xa, 0x6, 0x0, 0x0) 05:13:38 executing program 3: syz_open_dev$vcsn(&(0x7f0000000000), 0x80000000, 0x200000) pipe2$watch_queue(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) getpeername$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r0, r1, 0x25, 0x8}, 0x10) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000180)={'syztnl2\x00', &(0x7f0000000200)={'syztnl0\x00', r1, 0x10, 0x8, 0x10001, 0x7, {{0x1e, 0x4, 0x0, 0x3, 0x78, 0x65, 0x0, 0x9, 0x4, 0x0, @private=0xa010101, @multicast2, {[@end, @timestamp_addr={0x44, 0x24, 0xc1, 0x1, 0x4, [{@private=0xa010101, 0x8}, {@loopback, 0x8}, {@broadcast, 0x9}, {@broadcast, 0x6}]}, @timestamp_prespec={0x44, 0x3c, 0x54, 0x3, 0xc, [{@multicast2, 0x55d}, {@empty, 0x7}, {@rand_addr=0x64010100, 0x8}, {@dev={0xac, 0x14, 0x14, 0x1d}, 0x8}, {@dev={0xac, 0x14, 0x14, 0x25}, 0x9}, {@local, 0xbe}, {@broadcast, 0x2}]}]}}}}}) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x9, 0x3, 0x9, 0x50a, r2, 0xfff, '\x00', r3, 0xffffffffffffffff, 0x3, 0x3, 0x5, 0xb}, 0x48) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/security', 0xadfe90e9b0efe728, 0x41) write$P9_RLOPEN(r4, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x10, 0x4, 0x6}, 0x8}}, 0x18) 05:13:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x1c, 0x4, 0x2, 0x5, 0x70, 0x65, 0x0, 0x40, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x83, 0xc, "965bc963e4404d56e32b"}, @lsrr={0x83, 0xf, 0x12, [@broadcast, @dev={0xac, 0x14, 0x14, 0x3d}, @local]}]}}}}}) 05:13:38 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, 0x0, &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:38 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, 0x0, &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x1c, 0x4, 0x0, 0x5, 0x70, 0x65, 0x0, 0x40, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x83, 0xc, "965bc963e4404d56e32b"}, @lsrr={0x83, 0xf, 0x12, [@broadcast, @dev={0xac, 0x14, 0x14, 0x3d}, @local]}]}}}}}) 05:13:38 executing program 5: socketpair(0xa, 0x0, 0x0, 0x0) 05:13:38 executing program 1: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) 05:13:38 executing program 3: syz_open_dev$vcsn(&(0x7f0000000000), 0x80000000, 0x200000) pipe2$watch_queue(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) getpeername$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r0, r1, 0x25, 0x8}, 0x10) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000180)={'syztnl2\x00', &(0x7f0000000200)={'syztnl0\x00', r1, 0x10, 0x8, 0x10001, 0x7, {{0x1e, 0x4, 0x0, 0x3, 0x78, 0x65, 0x0, 0x9, 0x4, 0x0, @private=0xa010101, @multicast2, {[@end, @timestamp_addr={0x44, 0x24, 0xc1, 0x1, 0x4, [{@private=0xa010101, 0x8}, {@loopback, 0x8}, {@broadcast, 0x9}, {@broadcast, 0x6}]}, @timestamp_prespec={0x44, 0x3c, 0x54, 0x3, 0xc, [{@multicast2, 0x55d}, {@empty, 0x7}, {@rand_addr=0x64010100, 0x8}, {@dev={0xac, 0x14, 0x14, 0x1d}, 0x8}, {@dev={0xac, 0x14, 0x14, 0x25}, 0x9}, {@local, 0xbe}, {@broadcast, 0x2}]}]}}}}}) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x9, 0x3, 0x9, 0x50a, r2, 0xfff, '\x00', r3, 0xffffffffffffffff, 0x3, 0x3, 0x5, 0xb}, 0x48) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x10, 0x4, 0x6}, 0x8}}, 0x18) 05:13:38 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, 0x0, &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:38 executing program 5: socketpair(0xa, 0x0, 0x0, 0x0) 05:13:38 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x1c, 0x4, 0x0, 0x0, 0x70, 0x65, 0x0, 0x40, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x83, 0xc, "965bc963e4404d56e32b"}, @lsrr={0x83, 0xf, 0x12, [@broadcast, @dev={0xac, 0x14, 0x14, 0x3d}, @local]}]}}}}}) 05:13:38 executing program 3: syz_open_dev$vcsn(&(0x7f0000000000), 0x80000000, 0x200000) pipe2$watch_queue(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) getpeername$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r0, r1, 0x25, 0x8}, 0x10) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000180)={'syztnl2\x00', &(0x7f0000000200)={'syztnl0\x00', r1, 0x10, 0x8, 0x10001, 0x7, {{0x1e, 0x4, 0x0, 0x3, 0x78, 0x65, 0x0, 0x9, 0x4, 0x0, @private=0xa010101, @multicast2, {[@end, @timestamp_addr={0x44, 0x24, 0xc1, 0x1, 0x4, [{@private=0xa010101, 0x8}, {@loopback, 0x8}, {@broadcast, 0x9}, {@broadcast, 0x6}]}, @timestamp_prespec={0x44, 0x3c, 0x54, 0x3, 0xc, [{@multicast2, 0x55d}, {@empty, 0x7}, {@rand_addr=0x64010100, 0x8}, {@dev={0xac, 0x14, 0x14, 0x1d}, 0x8}, {@dev={0xac, 0x14, 0x14, 0x25}, 0x9}, {@local, 0xbe}, {@broadcast, 0x2}]}]}}}}}) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x9, 0x3, 0x9, 0x50a, r2, 0xfff, '\x00', r3, 0xffffffffffffffff, 0x3, 0x3, 0x5, 0xb}, 0x48) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x10, 0x4, 0x6}, 0x8}}, 0x18) 05:13:38 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:38 executing program 5: socketpair(0xa, 0x0, 0x0, 0x0) 05:13:38 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, 0x0, &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x1c, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x40, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x83, 0xc, "965bc963e4404d56e32b"}, @lsrr={0x83, 0xf, 0x12, [@broadcast, @dev={0xac, 0x14, 0x14, 0x3d}, @local]}]}}}}}) 05:13:38 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:38 executing program 1: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) 05:13:38 executing program 3: syz_open_dev$vcsn(&(0x7f0000000000), 0x80000000, 0x200000) pipe2$watch_queue(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) getpeername$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r0, r1, 0x25, 0x8}, 0x10) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000180)={'syztnl2\x00', &(0x7f0000000200)={'syztnl0\x00', r1, 0x10, 0x8, 0x10001, 0x7, {{0x1e, 0x4, 0x0, 0x3, 0x78, 0x65, 0x0, 0x9, 0x4, 0x0, @private=0xa010101, @multicast2, {[@end, @timestamp_addr={0x44, 0x24, 0xc1, 0x1, 0x4, [{@private=0xa010101, 0x8}, {@loopback, 0x8}, {@broadcast, 0x9}, {@broadcast, 0x6}]}, @timestamp_prespec={0x44, 0x3c, 0x54, 0x3, 0xc, [{@multicast2, 0x55d}, {@empty, 0x7}, {@rand_addr=0x64010100, 0x8}, {@dev={0xac, 0x14, 0x14, 0x1d}, 0x8}, {@dev={0xac, 0x14, 0x14, 0x25}, 0x9}, {@local, 0xbe}, {@broadcast, 0x2}]}]}}}}}) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x9, 0x3, 0x9, 0x50a, r2, 0xfff, '\x00', r3, 0xffffffffffffffff, 0x3, 0x3, 0x5, 0xb}, 0x48) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x10, 0x4, 0x6}, 0x8}}, 0x18) 05:13:38 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 05:13:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x1c, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x83, 0xc, "965bc963e4404d56e32b"}, @lsrr={0x83, 0xf, 0x12, [@broadcast, @dev={0xac, 0x14, 0x14, 0x3d}, @local]}]}}}}}) 05:13:38 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000), 0x80000000, 0x200000) pipe2$watch_queue(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) getpeername$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r0, r1, 0x25, 0x8}, 0x10) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000180)={'syztnl2\x00', &(0x7f0000000200)={'syztnl0\x00', r1, 0x10, 0x8, 0x10001, 0x7, {{0x1e, 0x4, 0x0, 0x3, 0x78, 0x65, 0x0, 0x9, 0x4, 0x0, @private=0xa010101, @multicast2, {[@end, @timestamp_addr={0x44, 0x24, 0xc1, 0x1, 0x4, [{@private=0xa010101, 0x8}, {@loopback, 0x8}, {@broadcast, 0x9}, {@broadcast, 0x6}]}, @timestamp_prespec={0x44, 0x3c, 0x54, 0x3, 0xc, [{@multicast2, 0x55d}, {@empty, 0x7}, {@rand_addr=0x64010100, 0x8}, {@dev={0xac, 0x14, 0x14, 0x1d}, 0x8}, {@dev={0xac, 0x14, 0x14, 0x25}, 0x9}, {@local, 0xbe}, {@broadcast, 0x2}]}]}}}}}) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x9, 0x3, 0x9, 0x50a, r2, 0xfff, '\x00', r3, 0xffffffffffffffff, 0x3, 0x3, 0x5, 0xb}, 0x48) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/security', 0xadfe90e9b0efe728, 0x41) write$P9_RLOPEN(r4, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x10, 0x4, 0x6}, 0x8}}, 0x18) bpf$MAP_CREATE(0x4, &(0x7f0000002600)=@bloom_filter={0x1e, 0xd013, 0x3, 0xfffffffb, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x8000000, 0x3}, 0x48) 05:13:38 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:38 executing program 3: syz_open_dev$vcsn(&(0x7f0000000000), 0x80000000, 0x200000) pipe2$watch_queue(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) getpeername$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r0, r1, 0x25, 0x8}, 0x10) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000180)={'syztnl2\x00', &(0x7f0000000200)={'syztnl0\x00', r1, 0x10, 0x8, 0x10001, 0x7, {{0x1e, 0x4, 0x0, 0x3, 0x78, 0x65, 0x0, 0x9, 0x4, 0x0, @private=0xa010101, @multicast2, {[@end, @timestamp_addr={0x44, 0x24, 0xc1, 0x1, 0x4, [{@private=0xa010101, 0x8}, {@loopback, 0x8}, {@broadcast, 0x9}, {@broadcast, 0x6}]}, @timestamp_prespec={0x44, 0x3c, 0x54, 0x3, 0xc, [{@multicast2, 0x55d}, {@empty, 0x7}, {@rand_addr=0x64010100, 0x8}, {@dev={0xac, 0x14, 0x14, 0x1d}, 0x8}, {@dev={0xac, 0x14, 0x14, 0x25}, 0x9}, {@local, 0xbe}, {@broadcast, 0x2}]}]}}}}}) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/security', 0xadfe90e9b0efe728, 0x41) write$P9_RLOPEN(r3, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x10, 0x4, 0x6}, 0x8}}, 0x18) 05:13:38 executing program 1: socketpair(0x0, 0x0, 0x0, &(0x7f0000000000)) 05:13:38 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 05:13:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x1c, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x83, 0xc, "965bc963e4404d56e32b"}, @lsrr={0x83, 0xf, 0x12, [@broadcast, @dev={0xac, 0x14, 0x14, 0x3d}, @local]}]}}}}}) 05:13:38 executing program 3: syz_open_dev$vcsn(&(0x7f0000000000), 0x80000000, 0x200000) pipe2$watch_queue(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) getpeername$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r0, r1, 0x25, 0x8}, 0x10) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/security', 0xadfe90e9b0efe728, 0x41) write$P9_RLOPEN(r3, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x10, 0x4, 0x6}, 0x8}}, 0x18) 05:13:38 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:38 executing program 1: socketpair(0xa, 0x0, 0x0, 0x0) 05:13:38 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000), 0x80000000, 0x200000) pipe2$watch_queue(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) getpeername$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r0, r1, 0x25, 0x8}, 0x10) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000180)={'syztnl2\x00', &(0x7f0000000200)={'syztnl0\x00', r1, 0x10, 0x8, 0x10001, 0x7, {{0x1e, 0x4, 0x0, 0x3, 0x78, 0x65, 0x0, 0x9, 0x4, 0x0, @private=0xa010101, @multicast2, {[@end, @timestamp_addr={0x44, 0x24, 0xc1, 0x1, 0x4, [{@private=0xa010101, 0x8}, {@loopback, 0x8}, {@broadcast, 0x9}, {@broadcast, 0x6}]}, @timestamp_prespec={0x44, 0x3c, 0x54, 0x3, 0xc, [{@multicast2, 0x55d}, {@empty, 0x7}, {@rand_addr=0x64010100, 0x8}, {@dev={0xac, 0x14, 0x14, 0x1d}, 0x8}, {@dev={0xac, 0x14, 0x14, 0x25}, 0x9}, {@local, 0xbe}, {@broadcast, 0x2}]}]}}}}}) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x9, 0x3, 0x9, 0x50a, r2, 0xfff, '\x00', r3, 0xffffffffffffffff, 0x3, 0x3, 0x5, 0xb}, 0x48) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/security', 0xadfe90e9b0efe728, 0x41) write$P9_RLOPEN(r4, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x10, 0x4, 0x6}, 0x8}}, 0x18) bpf$MAP_CREATE(0x4, &(0x7f0000002600)=@bloom_filter={0x1e, 0xd013, 0x3, 0xfffffffb, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x8000000, 0x3}, 0x48) 05:13:38 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 05:13:38 executing program 1: socketpair(0xa, 0x0, 0x0, 0x0) 05:13:38 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x1c, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x83, 0xc, "965bc963e4404d56e32b"}, @lsrr={0x83, 0xf, 0x12, [@broadcast, @dev={0xac, 0x14, 0x14, 0x3d}, @local]}]}}}}}) 05:13:38 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000), 0x80000000, 0x200000) pipe2$watch_queue(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) getpeername$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r0, r1, 0x25, 0x8}, 0x10) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000180)={'syztnl2\x00', &(0x7f0000000200)={'syztnl0\x00', r1, 0x10, 0x8, 0x10001, 0x7, {{0x1e, 0x4, 0x0, 0x3, 0x78, 0x65, 0x0, 0x9, 0x4, 0x0, @private=0xa010101, @multicast2, {[@end, @timestamp_addr={0x44, 0x24, 0xc1, 0x1, 0x4, [{@private=0xa010101, 0x8}, {@loopback, 0x8}, {@broadcast, 0x9}, {@broadcast, 0x6}]}, @timestamp_prespec={0x44, 0x3c, 0x54, 0x3, 0xc, [{@multicast2, 0x55d}, {@empty, 0x7}, {@rand_addr=0x64010100, 0x8}, {@dev={0xac, 0x14, 0x14, 0x1d}, 0x8}, {@dev={0xac, 0x14, 0x14, 0x25}, 0x9}, {@local, 0xbe}, {@broadcast, 0x2}]}]}}}}}) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x9, 0x3, 0x9, 0x50a, r2, 0xfff, '\x00', r3, 0xffffffffffffffff, 0x3, 0x3, 0x5, 0xb}, 0x48) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/security', 0xadfe90e9b0efe728, 0x41) write$P9_RLOPEN(r4, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x10, 0x4, 0x6}, 0x8}}, 0x18) bpf$MAP_CREATE(0x4, &(0x7f0000002600)=@bloom_filter={0x1e, 0xd013, 0x3, 0xfffffffb, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x0, 0x8000000, 0x3}, 0x48) 05:13:38 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0xa, 0x0, &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:38 executing program 3: syz_open_dev$vcsn(&(0x7f0000000000), 0x80000000, 0x200000) pipe2$watch_queue(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) getpeername$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r0, r1, 0x25, 0x8}, 0x10) pipe2$watch_queue(&(0x7f0000000380), 0x80) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/security', 0xadfe90e9b0efe728, 0x41) write$P9_RLOPEN(r2, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x10, 0x4, 0x6}, 0x8}}, 0x18) 05:13:38 executing program 1: socketpair(0xa, 0x0, 0x0, 0x0) 05:13:38 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000800000000000003000000851ac0ff0400000018000000020000000000000001000000"], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:38 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x1c, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x83, 0xc, "965bc963e4404d56e32b"}, @lsrr={0x83, 0xf, 0x12, [@broadcast, @dev={0xac, 0x14, 0x14, 0x3d}, @local]}]}}}}}) 05:13:38 executing program 3: syz_open_dev$vcsn(&(0x7f0000000000), 0x80000000, 0x200000) pipe2$watch_queue(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) getpeername$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r0, r1, 0x25, 0x8}, 0x10) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/security', 0xadfe90e9b0efe728, 0x41) write$P9_RLOPEN(r2, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x10, 0x4, 0x6}, 0x8}}, 0x18) 05:13:38 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000), 0x80000000, 0x200000) pipe2$watch_queue(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) getpeername$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r0, r1, 0x25, 0x8}, 0x10) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000180)={'syztnl2\x00', &(0x7f0000000200)={'syztnl0\x00', r1, 0x10, 0x8, 0x10001, 0x7, {{0x1e, 0x4, 0x0, 0x3, 0x78, 0x65, 0x0, 0x9, 0x4, 0x0, @private=0xa010101, @multicast2, {[@end, @timestamp_addr={0x44, 0x24, 0xc1, 0x1, 0x4, [{@private=0xa010101, 0x8}, {@loopback, 0x8}, {@broadcast, 0x9}, {@broadcast, 0x6}]}, @timestamp_prespec={0x44, 0x3c, 0x54, 0x3, 0xc, [{@multicast2, 0x55d}, {@empty, 0x7}, {@rand_addr=0x64010100, 0x8}, {@dev={0xac, 0x14, 0x14, 0x1d}, 0x8}, {@dev={0xac, 0x14, 0x14, 0x25}, 0x9}, {@local, 0xbe}, {@broadcast, 0x2}]}]}}}}}) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x9, 0x3, 0x9, 0x50a, r2, 0xfff, '\x00', r3, 0xffffffffffffffff, 0x3, 0x3, 0x5, 0xb}, 0x48) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/security', 0xadfe90e9b0efe728, 0x41) write$P9_RLOPEN(r4, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x10, 0x4, 0x6}, 0x8}}, 0x18) 05:13:38 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0xa, 0x0, 0x0, 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:38 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x1c, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x83, 0xc, "965bc963e4404d56e32b"}, @lsrr={0x83, 0xf, 0x12, [@broadcast, @dev={0xac, 0x14, 0x14, 0x3d}, @local]}]}}}}}) 05:13:38 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000800000000000003000000851ac0ff0400000018000000020000000000000001000000"], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x18, 0x4, 0x0, 0x0, 0x60, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x83, 0xc, "965bc963e4404d56e32b"}]}}}}}) 05:13:39 executing program 3: syz_open_dev$vcsn(&(0x7f0000000000), 0x80000000, 0x200000) pipe2$watch_queue(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) getpeername$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/security', 0xadfe90e9b0efe728, 0x41) write$P9_RLOPEN(r1, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x10, 0x4, 0x6}, 0x8}}, 0x18) 05:13:39 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000800000000000003000000851ac0ff0400000018000000020000000000000001000000"], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:39 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0xa, 0x0, 0x0, 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:39 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x1c, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x83, 0xc, "965bc963e4404d56e32b"}, @lsrr={0x83, 0xf, 0x12, [@broadcast, @dev={0xac, 0x14, 0x14, 0x3d}, @local]}]}}}}}) 05:13:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:39 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000), 0x80000000, 0x200000) pipe2$watch_queue(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) getpeername$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r0, r1, 0x25, 0x8}, 0x10) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000180)={'syztnl2\x00', &(0x7f0000000200)={'syztnl0\x00', r1, 0x10, 0x8, 0x10001, 0x7, {{0x1e, 0x4, 0x0, 0x3, 0x78, 0x65, 0x0, 0x9, 0x4, 0x0, @private=0xa010101, @multicast2, {[@end, @timestamp_addr={0x44, 0x24, 0xc1, 0x1, 0x4, [{@private=0xa010101, 0x8}, {@loopback, 0x8}, {@broadcast, 0x9}, {@broadcast, 0x6}]}, @timestamp_prespec={0x44, 0x3c, 0x54, 0x3, 0xc, [{@multicast2, 0x55d}, {@empty, 0x7}, {@rand_addr=0x64010100, 0x8}, {@dev={0xac, 0x14, 0x14, 0x1d}, 0x8}, {@dev={0xac, 0x14, 0x14, 0x25}, 0x9}, {@local, 0xbe}, {@broadcast, 0x2}]}]}}}}}) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x9, 0x3, 0x9, 0x50a, r2, 0xfff, '\x00', r3, 0xffffffffffffffff, 0x3, 0x3, 0x5, 0xb}, 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/security', 0xadfe90e9b0efe728, 0x41) 05:13:39 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x1c, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x83, 0xc, "965bc963e4404d56e32b"}, @lsrr={0x83, 0xf, 0x12, [@broadcast, @dev={0xac, 0x14, 0x14, 0x3d}, @local]}]}}}}}) 05:13:39 executing program 3: syz_open_dev$vcsn(&(0x7f0000000000), 0x80000000, 0x200000) pipe2$watch_queue(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/security', 0xadfe90e9b0efe728, 0x41) write$P9_RLOPEN(r1, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x10, 0x4, 0x6}, 0x8}}, 0x18) 05:13:39 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000800000000000003000000851ac0ff04000000180000000200000000000000010000002594f0fffcffffff083100000300000000000000"], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:39 executing program 1: ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x1c, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x83, 0xc, "965bc963e4404d56e32b"}, @lsrr={0x83, 0xf, 0x12, [@broadcast, @dev={0xac, 0x14, 0x14, 0x3d}, @local]}]}}}}}) 05:13:39 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0xa, 0x0, 0x0, 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:39 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000), 0x80000000, 0x200000) pipe2$watch_queue(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) getpeername$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r0, r1, 0x25, 0x8}, 0x10) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000180)={'syztnl2\x00', &(0x7f0000000200)={'syztnl0\x00', r1, 0x10, 0x8, 0x10001, 0x7, {{0x1e, 0x4, 0x0, 0x3, 0x78, 0x65, 0x0, 0x9, 0x4, 0x0, @private=0xa010101, @multicast2, {[@end, @timestamp_addr={0x44, 0x24, 0xc1, 0x1, 0x4, [{@private=0xa010101, 0x8}, {@loopback, 0x8}, {@broadcast, 0x9}, {@broadcast, 0x6}]}, @timestamp_prespec={0x44, 0x3c, 0x54, 0x3, 0xc, [{@multicast2, 0x55d}, {@empty, 0x7}, {@rand_addr=0x64010100, 0x8}, {@dev={0xac, 0x14, 0x14, 0x1d}, 0x8}, {@dev={0xac, 0x14, 0x14, 0x25}, 0x9}, {@local, 0xbe}, {@broadcast, 0x2}]}]}}}}}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/security', 0xadfe90e9b0efe728, 0x41) 05:13:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:39 executing program 1: ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x1c, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x83, 0xc, "965bc963e4404d56e32b"}, @lsrr={0x83, 0xf, 0x12, [@broadcast, @dev={0xac, 0x14, 0x14, 0x3d}, @local]}]}}}}}) 05:13:39 executing program 3: syz_open_dev$vcsn(&(0x7f0000000000), 0x80000000, 0x200000) pipe2$watch_queue(&(0x7f00000001c0), 0x80) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/security', 0xadfe90e9b0efe728, 0x41) write$P9_RLOPEN(r0, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x10, 0x4, 0x6}, 0x8}}, 0x18) 05:13:39 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000), 0x80000000, 0x200000) pipe2$watch_queue(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) getpeername$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r0, r1, 0x25, 0x8}, 0x10) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/security', 0xadfe90e9b0efe728, 0x41) 05:13:39 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0xa, 0x0, &(0x7f0000000100)='syzkaller\x00', 0x0, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:39 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000800000000000003000000851ac0ff0400000018000000020000000000000001000000"], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:39 executing program 1: ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x1c, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x83, 0xc, "965bc963e4404d56e32b"}, @lsrr={0x83, 0xf, 0x12, [@broadcast, @dev={0xac, 0x14, 0x14, 0x3d}, @local]}]}}}}}) 05:13:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:39 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000800000000000003000000851ac0ff0400000018000000020000000000000001000000"], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:39 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000), 0x80000000, 0x200000) pipe2$watch_queue(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) getpeername$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r0, r1, 0x25, 0x8}, 0x10) pipe2$watch_queue(&(0x7f0000000380), 0x80) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/security', 0xadfe90e9b0efe728, 0x41) 05:13:39 executing program 3: syz_open_dev$vcsn(&(0x7f0000000000), 0x80000000, 0x200000) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/security', 0xadfe90e9b0efe728, 0x41) write$P9_RLOPEN(r0, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x10, 0x4, 0x6}, 0x8}}, 0x18) 05:13:39 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0xa, 0x0, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x18, 0x4, 0x0, 0x0, 0x60, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x0, 0xc, "965bc963e4404d56e32b"}]}}}}}) 05:13:39 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000800000000000003000000851ac0ff0400000018000000020000000000000001000000"], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:39 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000), 0x80000000, 0x200000) pipe2$watch_queue(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) getpeername$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000000c0)={r0, r1, 0x25, 0x8}, 0x10) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/security', 0xadfe90e9b0efe728, 0x41) 05:13:39 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x1c, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x83, 0xc, "965bc963e4404d56e32b"}, @lsrr={0x83, 0xf, 0x12, [@broadcast, @dev={0xac, 0x14, 0x14, 0x3d}, @local]}]}}}}}) 05:13:39 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/security', 0xadfe90e9b0efe728, 0x41) write$P9_RLOPEN(r0, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x10, 0x4, 0x6}, 0x8}}, 0x18) 05:13:39 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0xa, 0x0, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x0, 0x2}]}}}}}) 05:13:39 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x1c, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x83, 0xc, "965bc963e4404d56e32b"}, @lsrr={0x83, 0xf, 0x12, [@broadcast, @dev={0xac, 0x14, 0x14, 0x3d}, @local]}]}}}}}) 05:13:39 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000), 0x80000000, 0x200000) pipe2$watch_queue(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) getpeername$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/security', 0xadfe90e9b0efe728, 0x41) 05:13:39 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000800000000000003000000851ac0ff04000000180000000200000000000000010000002594f0fffcffffff0831"], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:39 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0xadfe90e9b0efe728, 0x41) write$P9_RLOPEN(r0, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x10, 0x4, 0x6}, 0x8}}, 0x18) 05:13:39 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0xa, 0x0, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:39 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0xadfe90e9b0efe728, 0x41) write$P9_RLOPEN(r0, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x10, 0x4, 0x6}, 0x8}}, 0x18) 05:13:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x0, 0x2}]}}}}}) 05:13:39 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x1c, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x83, 0xc, "965bc963e4404d56e32b"}, @lsrr={0x83, 0xf, 0x12, [@broadcast, @dev={0xac, 0x14, 0x14, 0x3d}, @local]}]}}}}}) 05:13:39 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000), 0x80000000, 0x200000) pipe2$watch_queue(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/security', 0xadfe90e9b0efe728, 0x41) 05:13:39 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0xa, 0x0, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:39 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0xadfe90e9b0efe728, 0x41) write$P9_RLOPEN(r0, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x10, 0x4, 0x6}, 0x8}}, 0x18) 05:13:39 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000800000000000003000000851ac0ff0400000018000000020000000000000001000000"], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x0, 0x2}]}}}}}) 05:13:39 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000), 0x80000000, 0x200000) pipe2$watch_queue(&(0x7f00000001c0), 0x80) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/security', 0xadfe90e9b0efe728, 0x41) 05:13:39 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0xa, 0x0, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:39 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) 05:13:39 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000800000000000003000000851ac0ff0400000018000000020000000000000001000000"], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:39 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/security', 0x0, 0x41) write$P9_RLOPEN(r0, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x10, 0x4, 0x6}, 0x8}}, 0x18) 05:13:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x17, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x0, 0x7, "965bc963e4"}]}}}}}) 05:13:39 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x0, 0xa, 0x0, &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:13:39 executing program 5: syz_open_dev$vcsn(&(0x7f0000000000), 0x80000000, 0x200000) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/security', 0xadfe90e9b0efe728, 0x41) 05:13:39 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) 05:13:39 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000800000000000003000000851ac0ff0400000018000000020000000000000001000000"], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:39 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/security', 0x0, 0x41) write$P9_RLOPEN(r0, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x10, 0x4, 0x6}, 0x8}}, 0x18) 05:13:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x0, 0x2}]}}}}}) 05:13:39 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/security', 0xadfe90e9b0efe728, 0x41) 05:13:39 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) 05:13:39 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000800000000000003000000851ac0ff04000000180000000200000000000000010000002594f0fffc"], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:39 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/security', 0x0, 0x41) write$P9_RLOPEN(r0, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x10, 0x4, 0x6}, 0x8}}, 0x18) 05:13:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x0, 0x2}]}}}}}) 05:13:39 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/security', 0x0, 0x41) write$P9_RLOPEN(r0, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x10, 0x4, 0x6}, 0x8}}, 0x18) 05:13:39 executing program 5: openat$sysfs(0xffffffffffffff9c, 0x0, 0xadfe90e9b0efe728, 0x41) 05:13:39 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000800000000000003000000851ac0ff0400000018000000020000000000000001000000"], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:39 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', 0x0}) 05:13:39 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/security', 0x0, 0x41) write$P9_RLOPEN(r0, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x10, 0x4, 0x6}, 0x8}}, 0x18) 05:13:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x0, 0x2}]}}}}}) 05:13:39 executing program 5: openat$sysfs(0xffffffffffffff9c, 0x0, 0xadfe90e9b0efe728, 0x41) 05:13:39 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', 0x0}) 05:13:39 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/security', 0xadfe90e9b0efe728, 0x0) write$P9_RLOPEN(r0, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x10, 0x4, 0x6}, 0x8}}, 0x18) 05:13:39 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/security', 0x0, 0x41) write$P9_RLOPEN(r0, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x10, 0x4, 0x6}, 0x8}}, 0x18) 05:13:39 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000800000000000003000000851ac0ff0400000018000000020000000000000001000000"], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x16, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x0, 0x5, "965bc9"}]}}}}}) 05:13:39 executing program 5: openat$sysfs(0xffffffffffffff9c, 0x0, 0xadfe90e9b0efe728, 0x41) 05:13:39 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', 0x0}) 05:13:39 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/security', 0x0, 0x41) 05:13:39 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/security', 0x0, 0x41) 05:13:39 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000800000000000003000000851ac0ff0400000018000000020000000000000001000000"], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:39 executing program 3: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/security', 0xadfe90e9b0efe728, 0x0) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x10, 0x4, 0x6}, 0x8}}, 0x18) 05:13:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x16, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x0, 0x3, "96"}]}}}}}) 05:13:39 executing program 2: openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x41) 05:13:39 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x18, 0x4, 0x0, 0x0, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x83, 0xc, "965bc963e4404d56e32b"}]}}}}}) 05:13:39 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/security', 0x0, 0x41) 05:13:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x0, 0x2}]}}}}}) 05:13:39 executing program 3: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/security', 0xadfe90e9b0efe728, 0x0) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x10, 0x4, 0x6}, 0x8}}, 0x18) 05:13:39 executing program 2: openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x41) 05:13:39 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000800000000000003000000851ac0ff04000000180000000200000000000000010000002594f0"], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:39 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:39 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/security', 0x0, 0x41) 05:13:39 executing program 2: openat$sysfs(0xffffffffffffff9c, 0x0, 0x0, 0x41) 05:13:39 executing program 3: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/security', 0xadfe90e9b0efe728, 0x0) write$P9_RLOPEN(0xffffffffffffffff, &(0x7f0000000140)={0x18, 0xd, 0x2, {{0x10, 0x4, 0x6}, 0x8}}, 0x18) 05:13:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x0, 0x2}]}}}}}) 05:13:39 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000800000000000003000000851ac0ff04000000180000000200000000000000010000002594f0"], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:39 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:39 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/security', 0xadfe90e9b0efe728, 0x0) 05:13:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x0, 0x2}]}}}}}) 05:13:39 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/security', 0x0, 0x0) 05:13:39 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/security', 0xadfe90e9b0efe728, 0x0) write$P9_RLOPEN(r0, 0x0, 0x0) 05:13:39 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:39 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:39 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:39 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000800000000000003000000851ac0ff04000000180000000200000000000000010000002594f0"], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:39 executing program 3: r0 = add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffd) keyctl$revoke(0x3, r0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) bpf$BPF_LINK_CREATE_XDP(0x17, 0x0, 0x0) r2 = getuid() socket$inet_smc(0x2b, 0x1, 0x0) r3 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r1) r4 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r3) add_key$fscrypt_provisioning(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000300)={0x3, 0x0, @d}, 0x18, r4) keyctl$chown(0x4, r1, r2, 0xffffffffffffffff) 05:13:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0xe, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @generic={0x0, 0x3, "96"}]}}}}}) 05:13:39 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:39 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x18, 0x4, 0x0, 0x0, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x0, 0xc, "965bc963e4404d56e32b"}]}}}}}) 05:13:39 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000800000000000003000000851ac0ff04000000180000000200000000000000010000002594f0ff"], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:39 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:39 executing program 3: r0 = add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffd) keyctl$revoke(0x3, r0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) bpf$BPF_LINK_CREATE_XDP(0x17, 0x0, 0x0) r2 = getuid() socket$inet_smc(0x2b, 0x1, 0x0) r3 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r1) r4 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r3) add_key$fscrypt_provisioning(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000300)={0x3, 0x0, @d}, 0x18, r4) keyctl$chown(0x4, r1, r2, 0xffffffffffffffff) 05:13:39 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0xe, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @generic={0x0, 0x2}]}}}}}) 05:13:39 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x0, 0x2}]}}}}}) 05:13:39 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:39 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000800000000000003000000851ac0ff04000000180000000200000000000000010000002594f0"], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:39 executing program 3: r0 = add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffd) keyctl$revoke(0x3, r0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) bpf$BPF_LINK_CREATE_XDP(0x17, 0x0, 0x0) r2 = getuid() socket$inet_smc(0x2b, 0x1, 0x0) r3 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r1) r4 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r3) add_key$fscrypt_provisioning(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000300)={0x3, 0x0, @d}, 0x18, r4) keyctl$chown(0x4, r1, r2, 0xffffffffffffffff) 05:13:39 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@generic={0x0, 0x2}]}}}}}) 05:13:39 executing program 3: r0 = add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffd) keyctl$revoke(0x3, r0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) bpf$BPF_LINK_CREATE_XDP(0x17, 0x0, 0x0) r2 = getuid() socket$inet_smc(0x2b, 0x1, 0x0) r3 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r1) add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r3) keyctl$chown(0x4, r1, r2, 0xffffffffffffffff) 05:13:39 executing program 2: ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:39 executing program 5: ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:39 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000800000000000003000000851ac0ff04000000180000000200000000000000010000002594f0"], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:39 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x0, 0x2}]}}}}}) 05:13:39 executing program 4: r0 = add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffd) keyctl$revoke(0x3, r0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) bpf$BPF_LINK_CREATE_XDP(0x17, 0x0, 0x0) r2 = getuid() socket$inet_smc(0x2b, 0x1, 0x0) r3 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r1) r4 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r3) add_key$fscrypt_provisioning(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000300)={0x3, 0x0, @d}, 0x18, r4) keyctl$chown(0x4, r1, r2, 0xffffffffffffffff) 05:13:39 executing program 2: ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:39 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000800000000000003000000851ac0ff04000000180000000200000000000000010000002594f0"], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:39 executing program 5: ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:39 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x0, 0x2}]}}}}}) 05:13:39 executing program 3: r0 = add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffd) keyctl$revoke(0x3, r0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) bpf$BPF_LINK_CREATE_XDP(0x17, 0x0, 0x0) r2 = getuid() socket$inet_smc(0x2b, 0x1, 0x0) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$chown(0x4, r1, r2, 0xffffffffffffffff) 05:13:39 executing program 4: r0 = add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffd) keyctl$revoke(0x3, r0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) bpf$BPF_LINK_CREATE_XDP(0x17, 0x0, 0x0) r2 = getuid() socket$inet_smc(0x2b, 0x1, 0x0) r3 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r1) r4 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r3) add_key$fscrypt_provisioning(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000300)={0x3, 0x0, @d}, 0x18, r4) keyctl$chown(0x4, r1, r2, 0xffffffffffffffff) 05:13:39 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000800000000000003000000851ac0ff04000000180000000200000000000000010000002594f0ff"], 0x0, 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:39 executing program 2: ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:39 executing program 5: ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:39 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x17, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x0, 0x7, "965bc963e4"}]}}}}}) 05:13:39 executing program 3: r0 = add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffd) keyctl$revoke(0x3, r0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) bpf$BPF_LINK_CREATE_XDP(0x17, 0x0, 0x0) r2 = getuid() socket$inet_smc(0x2b, 0x1, 0x0) keyctl$chown(0x4, r1, r2, 0xffffffffffffffff) 05:13:39 executing program 4: r0 = add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffd) keyctl$revoke(0x3, r0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) bpf$BPF_LINK_CREATE_XDP(0x17, 0x0, 0x0) r2 = getuid() socket$inet_smc(0x2b, 0x1, 0x0) r3 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r1) r4 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r3) add_key$fscrypt_provisioning(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000300)={0x3, 0x0, @d}, 0x18, r4) keyctl$chown(0x4, r1, r2, 0xffffffffffffffff) 05:13:39 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x0, 0x2}]}}}}}) 05:13:39 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000800000000000003000000851ac0ff04000000180000000200000000000000010000002594f0ff"], 0x0, 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:39 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:39 executing program 4: r0 = add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffd) keyctl$revoke(0x3, r0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) bpf$BPF_LINK_CREATE_XDP(0x17, 0x0, 0x0) getuid() socket$inet_smc(0x2b, 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r2) add_key$fscrypt_provisioning(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, &(0x7f0000000300)={0x3, 0x0, @d}, 0x18, r3) 05:13:39 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:39 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x0, 0x2}]}}}}}) 05:13:39 executing program 3: r0 = add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffd) keyctl$revoke(0x3, r0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) bpf$BPF_LINK_CREATE_XDP(0x17, 0x0, 0x0) r2 = getuid() keyctl$chown(0x4, r1, r2, 0xffffffffffffffff) 05:13:39 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000800000000000003000000851ac0ff04000000180000000200000000000000010000002594f0ff"], 0x0, 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:39 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:39 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:39 executing program 4: r0 = add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffd) keyctl$revoke(0x3, r0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) bpf$BPF_LINK_CREATE_XDP(0x17, 0x0, 0x0) getuid() socket$inet_smc(0x2b, 0x1, 0x0) r2 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r1) add_key$keyring(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x0}, 0x0, 0x0, r2) 05:13:40 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x0, 0x2}]}}}}}) 05:13:40 executing program 3: r0 = add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffd) keyctl$revoke(0x3, r0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) bpf$BPF_LINK_CREATE_XDP(0x17, 0x0, 0x0) keyctl$chown(0x4, r1, 0x0, 0xffffffffffffffff) 05:13:40 executing program 5: socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:40 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x16, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x0, 0x5, "965bc9"}]}}}}}) 05:13:40 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000800000000000003000000851ac0ff04000000180000000200000000000000010000002594f0ff"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:40 executing program 2: socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:40 executing program 4: r0 = add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffd) keyctl$revoke(0x3, r0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) bpf$BPF_LINK_CREATE_XDP(0x17, 0x0, 0x0) getuid() socket$inet_smc(0x2b, 0x1, 0x0) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r1) 05:13:40 executing program 3: r0 = add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffd) keyctl$revoke(0x3, r0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$chown(0x4, r1, 0x0, 0xffffffffffffffff) 05:13:40 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000800000000000003000000851ac0ff04000000180000000200000000000000010000002594f0ff"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:40 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) 05:13:40 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) 05:13:40 executing program 4: r0 = add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffd) keyctl$revoke(0x3, r0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) bpf$BPF_LINK_CREATE_XDP(0x17, 0x0, 0x0) getuid() add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r1) 05:13:40 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x16, 0x4, 0x0, 0x0, 0x58, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x0, 0x3, "96"}]}}}}}) 05:13:40 executing program 3: r0 = add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffd) keyctl$revoke(0x3, r0) keyctl$chown(0x4, 0x0, 0x0, 0xffffffffffffffff) 05:13:40 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) 05:13:40 executing program 4: r0 = add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffd) keyctl$revoke(0x3, r0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) bpf$BPF_LINK_CREATE_XDP(0x17, 0x0, 0x0) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r1) 05:13:40 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) 05:13:40 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000800000000000003000000851ac0ff04000000180000000200000000000000010000002594f0ff"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0xdc, &(0x7f0000000140)=""/220, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:40 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x0, 0x2}]}}}}}) 05:13:40 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) 05:13:40 executing program 4: r0 = add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffd) keyctl$revoke(0x3, r0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r1) 05:13:40 executing program 3: r0 = add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffd) keyctl$revoke(0x3, r0) keyctl$chown(0x4, 0x0, 0x0, 0xffffffffffffffff) 05:13:40 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, 0x0) 05:13:40 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x0, 0x2}]}}}}}) 05:13:40 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000800000000000003000000851ac0ff04000000180000000200000000000000010000002594f0ff"], &(0x7f0000000100)='syzkaller\x00', 0x4, 0x0, 0x0, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:40 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', 0x0}) 05:13:40 executing program 4: r0 = add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffd) keyctl$revoke(0x3, r0) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0x0) 05:13:40 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000800000000000003000000851ac0ff04000000180000000200000000000000010000002594f0ff"], &(0x7f0000000100)='syzkaller\x00', 0x4, 0x0, 0x0, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:40 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', 0x0}) 05:13:40 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}, @generic={0x0, 0x2}]}}}}}) 05:13:40 executing program 4: r0 = add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffd) keyctl$revoke(0x3, r0) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0x0) 05:13:40 executing program 3: r0 = add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffd) keyctl$revoke(0x3, r0) keyctl$chown(0x4, 0x0, 0x0, 0xffffffffffffffff) 05:13:40 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', 0x0}) 05:13:40 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', 0x0}) 05:13:40 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$chown(0x4, r0, 0x0, 0xffffffffffffffff) 05:13:40 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0xe, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @generic={0x0, 0x3, "96"}]}}}}}) 05:13:40 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000800000000000003000000851ac0ff04000000180000000200000000000000010000002594f0ff"], &(0x7f0000000100)='syzkaller\x00', 0x4, 0x0, 0x0, 0x41000, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:40 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0xe, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @generic={0x0, 0x2}]}}}}}) 05:13:40 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000800000000000003000000851ac0ff04000000180000000200000000000000010000002594f0ff"], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x0, 0x13, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:40 executing program 4: r0 = add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffd) keyctl$revoke(0x3, r0) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, 0x0) 05:13:40 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', 0x0}) 05:13:40 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', 0x0}) 05:13:40 executing program 3: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$chown(0x4, r0, 0x0, 0xffffffffffffffff) 05:13:40 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:40 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@generic={0x0, 0x2}]}}}}}) 05:13:40 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000800000000000003000000851ac0ff04000000180000000200000000000000010000002594f0ff"], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:40 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0xd, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}]}}}}}) 05:13:40 executing program 4: add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r0) 05:13:40 executing program 3: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$chown(0x4, r0, 0x0, 0xffffffffffffffff) 05:13:40 executing program 1: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$chown(0x4, r0, 0x0, 0xffffffffffffffff) 05:13:40 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:40 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000800000000000003000000851ac0ff04000000180000000200000000000000010000002594f0ff"], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x4, 0x1, 0x2, 0x6}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:40 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0xd, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}]}}}}}) 05:13:40 executing program 4: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r0) 05:13:40 executing program 3: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$chown(0x4, r0, 0x0, 0xffffffffffffffff) 05:13:40 executing program 1: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$chown(0x4, r0, 0x0, 0xffffffffffffffff) 05:13:40 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000800000000000003000000851ac0ff04000000180000000200000000000000010000002594f0ff"], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x80) 05:13:40 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0xd, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}]}}}}}) 05:13:40 executing program 4: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r0) 05:13:40 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x60, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:40 executing program 3: add_key$fscrypt_provisioning(0x0, &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$chown(0x4, r0, 0x0, 0xffffffffffffffff) 05:13:40 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x0, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:40 executing program 4: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r0) 05:13:40 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0xd, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}]}}}}}) 05:13:40 executing program 1: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$chown(0x4, r0, 0x0, 0xffffffffffffffff) 05:13:40 executing program 3: add_key$fscrypt_provisioning(0x0, &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$chown(0x4, r0, 0x0, 0xffffffffffffffff) 05:13:40 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xa, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000800000000000003000000851ac0ff04000000180000000200000000000000010000002594f0ff"], &(0x7f0000000100)='syzkaller\x00', 0x4, 0xdc, &(0x7f0000000140)=""/220, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:13:40 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1b, 0x0, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote]}]}}}}}) 05:13:40 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0xd, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}]}}}}}) 05:13:40 executing program 4: add_key$fscrypt_provisioning(0x0, &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r0) 05:13:40 executing program 3: add_key$fscrypt_provisioning(0x0, &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$chown(0x4, r0, 0x0, 0xffffffffffffffff) 05:13:40 executing program 1: keyctl$chown(0x4, 0x0, 0x0, 0xffffffffffffffff) 05:13:40 executing program 0: r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r0) 05:13:40 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1b, 0x0, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote]}]}}}}}) 05:13:40 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0xd, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}]}}}}}) 05:13:40 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, &(0x7f0000000080)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$chown(0x4, r0, 0x0, 0xffffffffffffffff) 05:13:40 executing program 4: add_key$fscrypt_provisioning(0x0, &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r0) 05:13:40 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:13:40 executing program 1: keyctl$chown(0x4, 0x0, 0x0, 0xffffffffffffffff) 05:13:40 executing program 4: add_key$fscrypt_provisioning(0x0, &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r0) 05:13:40 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1b, 0x0, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote]}]}}}}}) 05:13:40 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$chown(0x4, r0, 0x0, 0xffffffffffffffff) 05:13:40 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x0, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:40 executing program 1: keyctl$chown(0x4, 0x0, 0x0, 0xffffffffffffffff) 05:13:40 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$chown(0x4, r0, 0x0, 0xffffffffffffffff) 05:13:40 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1b, 0x0, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @local]}]}}}}}) 05:13:40 executing program 1: r0 = add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$chown(0x4, r0, 0x0, 0xffffffffffffffff) 05:13:40 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1b, 0x0, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote]}]}}}}}) 05:13:40 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:13:40 executing program 4: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, &(0x7f0000000080)={0x2, 0x0, @c}, 0x29, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r0) 05:13:40 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$chown(0x4, r0, 0x0, 0xffffffffffffffff) 05:13:40 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1b, 0x0, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote]}]}}}}}) 05:13:40 executing program 1: r0 = add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$chown(0x4, r0, 0x0, 0xffffffffffffffff) 05:13:40 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1b, 0x0, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @local]}]}}}}}) 05:13:40 executing program 4: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r0) 05:13:40 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$chown(0x4, r0, 0x0, 0xffffffffffffffff) 05:13:40 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1b, 0x0, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @remote]}]}}}}}) 05:13:40 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1b, 0x0, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @local]}]}}}}}) 05:13:40 executing program 1: r0 = add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$chown(0x4, r0, 0x0, 0xffffffffffffffff) 05:13:40 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:13:40 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$chown(0x4, r0, 0x0, 0xffffffffffffffff) 05:13:40 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1b, 0x0, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @local]}]}}}}}) 05:13:40 executing program 1: r0 = add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$chown(0x4, r0, 0x0, 0xffffffffffffffff) 05:13:40 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1b, 0x0, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @remote, @local]}]}}}}}) 05:13:40 executing program 4: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r0) 05:13:40 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1b, 0x0, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @local]}]}}}}}) 05:13:40 executing program 1: r0 = add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$chown(0x4, r0, 0x0, 0xffffffffffffffff) 05:13:40 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$chown(0x4, r0, 0x0, 0xffffffffffffffff) 05:13:40 executing program 4: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r0) 05:13:40 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1b, 0x0, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @remote, @local]}]}}}}}) 05:13:40 executing program 1: r0 = add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$chown(0x4, r0, 0x0, 0xffffffffffffffff) 05:13:40 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:40 executing program 4: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r0) 05:13:40 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1b, 0x0, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @multicast2, @local]}]}}}}}) 05:13:40 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) keyctl$chown(0x4, r0, 0x0, 0xffffffffffffffff) 05:13:40 executing program 1: add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$chown(0x4, 0x0, 0x0, 0xffffffffffffffff) 05:13:40 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1b, 0x0, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @remote, @local]}]}}}}}) 05:13:40 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$chown(0x4, 0x0, 0x0, 0xffffffffffffffff) 05:13:40 executing program 4: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r0) 05:13:40 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1b, 0x0, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @remote, @local]}]}}}}}) 05:13:40 executing program 1: add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$chown(0x4, 0x0, 0x0, 0xffffffffffffffff) 05:13:40 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1b, 0x0, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @multicast2, @remote, @local]}]}}}}}) 05:13:40 executing program 1: add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$chown(0x4, 0x0, 0x0, 0xffffffffffffffff) 05:13:40 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:40 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1b, 0x0, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @remote, @local]}]}}}}}) 05:13:40 executing program 4: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r0) 05:13:40 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$chown(0x4, 0x0, 0x0, 0xffffffffffffffff) 05:13:40 executing program 1: r0 = request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='{{[,)]-]*]-:!\\]#]\x00', 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)={0x0, 0x0, @a}, 0x48, r0) r1 = add_key$fscrypt_provisioning(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)={0x7, 0x0, @c}, 0x29, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r1) r2 = add_key$fscrypt_provisioning(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000340)={0x2, 0x0, @b}, 0x48, r0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f00000003c0)={r2, 0x84, 0xca}, &(0x7f0000000400)={'enc=', 'oaep', ' hash=', {'sha224-asm\x00'}}, &(0x7f0000000480)="4f4294c0de57b3fcf1d124bb86c756e71b114a6fbe7624193c798e165c66b8078d90319f32af7a7e371150d41e26b75707ea30344448b04c5f039dd5ea422491e7d1a689aa4fad6222d224c4a8706a5272342cd82d32f8beffc3350778e58167accafa69a260ea915845ffe3959bd667759bd2695ac49824195bb36af813f7d87bb9058b", &(0x7f0000000540)=""/202) syz_open_dev$sg(&(0x7f0000000280), 0x7, 0x111002) bpf$BPF_LINK_CREATE_XDP(0x3, 0x0, 0xb666f38209c78008) 05:13:40 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1b, 0x0, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @multicast2, @remote, @local]}]}}}}}) 05:13:40 executing program 4: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r0) 05:13:40 executing program 1: r0 = request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='{{[,)]-]*]-:!\\]#]\x00', 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)={0x0, 0x0, @a}, 0x48, r0) r1 = add_key$fscrypt_provisioning(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)={0x7, 0x0, @c}, 0x29, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r1) r2 = add_key$fscrypt_provisioning(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000340)={0x2, 0x0, @b}, 0x48, r0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f00000003c0)={r2, 0x84, 0xca}, &(0x7f0000000400)={'enc=', 'oaep', ' hash=', {'sha224-asm\x00'}}, &(0x7f0000000480)="4f4294c0de57b3fcf1d124bb86c756e71b114a6fbe7624193c798e165c66b8078d90319f32af7a7e371150d41e26b75707ea30344448b04c5f039dd5ea422491e7d1a689aa4fad6222d224c4a8706a5272342cd82d32f8beffc3350778e58167accafa69a260ea915845ffe3959bd667759bd2695ac49824195bb36af813f7d87bb9058b", &(0x7f0000000540)=""/202) syz_open_dev$sg(&(0x7f0000000280), 0x7, 0x111002) bpf$BPF_LINK_CREATE_XDP(0x3, 0x0, 0xb666f38209c78008) 05:13:40 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1b, 0x0, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @multicast2, @remote, @local]}]}}}}}) 05:13:40 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1b, 0x0, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @loopback, @remote, @local]}]}}}}}) 05:13:40 executing program 3: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$chown(0x4, 0x0, 0x0, 0xffffffffffffffff) 05:13:40 executing program 4: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(0x0, &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r0) 05:13:41 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:41 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1b, 0x0, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:41 executing program 3: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:41 executing program 1: r0 = request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='{{[,)]-]*]-:!\\]#]\x00', 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)={0x0, 0x0, @a}, 0x48, r0) r1 = add_key$fscrypt_provisioning(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)={0x7, 0x0, @c}, 0x29, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r1) r2 = add_key$fscrypt_provisioning(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000340)={0x2, 0x0, @b}, 0x48, r0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f00000003c0)={r2, 0x84, 0xca}, &(0x7f0000000400)={'enc=', 'oaep', ' hash=', {'sha224-asm\x00'}}, &(0x7f0000000480)="4f4294c0de57b3fcf1d124bb86c756e71b114a6fbe7624193c798e165c66b8078d90319f32af7a7e371150d41e26b75707ea30344448b04c5f039dd5ea422491e7d1a689aa4fad6222d224c4a8706a5272342cd82d32f8beffc3350778e58167accafa69a260ea915845ffe3959bd667759bd2695ac49824195bb36af813f7d87bb9058b", &(0x7f0000000540)=""/202) syz_open_dev$sg(&(0x7f0000000280), 0x7, 0x111002) bpf$BPF_LINK_CREATE_XDP(0x3, 0x0, 0xb666f38209c78008) 05:13:41 executing program 4: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(0x0, &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r0) 05:13:41 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1b, 0x0, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @multicast2, @remote, @local]}]}}}}}) 05:13:41 executing program 4: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(0x0, &(0x7f0000000280)={'syz', 0x2}, 0x0, 0x0, r0) 05:13:41 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1b, 0x0, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:41 executing program 1: r0 = request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='{{[,)]-]*]-:!\\]#]\x00', 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)={0x0, 0x0, @a}, 0x48, r0) r1 = add_key$fscrypt_provisioning(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)={0x7, 0x0, @c}, 0x29, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r1) r2 = add_key$fscrypt_provisioning(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000340)={0x2, 0x0, @b}, 0x48, r0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f00000003c0)={r2, 0x84, 0xca}, &(0x7f0000000400)={'enc=', 'oaep', ' hash=', {'sha224-asm\x00'}}, &(0x7f0000000480)="4f4294c0de57b3fcf1d124bb86c756e71b114a6fbe7624193c798e165c66b8078d90319f32af7a7e371150d41e26b75707ea30344448b04c5f039dd5ea422491e7d1a689aa4fad6222d224c4a8706a5272342cd82d32f8beffc3350778e58167accafa69a260ea915845ffe3959bd667759bd2695ac49824195bb36af813f7d87bb9058b", &(0x7f0000000540)=""/202) syz_open_dev$sg(&(0x7f0000000280), 0x7, 0x111002) 05:13:41 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1b, 0x0, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @multicast2, @remote, @local]}]}}}}}) 05:13:41 executing program 3: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:41 executing program 4: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) r0 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000240), 0x0, 0x0, 0x0, r0) 05:13:41 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x62, &(0x7f0000000200)=""/4096) 05:13:41 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1b, 0x0, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:41 executing program 1: r0 = request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='{{[,)]-]*]-:!\\]#]\x00', 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)={0x0, 0x0, @a}, 0x48, r0) r1 = add_key$fscrypt_provisioning(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)={0x7, 0x0, @c}, 0x29, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r1) r2 = add_key$fscrypt_provisioning(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000340)={0x2, 0x0, @b}, 0x48, r0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f00000003c0)={r2, 0x84, 0xca}, &(0x7f0000000400)={'enc=', 'oaep', ' hash=', {'sha224-asm\x00'}}, &(0x7f0000000480)="4f4294c0de57b3fcf1d124bb86c756e71b114a6fbe7624193c798e165c66b8078d90319f32af7a7e371150d41e26b75707ea30344448b04c5f039dd5ea422491e7d1a689aa4fad6222d224c4a8706a5272342cd82d32f8beffc3350778e58167accafa69a260ea915845ffe3959bd667759bd2695ac49824195bb36af813f7d87bb9058b", &(0x7f0000000540)=""/202) 05:13:41 executing program 4: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000240), 0x0, 0x0, 0x0, 0x0) 05:13:41 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1b, 0x0, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private=0xa010102, @multicast2, @remote, @local]}]}}}}}) 05:13:41 executing program 3: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:41 executing program 1: r0 = request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='{{[,)]-]*]-:!\\]#]\x00', 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)={0x0, 0x0, @a}, 0x48, r0) r1 = add_key$fscrypt_provisioning(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)={0x7, 0x0, @c}, 0x29, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r1) add_key$fscrypt_provisioning(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000340)={0x2, 0x0, @b}, 0x48, r0) 05:13:41 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1b, 0x0, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:41 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x0, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:41 executing program 4: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000240), 0x0, 0x0, 0x0, 0x0) 05:13:41 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1b, 0x0, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:41 executing program 4: add_key$fscrypt_provisioning(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000240), 0x0, 0x0, 0x0, 0x0) 05:13:41 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x62, &(0x7f0000000200)=""/4096) 05:13:41 executing program 1: r0 = request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='{{[,)]-]*]-:!\\]#]\x00', 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)={0x0, 0x0, @a}, 0x48, r0) r1 = add_key$fscrypt_provisioning(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)={0x7, 0x0, @c}, 0x29, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r1) 05:13:41 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1b, 0x0, [@dev={0xac, 0x14, 0x14, 0x2d}, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:41 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1b, 0x0, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:41 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:41 executing program 3: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:41 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1b, 0x0, [@dev={0xac, 0x14, 0x14, 0x2d}, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:41 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x0, [@dev={0xac, 0x14, 0x14, 0x2d}, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:41 executing program 1: r0 = request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='{{[,)]-]*]-:!\\]#]\x00', 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)={0x0, 0x0, @a}, 0x48, r0) keyctl$assume_authority(0x10, 0x0) 05:13:41 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:41 executing program 1: request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='{{[,)]-]*]-:!\\]#]\x00', 0xfffffffffffffffe) keyctl$assume_authority(0x10, 0x0) 05:13:41 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1b, 0x0, [@dev={0xac, 0x14, 0x14, 0x2d}, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:41 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x62, &(0x7f0000000200)=""/4096) 05:13:41 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1b, 0x0, [@dev={0xac, 0x14, 0x14, 0x2d}, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:41 executing program 1: keyctl$assume_authority(0x10, 0x0) 05:13:41 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1b, 0x0, [@remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:41 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:41 executing program 3: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:41 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1b, 0x0, [@dev={0xac, 0x14, 0x14, 0x2d}, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:41 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1b, 0x0, [@remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:41 executing program 1: keyctl$assume_authority(0x10, 0x0) 05:13:41 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1b, 0x0, [@remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:41 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1b, 0x0, [@dev={0xac, 0x14, 0x14, 0x2d}, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:41 executing program 1: keyctl$assume_authority(0x10, 0x0) 05:13:41 executing program 0: r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:13:41 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1b, 0x0, [@remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:41 executing program 1: request_key(0x0, &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='{{[,)]-]*]-:!\\]#]\x00', 0xfffffffffffffffe) keyctl$assume_authority(0x10, 0x0) 05:13:41 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:41 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:41 executing program 3: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:41 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0xd, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:41 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0xd, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:41 executing program 1: request_key(0x0, &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='{{[,)]-]*]-:!\\]#]\x00', 0xfffffffffffffffe) keyctl$assume_authority(0x10, 0x0) 05:13:41 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1b, 0x0, [@remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:41 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1b, 0x0, [@remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:41 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0xd, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:41 executing program 0: r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:13:41 executing program 1: request_key(0x0, &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='{{[,)]-]*]-:!\\]#]\x00', 0xfffffffffffffffe) keyctl$assume_authority(0x10, 0x0) 05:13:41 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x4, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:41 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x0, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:41 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:41 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:41 executing program 1: request_key(&(0x7f0000000000)='rxrpc_s\x00', 0x0, &(0x7f0000000080)='{{[,)]-]*]-:!\\]#]\x00', 0xfffffffffffffffe) keyctl$assume_authority(0x10, 0x0) 05:13:41 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1b, 0x0, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:41 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0xd, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:41 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1b, 0x0, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:41 executing program 1: request_key(&(0x7f0000000000)='rxrpc_s\x00', 0x0, &(0x7f0000000080)='{{[,)]-]*]-:!\\]#]\x00', 0xfffffffffffffffe) keyctl$assume_authority(0x10, 0x0) 05:13:41 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1b, 0x0, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:42 executing program 0: r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:13:42 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0xd, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:42 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x0, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:42 executing program 1: request_key(&(0x7f0000000000)='rxrpc_s\x00', 0x0, &(0x7f0000000080)='{{[,)]-]*]-:!\\]#]\x00', 0xfffffffffffffffe) keyctl$assume_authority(0x10, 0x0) 05:13:42 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:42 executing program 3: getpgrp(0x0) syz_clone(0x0, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:42 executing program 1: request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, 0x0) 05:13:42 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1b, 0x0, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @rand_addr]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:42 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0xd, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:42 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1b, 0x0, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @rand_addr]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:42 executing program 1: request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, 0x0) 05:13:42 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1b, 0x0, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @rand_addr]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:42 executing program 0: bpf$MAP_CREATE(0x3, 0x0, 0x0) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:13:42 executing program 1: request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, 0x0) 05:13:42 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x0, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr=0x64010102]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:42 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x0, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private, @rand_addr]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:42 executing program 3: getpgrp(0x0) syz_clone(0x0, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:42 executing program 4: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:42 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1b, 0x0, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @private, @rand_addr]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:42 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1b, 0x0, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:42 executing program 1: request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) keyctl$assume_authority(0x10, 0x0) 05:13:42 executing program 1: request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) 05:13:42 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1b, 0x0, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @private, @rand_addr]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:42 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1b, 0x0, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:42 executing program 0: bpf$MAP_CREATE(0x3, 0x0, 0x0) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:13:42 executing program 1: request_key(0x0, &(0x7f0000000040)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) 05:13:42 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1b, 0x0, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:42 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1b, 0x0, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @private, @rand_addr]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:42 executing program 3: getpgrp(0x0) syz_clone(0x0, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:42 executing program 4: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:42 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1b, 0x0, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @empty, @private, @rand_addr]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:42 executing program 1: request_key(0x0, &(0x7f0000000040)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) 05:13:42 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x0, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private=0xa010102, @rand_addr]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:42 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1b, 0x0, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @empty, @private, @rand_addr]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:42 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1b, 0x0, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @rand_addr]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:42 executing program 1: request_key(0x0, &(0x7f0000000040)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) 05:13:42 executing program 0: bpf$MAP_CREATE(0x3, 0x0, 0x0) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:13:42 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1b, 0x0, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @empty, @private, @rand_addr]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:42 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1b, 0x0, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @rand_addr]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:42 executing program 1: request_key(&(0x7f0000000000)='rxrpc_s\x00', 0x0, 0x0, 0xfffffffffffffffe) 05:13:42 executing program 3: getpgrp(0x0) syz_clone(0x8082200, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:42 executing program 4: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:42 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1b, 0x0, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @rand_addr]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:42 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1b, 0x0, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @empty, @private, @rand_addr]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:42 executing program 1: request_key(&(0x7f0000000000)='rxrpc_s\x00', 0x0, 0x0, 0xfffffffffffffffe) 05:13:42 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x0, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @empty, @private, @rand_addr]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:42 executing program 1: request_key(&(0x7f0000000000)='rxrpc_s\x00', 0x0, 0x0, 0xfffffffffffffffe) 05:13:42 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1b, 0x0, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @empty, @private, @rand_addr]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:43 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x0, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:13:43 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1b, 0x0, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @private, @rand_addr]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:43 executing program 1: bpf$MAP_CREATE(0x3, 0x0, 0x0) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:13:43 executing program 4: bpf$MAP_CREATE(0x3, 0x0, 0x0) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:43 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1b, 0x0, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @empty, @private, @rand_addr]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:43 executing program 3: getpgrp(0x0) syz_clone(0x8082200, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:43 executing program 1: bpf$MAP_CREATE(0x3, 0x0, 0x0) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:13:43 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x0, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr, @multicast1, @empty, @private, @rand_addr]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:43 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1b, 0x0, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @private, @rand_addr]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:43 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1b, 0x0, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @multicast1, @private, @rand_addr]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:43 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1b, 0x0, [@local, @rand_addr, @multicast1, @empty, @private, @rand_addr]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:43 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1b, 0x0, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @empty, @private, @rand_addr]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:43 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x0, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:13:43 executing program 1: bpf$MAP_CREATE(0x3, 0x0, 0x0) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:13:43 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1b, 0x0, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @empty, @private, @rand_addr]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:43 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1b, 0x0, [@local, @rand_addr, @multicast1, @empty, @private, @rand_addr]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:43 executing program 4: bpf$MAP_CREATE(0x3, 0x0, 0x0) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:43 executing program 3: getpgrp(0x0) syz_clone(0x8082200, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:43 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1b, 0x0, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr=0x64010100, @empty, @private, @rand_addr]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:43 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1b, 0x0, [@local, @rand_addr, @multicast1, @empty, @private, @rand_addr]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:43 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1b, 0x0, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @empty, @private, @rand_addr]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:43 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x0, [@local, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr, @multicast1, @empty, @private, @rand_addr]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:43 executing program 1: bpf$MAP_CREATE(0x3, 0x0, 0x0) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:43 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1b, 0x0, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @empty, @private, @rand_addr]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:43 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x0, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:13:43 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1b, 0x0, [@initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr, @multicast1, @empty, @private, @rand_addr]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:43 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1b, 0x0, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, @empty, @private, @rand_addr]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:43 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000), 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:43 executing program 1: bpf$MAP_CREATE(0x3, 0x0, 0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:43 executing program 4: bpf$MAP_CREATE(0x3, 0x0, 0x0) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:43 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x0, [@local, @initdev={0xac, 0x1e, 0x1, 0x0}, @rand_addr, @multicast1, @empty, @private, @rand_addr]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:43 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1b, 0x0, [@initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr, @multicast1, @empty, @private, @rand_addr]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:43 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1b, 0x0, [@local, @rand_addr, @multicast1, @empty, @private, @rand_addr]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:43 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1b, 0x0, [@initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr, @multicast1, @empty, @private, @rand_addr]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:43 executing program 5: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x0, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:13:43 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1b, 0x0, [@local, @rand_addr, @multicast1, @empty, @private, @rand_addr]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:44 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:13:44 executing program 5: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x0, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:13:44 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1b, 0x0, [@local, @rand_addr, @multicast1, @empty, @private, @rand_addr]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:44 executing program 1: bpf$MAP_CREATE(0x3, 0x0, 0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:44 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x0, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:44 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000), 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:44 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x15, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1f, 0x0, [@local, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr, @multicast1, @empty, @private, @rand_addr]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:44 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1b, 0x0, [@initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr, @multicast1, @empty, @private, @rand_addr]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:44 executing program 5: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x0, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:13:44 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1b, 0x0, [@initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr, @multicast1, @empty, @private, @rand_addr]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:44 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000200)={'sit0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x14, 0x4, 0x0, 0x0, 0x50, 0x0, 0x0, 0x0, 0x4, 0x0, @broadcast, @local, {[@ssrr={0x89, 0x1b, 0x0, [@initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr, @multicast1, @empty, @private, @rand_addr]}, @rr={0x7, 0x1f, 0x0, [@dev, @remote, @private, @loopback, @multicast2, @remote, @local]}]}}}}}) 05:13:44 executing program 1: bpf$MAP_CREATE(0x3, 0x0, 0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:44 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:13:44 executing program 2: bpf$MAP_CREATE(0x3, 0x0, 0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:44 executing program 5: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x0, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:44 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000), 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:44 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x0, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:44 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:44 executing program 2: bpf$MAP_CREATE(0x3, 0x0, 0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:44 executing program 5: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) syz_clone(0x0, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:44 executing program 2: bpf$MAP_CREATE(0x3, 0x0, 0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:44 executing program 5: syz_clone(0x0, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:44 executing program 1: syz_clone(0x0, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:44 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x0, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:45 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:13:45 executing program 2: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:45 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e143", 0x5e, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:45 executing program 5: syz_clone(0x0, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:45 executing program 1: syz_clone(0x0, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:45 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:45 executing program 2: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:45 executing program 5: syz_clone(0x0, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:45 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e143", 0x5e, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:45 executing program 2: syz_clone(0x0, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:45 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:45 executing program 2: syz_clone(0x0, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:45 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000), 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:13:45 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:45 executing program 2: syz_clone(0x0, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:45 executing program 1: syz_clone(0x0, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:45 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:45 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e143", 0x5e, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:45 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:45 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000), 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:13:45 executing program 2: syz_clone(0x8082200, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:45 executing program 1: syz_clone(0x8082200, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:45 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:45 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee", 0x8d, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:45 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:45 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0) 05:13:46 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:46 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0) 05:13:46 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0) 05:13:46 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:46 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:46 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000), 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:13:46 executing program 1: syz_clone(0x8082200, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:46 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)) 05:13:46 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:46 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee", 0x8d, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:46 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)) 05:13:46 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)) 05:13:46 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:46 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000), 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:46 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb") 05:13:46 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb") 05:13:46 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:47 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb") 05:13:47 executing program 1: syz_clone(0x8082200, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:47 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, 0x0) 05:13:47 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000), 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:47 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e143", 0x5e, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:13:47 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee", 0x8d, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:47 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96") 05:13:47 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96") 05:13:47 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96") 05:13:47 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb76") 05:13:47 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, 0x0) 05:13:47 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb76") 05:13:47 executing program 1: syz_clone(0x8082200, &(0x7f0000000000), 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:47 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb76") 05:13:47 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec") 05:13:47 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000), 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:47 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec") 05:13:47 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, 0x0) 05:13:47 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b03", 0xa5, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:47 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e143", 0x5e, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:13:47 executing program 1: syz_clone(0x8082200, &(0x7f0000000000), 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:47 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec") 05:13:47 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e6") 05:13:47 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)) 05:13:47 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e6") 05:13:47 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e6") 05:13:47 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea") 05:13:48 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e143", 0x5e, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:48 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea") 05:13:48 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)) 05:13:48 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b03", 0xa5, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:48 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e143", 0x5e, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:13:48 executing program 1: syz_clone(0x8082200, &(0x7f0000000000), 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:48 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea") 05:13:48 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1") 05:13:48 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)) 05:13:48 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1") 05:13:48 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1") 05:13:48 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf") 05:13:48 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e143", 0x5e, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:48 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf") 05:13:48 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb") 05:13:48 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b03", 0xa5, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:48 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee", 0x8d, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:13:48 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf") 05:13:48 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e143", 0x5e, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:48 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb") 05:13:48 executing program 5: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb") 05:13:49 executing program 5: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb") 05:13:49 executing program 5: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb") 05:13:49 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb") 05:13:49 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e143", 0x5e, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:49 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)) 05:13:49 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb") 05:13:49 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad", 0xb1, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:49 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee", 0x8d, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:13:49 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e143", 0x5e, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:49 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)) 05:13:49 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb") 05:13:49 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad", 0xb1, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:49 executing program 5: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, 0x0) 05:13:49 executing program 5: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee", 0x8d, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:13:49 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee", 0x8d, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:49 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)) 05:13:49 executing program 5: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee", 0x8d, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:13:49 executing program 5: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee", 0x8d, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:13:49 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e143", 0x5e, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:50 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270f") 05:13:50 executing program 5: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee", 0x8d, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:50 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee", 0x8d, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:13:50 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad", 0xb1, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:50 executing program 5: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee", 0x8d, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:50 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270f") 05:13:50 executing program 5: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee", 0x8d, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:50 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee", 0x8d, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:50 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270f") 05:13:50 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee", 0x8d, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:50 executing program 5: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee", 0x8d, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:50 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b03", 0xa5, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:13:50 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff") 05:13:50 executing program 5: syz_clone(0x0, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee", 0x8d, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:50 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9", 0xb7, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:50 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff") 05:13:50 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b03", 0xa5, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:13:50 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee", 0x8d, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:50 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee", 0x8d, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:50 executing program 5: syz_clone(0x0, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee", 0x8d, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:51 executing program 5: syz_clone(0x0, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee", 0x8d, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:51 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff") 05:13:51 executing program 5: syz_clone(0x8082200, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:51 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df") 05:13:51 executing program 5: syz_clone(0x8082200, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:51 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9", 0xb7, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:51 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee", 0x8d, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:51 executing program 5: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:51 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b03", 0xa5, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:13:51 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b03", 0xa5, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:51 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df") 05:13:51 executing program 5: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, 0x0) 05:13:52 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df") 05:13:52 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b03", 0xa5, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:52 executing program 5: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, 0x0) 05:13:52 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff86") 05:13:52 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff86") 05:13:52 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9", 0xb7, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:52 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff86") 05:13:52 executing program 5: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:52 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad", 0xb1, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:13:52 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b03", 0xa5, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:52 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6f") 05:13:52 executing program 5: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:52 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6f") 05:13:52 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b03", 0xa5, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:52 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6f") 05:13:52 executing program 5: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:52 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07a") 05:13:52 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236f", 0xba, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:52 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07a") 05:13:52 executing program 5: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b03", 0xa5, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:13:53 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad", 0xb1, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:13:53 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b03", 0xa5, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:53 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07a") 05:13:53 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b03", 0xa5, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:53 executing program 5: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b03", 0xa5, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:13:53 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9") 05:13:53 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9") 05:13:53 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07a") 05:13:53 executing program 5: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b03", 0xa5, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:13:53 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236f", 0xba, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:53 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07a") 05:13:53 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad", 0xb1, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:53 executing program 5: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b03", 0xa5, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:53 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad", 0xb1, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:53 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad", 0xb1, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:13:53 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07a") 05:13:53 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad", 0xb1, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:53 executing program 5: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b03", 0xa5, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:54 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc0") 05:13:54 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc0") 05:13:54 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc0") 05:13:55 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236f", 0xba, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:55 executing program 5: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b03", 0xa5, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:55 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6f") 05:13:55 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad", 0xb1, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:55 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad", 0xb1, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:55 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9", 0xb7, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:13:55 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a") 05:13:55 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a") 05:13:55 executing program 5: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b03", 0xa5, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:55 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a") 05:13:55 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07a") 05:13:55 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07a") 05:13:55 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe1", 0xbb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:55 executing program 5: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b03", 0xa5, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:55 executing program 2: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9", 0xb7, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:55 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9", 0xb7, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:55 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad", 0xb1, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:55 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9", 0xb7, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:13:55 executing program 2: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9", 0xb7, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:55 executing program 5: syz_clone(0x0, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b03", 0xa5, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:56 executing program 2: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9", 0xb7, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:56 executing program 2: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9", 0xb7, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:56 executing program 2: syz_clone(0x0, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9", 0xb7, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:56 executing program 2: syz_clone(0x0, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9", 0xb7, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:57 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe1", 0xbb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:57 executing program 5: syz_clone(0x0, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b03", 0xa5, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:57 executing program 2: syz_clone(0x0, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9", 0xb7, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:57 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9", 0xb7, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:13:57 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9", 0xb7, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:57 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9", 0xb7, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:57 executing program 2: syz_clone(0x8082200, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:57 executing program 5: syz_clone(0x0, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b03", 0xa5, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:57 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:57 executing program 5: syz_clone(0x8082200, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:58 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9", 0xb7, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:58 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:58 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe1", 0xbb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:58 executing program 5: syz_clone(0x8082200, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:58 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, 0x0) 05:13:58 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236f", 0xba, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:13:58 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9", 0xb7, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:58 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9", 0xb7, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:59 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9", 0xb7, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:13:59 executing program 5: syz_clone(0x8082200, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:59 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9", 0xb7, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:59 executing program 5: syz_clone(0x8082200, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:59 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236f", 0xba, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:13:59 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad", 0xb1, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:59 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:59 executing program 5: syz_clone(0x8082200, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:59 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236f", 0xba, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:59 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236f", 0xba, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:59 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9", 0xb7, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:59 executing program 5: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:59 executing program 5: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:59 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236f", 0xba, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:13:59 executing program 5: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:13:59 executing program 5: syz_clone(0x8082200, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0) 05:13:59 executing program 5: syz_clone(0x8082200, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0) 05:14:00 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236f", 0xba, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:00 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:00 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:00 executing program 5: syz_clone(0x8082200, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0) 05:14:00 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe1", 0xbb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:14:00 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236f", 0xba, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:00 executing program 5: syz_clone(0x8082200, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)) 05:14:00 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:00 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236f", 0xba, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:00 executing program 5: syz_clone(0x8082200, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)) 05:14:00 executing program 2: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9", 0xb7, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:00 executing program 5: syz_clone(0x8082200, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)) 05:14:00 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:00 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe1", 0xbb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:14:00 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236f", 0xba, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:01 executing program 5: syz_clone(0x8082200, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb") 05:14:01 executing program 2: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9", 0xb7, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:01 executing program 5: syz_clone(0x8082200, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)) 05:14:01 executing program 5: syz_clone(0x8082200, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb") 05:14:01 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236f", 0xba, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:01 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe1", 0xbb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:01 executing program 5: syz_clone(0x8082200, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb") 05:14:01 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236f", 0xba, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:01 executing program 5: syz_clone(0x8082200, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb") 05:14:02 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:02 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe1", 0xbb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:14:02 executing program 5: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe1", 0xbb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:14:02 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236f", 0xba, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:02 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe1", 0xbb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:02 executing program 5: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:02 executing program 5: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad", 0xb1, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:02 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe1", 0xbb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:02 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236f", 0xba, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:02 executing program 5: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe1", 0xbb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:02 executing program 5: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe1", 0xbb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:02 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:14:02 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:02 executing program 2: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236f", 0xba, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:02 executing program 5: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236f", 0xba, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:02 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe1", 0xbb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:02 executing program 5: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236f", 0xba, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:02 executing program 5: syz_clone(0x0, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee", 0x8d, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:03 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe1", 0xbb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:03 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:14:03 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:03 executing program 5: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:03 executing program 2: syz_clone(0x0, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236f", 0xba, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:03 executing program 5: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:03 executing program 2: syz_clone(0x0, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236f", 0xba, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:03 executing program 5: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:03 executing program 5: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee", 0x8d, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:04 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe1", 0xbb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:04 executing program 2: syz_clone(0x0, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236f", 0xba, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:04 executing program 5: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee", 0x8d, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:04 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:04 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:14:04 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), 0x0) 05:14:05 executing program 5: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee", 0x8d, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:05 executing program 2: syz_clone(0x8082200, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:05 executing program 5: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee", 0x8d, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:05 executing program 2: syz_clone(0x8082200, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:05 executing program 5: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e143", 0x5e, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:05 executing program 2: syz_clone(0x8082200, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:06 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:06 executing program 5: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee", 0x8d, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:06 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:14:06 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), 0x0) 05:14:06 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:06 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:06 executing program 5: syz_clone(0x8082200, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:07 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:07 executing program 5: syz_clone(0x8082200, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:07 executing program 5: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)) 05:14:07 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:07 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1") 05:14:07 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:07 executing program 2: syz_clone(0x8082200, 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:08 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:14:08 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), 0x0) 05:14:08 executing program 5: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)) 05:14:08 executing program 2: syz_clone(0x8082200, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0) 05:14:08 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:08 executing program 5: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:08 executing program 2: syz_clone(0x8082200, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0) 05:14:08 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:08 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:14:08 executing program 5: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:08 executing program 2: syz_clone(0x8082200, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0) [ 232.875773][ T7856] cgroup: fork rejected by pids controller in /syz3 05:14:08 executing program 2: syz_clone(0x8082200, 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000140)) 05:14:08 executing program 5: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000), 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:10 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 05:14:10 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:10 executing program 2: syz_clone(0x8082200, 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000140)) 05:14:10 executing program 5: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000), 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:10 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:10 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:14:10 executing program 5: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), 0x0) 05:14:10 executing program 2: syz_clone(0x8082200, 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000140)) [ 234.611858][T28456] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 05:14:10 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:10 executing program 2: syz_clone(0x8082200, 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000140)) [ 234.763849][T28456] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 234.848600][T28456] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 05:14:10 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) [ 234.907268][T28456] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 05:14:11 executing program 2: syz_clone(0x8082200, 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000140)) [ 235.586710][T28456] device hsr_slave_0 left promiscuous mode [ 235.592993][T28456] device hsr_slave_1 left promiscuous mode [ 235.615477][T28456] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 235.622921][T28456] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 235.654434][T28456] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 235.661876][T28456] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 235.709805][T28456] device bridge_slave_1 left promiscuous mode [ 235.716063][T28456] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.751107][T28456] device bridge_slave_0 left promiscuous mode [ 235.757373][T28456] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.815492][T28456] device veth1_macvtap left promiscuous mode [ 235.821515][T28456] device veth0_macvtap left promiscuous mode [ 235.827610][T28456] device veth1_vlan left promiscuous mode [ 235.833354][T28456] device veth0_vlan left promiscuous mode [ 236.258746][T28456] team0 (unregistering): Port device team_slave_1 removed [ 236.281526][T28456] team0 (unregistering): Port device team_slave_0 removed [ 236.311372][T28456] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 236.338915][T28456] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 236.443471][T28456] bond0 (unregistering): Released all slaves 05:14:12 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 05:14:12 executing program 2: syz_clone(0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000140)) 05:14:12 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:12 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:12 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:14:12 executing program 2: syz_clone(0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000140)) [ 237.090013][ T7933] chnl_net:caif_netlink_parms(): no params data found [ 237.375795][ T7933] bridge0: port 1(bridge_slave_0) entered blocking state [ 237.382880][ T7933] bridge0: port 1(bridge_slave_0) entered disabled state [ 237.432248][ T7933] device bridge_slave_0 entered promiscuous mode [ 237.449025][ T7933] bridge0: port 2(bridge_slave_1) entered blocking state [ 237.456222][ T7933] bridge0: port 2(bridge_slave_1) entered disabled state [ 237.499808][ T7933] device bridge_slave_1 entered promiscuous mode [ 237.606763][ T7933] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 237.617208][ T7933] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 237.714349][ T7933] team0: Port device team_slave_0 added [ 237.720949][ T7933] team0: Port device team_slave_1 added [ 237.795933][ T7933] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 237.803030][ T7933] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 237.829034][ T7933] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 237.923200][ T7933] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 237.930355][ T7933] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 237.956366][ T7933] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 238.079303][ T7933] device hsr_slave_0 entered promiscuous mode [ 238.089992][ T7933] device hsr_slave_1 entered promiscuous mode [ 238.114315][ T7933] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 238.121943][ T7933] Cannot create hsr debugfs directory [ 238.616519][ T7933] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 238.645801][ T7933] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 238.677025][ T7933] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 238.686426][ T7933] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 238.815788][ T7933] 8021q: adding VLAN 0 to HW filter on device bond0 [ 238.826400][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 238.835649][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 238.856806][ T7933] 8021q: adding VLAN 0 to HW filter on device team0 [ 238.885800][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 238.904764][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 238.913221][ T24] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.920317][ T24] bridge0: port 1(bridge_slave_0) entered forwarding state [ 238.984050][ T7933] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 238.994484][ T7933] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 239.046258][ T889] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 239.065401][ T889] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 239.076933][ T889] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 239.094780][ T889] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.101861][ T889] bridge0: port 2(bridge_slave_1) entered forwarding state [ 239.114081][ T889] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 239.122881][ T889] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 239.186800][ T889] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 239.195460][ T889] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 239.245623][ T889] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 239.280044][ T889] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 239.328699][ T889] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 239.354544][ T889] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 239.377014][ T889] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 239.405962][ T889] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 239.417989][ T2040] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 239.427197][ T2040] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 239.578008][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 239.586747][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 239.607299][ T7933] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 239.779350][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 239.791467][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 239.981691][ T7933] device veth0_vlan entered promiscuous mode [ 240.014930][ T2040] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 240.023264][ T2040] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 240.057185][ T7933] device veth1_vlan entered promiscuous mode [ 240.066071][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 240.074141][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 240.085780][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 240.132038][ T7933] device veth0_macvtap entered promiscuous mode [ 240.167193][ T2040] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 240.175491][ T2040] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 240.185740][ T2040] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 240.207297][ T7933] device veth1_macvtap entered promiscuous mode [ 240.215460][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 240.223581][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 240.257813][ T7933] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 240.268397][ T7933] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 240.278229][ T7933] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 240.288730][ T7933] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 240.298565][ T7933] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 240.308988][ T7933] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 240.318849][ T7933] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 240.329302][ T7933] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 240.339114][ T7933] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 240.349658][ T7933] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 240.365192][ T7933] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 240.373596][ T1906] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 240.384620][ T1906] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 240.394387][ T7933] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 240.404938][ T7933] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 240.414852][ T7933] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 240.425305][ T7933] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 240.435140][ T7933] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 240.445572][ T7933] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 240.455457][ T7933] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 240.465896][ T7933] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 240.475801][ T7933] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 240.486223][ T7933] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 240.638975][ T7933] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 240.650665][ T2040] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 240.664692][ T2040] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 240.675754][ T7933] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 240.684653][ T7933] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 240.693608][ T7933] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 240.702357][ T7933] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 05:14:16 executing program 5: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:14:16 executing program 2: syz_clone(0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000140)) 05:14:16 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:16 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:14:16 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), 0x0) 05:14:16 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 05:14:16 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)) 05:14:16 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)) 05:14:16 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, 0x0) 05:14:16 executing program 5: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:14:16 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, 0x0) 05:14:17 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, 0x0) 05:14:17 executing program 5: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:14:17 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, 0x0) 05:14:17 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), 0x0) 05:14:17 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:14:17 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, 0x0) 05:14:17 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), 0x0) 05:14:17 executing program 5: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), 0x0) 05:14:17 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb") 05:14:17 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:14:17 executing program 2: syz_clone(0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000140)) 05:14:17 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), 0x0) 05:14:17 executing program 5: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), 0x0) 05:14:18 executing program 2: syz_clone(0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000140)) 05:14:18 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), 0x0) 05:14:18 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb") 05:14:18 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:14:18 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), 0x0) 05:14:18 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), 0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:14:18 executing program 5: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), 0x0) 05:14:18 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), 0x0) 05:14:18 executing program 2: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:18 executing program 5: syz_clone(0x0, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), 0x0) 05:14:18 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), 0x0) 05:14:18 executing program 5: syz_clone(0x0, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), 0x0) 05:14:18 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:14:18 executing program 5: syz_clone(0x0, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), 0x0) 05:14:18 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb") 05:14:19 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:14:19 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 05:14:19 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, 0x0) 05:14:19 executing program 5: syz_clone(0x8082200, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), 0x0) 05:14:19 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 05:14:19 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, 0x0) 05:14:19 executing program 5: syz_clone(0x8082200, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0) 05:14:19 executing program 5: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, 0x0) 05:14:19 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, 0x0) 05:14:19 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:14:19 executing program 5: syz_clone(0x8082200, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0) 05:14:19 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96") 05:14:19 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 05:14:19 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 05:14:19 executing program 2: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb") 05:14:20 executing program 2: syz_clone(0x8082200, &(0x7f0000000000), 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:20 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96") 05:14:20 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 05:14:20 executing program 5: syz_clone(0x8082200, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0) 05:14:20 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:14:20 executing program 5: syz_clone(0x8082200, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0) 05:14:20 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 05:14:20 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x0) 05:14:20 executing program 2: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96") 05:14:21 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) 05:14:21 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 05:14:21 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, 0x0) 05:14:21 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:14:21 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb") 05:14:21 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96") 05:14:21 executing program 5: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96") 05:14:21 executing program 2: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb76") 05:14:21 executing program 5: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96") 05:14:21 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, 0x0) 05:14:21 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb") 05:14:21 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:14:23 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb") 05:14:23 executing program 5: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96") 05:14:23 executing program 2: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96") 05:14:23 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb") 05:14:23 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8f") 05:14:23 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:14:23 executing program 2: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96") 05:14:23 executing program 5: getpgrp(0x0) 05:14:23 executing program 2: syz_clone(0x8082200, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:23 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8f") 05:14:23 executing program 5: syz_clone(0x8082200, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:23 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96") 05:14:24 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8f") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:14:24 executing program 2: syz_clone(0x8082200, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:24 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb") 05:14:24 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:24 executing program 2: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e143", 0x5e, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:24 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:24 executing program 2: syz_clone(0x0, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:24 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8f") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:14:24 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb") 05:14:24 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8f") 05:14:24 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96") 05:14:24 executing program 5: syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:24 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:14:25 executing program 2: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:25 executing program 2: syz_clone(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:25 executing program 5: syz_clone(0x0, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:25 executing program 2: syz_clone(0x0, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:25 executing program 5: getpgrp(0x0) syz_clone(0x8082200, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:25 executing program 2: bpf$MAP_CREATE(0x3, 0x0, 0x0) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:26 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8f") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) [ 250.489550][T28456] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 250.685610][T28456] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 250.905563][T28456] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 05:14:27 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96") 05:14:27 executing program 2: r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:14:27 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96") 05:14:27 executing program 5: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:27 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:14:27 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b") [ 251.105208][T28456] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 251.847035][T28456] device hsr_slave_0 left promiscuous mode [ 251.854431][T28456] device hsr_slave_1 left promiscuous mode [ 251.885193][T28456] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 251.892628][T28456] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 251.917782][T28456] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 251.925257][T28456] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 251.966200][T28456] device bridge_slave_1 left promiscuous mode [ 251.972580][T28456] bridge0: port 2(bridge_slave_1) entered disabled state [ 251.985631][T28456] device bridge_slave_0 left promiscuous mode [ 251.991880][T28456] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.036960][T28456] device veth1_macvtap left promiscuous mode [ 252.042991][T28456] device veth0_macvtap left promiscuous mode [ 252.049041][T28456] device veth1_vlan left promiscuous mode [ 252.054903][T28456] device veth0_vlan left promiscuous mode 05:14:28 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8f") [ 252.356627][T28456] team0 (unregistering): Port device team_slave_1 removed [ 252.386310][T28456] team0 (unregistering): Port device team_slave_0 removed [ 252.425119][T28456] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 252.459414][T28456] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface 05:14:28 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b") [ 252.614232][T28456] bond0 (unregistering): Released all slaves 05:14:28 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:14:28 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8f") 05:14:28 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96") 05:14:29 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b") [ 253.619930][T28456] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 253.676505][ T8576] chnl_net:caif_netlink_parms(): no params data found [ 253.684844][ T8565] cgroup: fork rejected by pids controller in /syz0 [ 253.698981][T28456] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 253.809971][T28456] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 253.864385][ T8576] bridge0: port 1(bridge_slave_0) entered blocking state [ 253.871465][ T8576] bridge0: port 1(bridge_slave_0) entered disabled state [ 253.939143][ T8576] device bridge_slave_0 entered promiscuous mode [ 253.960689][T28456] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 254.017852][ T8567] chnl_net:caif_netlink_parms(): no params data found [ 254.065756][ T8576] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.072904][ T8576] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.086610][ T8576] device bridge_slave_1 entered promiscuous mode [ 254.272738][ T8576] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link 05:14:30 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8f") [ 254.369521][ T8567] bridge0: port 1(bridge_slave_0) entered blocking state [ 254.376822][ T8567] bridge0: port 1(bridge_slave_0) entered disabled state [ 254.396749][ T8567] device bridge_slave_0 entered promiscuous mode [ 254.426964][ T8576] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 254.459949][ T8567] bridge0: port 2(bridge_slave_1) entered blocking state [ 254.467122][ T8567] bridge0: port 2(bridge_slave_1) entered disabled state [ 254.483960][ T8567] device bridge_slave_1 entered promiscuous mode [ 254.498048][ T8576] team0: Port device team_slave_0 added [ 254.535122][ T8576] team0: Port device team_slave_1 added [ 254.572162][ T8567] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 254.583342][ T8576] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 254.590422][ T8576] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 254.616340][ T8576] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 254.687091][ T8567] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 254.701046][ T8576] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 254.708058][ T8576] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 254.734073][ T8576] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 254.820658][ T8567] team0: Port device team_slave_0 added [ 254.827243][ T8567] team0: Port device team_slave_1 added [ 254.857832][ T8576] device hsr_slave_0 entered promiscuous mode [ 254.873045][ T8576] device hsr_slave_1 entered promiscuous mode [ 254.885812][ T8576] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 254.893377][ T8576] Cannot create hsr debugfs directory [ 254.913720][ T8567] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 254.920718][ T8567] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 254.946705][ T8567] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 255.014638][ T8567] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 255.021609][ T8567] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 255.047631][ T8567] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 255.198773][ T8567] device hsr_slave_0 entered promiscuous mode [ 255.227973][ T8567] device hsr_slave_1 entered promiscuous mode [ 255.237288][ T8567] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 255.249305][ T8567] Cannot create hsr debugfs directory [ 255.306088][T28456] device hsr_slave_0 left promiscuous mode [ 255.313711][T28456] device hsr_slave_1 left promiscuous mode [ 255.425466][T28456] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 255.432904][T28456] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 255.474460][T28456] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 255.481904][T28456] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 255.516745][T28456] device bridge_slave_1 left promiscuous mode [ 255.523010][T28456] bridge0: port 2(bridge_slave_1) entered disabled state [ 255.644307][T28456] device bridge_slave_0 left promiscuous mode [ 255.650592][T28456] bridge0: port 1(bridge_slave_0) entered disabled state [ 255.824045][T28456] device veth1_macvtap left promiscuous mode [ 255.830063][T28456] device veth0_macvtap left promiscuous mode [ 255.836155][T28456] device veth1_vlan left promiscuous mode [ 255.841988][T28456] device veth0_vlan left promiscuous mode [ 257.547794][T28456] team0 (unregistering): Port device team_slave_1 removed [ 257.587973][T28456] team0 (unregistering): Port device team_slave_0 removed [ 257.627749][T28456] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 257.675398][T28456] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 257.757018][T28456] bond0 (unregistering): Released all slaves [ 258.645317][ T8567] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 258.681387][ T8576] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 258.715511][ T8567] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 258.724629][ T8576] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 258.744442][ T8567] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 258.765423][ T8576] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 258.796471][ T8567] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 258.805479][ T8576] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 258.917633][ T8567] 8021q: adding VLAN 0 to HW filter on device bond0 [ 258.949076][ T8576] 8021q: adding VLAN 0 to HW filter on device bond0 [ 258.979519][ T8567] 8021q: adding VLAN 0 to HW filter on device team0 [ 258.987071][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 259.015644][ T1913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 259.027593][ T8576] 8021q: adding VLAN 0 to HW filter on device team0 [ 259.042167][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 259.050327][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 259.085313][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 259.115142][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 259.123590][ T24] bridge0: port 1(bridge_slave_0) entered blocking state [ 259.130709][ T24] bridge0: port 1(bridge_slave_0) entered forwarding state [ 259.175078][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 259.204133][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 259.212520][ T24] bridge0: port 2(bridge_slave_1) entered blocking state [ 259.219635][ T24] bridge0: port 2(bridge_slave_1) entered forwarding state [ 259.234295][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 259.246613][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 259.261461][ T8567] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 259.271864][ T8567] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 259.424580][ T889] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 259.443590][ T889] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 259.471458][ T889] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 259.514134][ T889] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 259.522720][ T889] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 259.555054][ T889] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 259.615876][ T889] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 259.641669][ T889] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 259.695519][ T889] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 259.703842][ T889] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 259.755633][ T889] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 259.764153][ T889] bridge0: port 1(bridge_slave_0) entered blocking state [ 259.771259][ T889] bridge0: port 1(bridge_slave_0) entered forwarding state [ 259.820838][ T889] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 259.856027][ T889] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 259.871461][ T889] bridge0: port 2(bridge_slave_1) entered blocking state [ 259.878581][ T889] bridge0: port 2(bridge_slave_1) entered forwarding state [ 259.914108][ T889] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 259.956363][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 259.966918][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 259.996218][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 260.025749][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 260.046358][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 260.074316][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 260.108396][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 260.134972][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 260.150186][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 260.160923][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 260.170502][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 260.185137][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 260.196782][ T8576] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 260.215099][ T8802] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 260.327352][ T8567] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 260.340617][ T78] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 260.348053][ T78] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 260.385981][ T78] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 260.394851][ T78] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 260.447895][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 260.455422][ T1911] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 260.466835][ T8576] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 260.660252][ T8567] device veth0_vlan entered promiscuous mode [ 260.726833][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 260.746236][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 260.775328][ T78] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 260.783104][ T78] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 260.849061][ T8567] device veth1_vlan entered promiscuous mode [ 260.861655][ T8567] device veth0_macvtap entered promiscuous mode [ 260.930866][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 260.939290][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 260.964819][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 260.990887][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 261.012296][ T8567] device veth1_macvtap entered promiscuous mode [ 261.025744][ T8802] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 261.033762][ T8802] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 261.099619][ T8802] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 261.115384][ T8802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 261.167771][ T8567] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 261.178265][ T8567] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 261.188126][ T8567] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 261.198586][ T8567] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 261.208463][ T8567] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 261.218965][ T8567] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 261.228786][ T8567] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 261.239217][ T8567] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 261.298331][ T8567] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 261.334167][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 261.342822][ T24] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 261.353275][ T8567] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 261.363831][ T8567] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 261.373653][ T8567] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 261.384603][ T8567] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 261.394495][ T8567] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 261.404990][ T8567] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 261.414806][ T8567] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 261.425230][ T8567] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 261.704979][ T8567] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 261.720812][ T8802] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 261.729728][ T8802] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 261.764613][ T8802] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 261.806263][ T8802] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 261.820094][ T8576] device veth0_vlan entered promiscuous mode [ 261.836198][ T8567] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 261.845049][ T8567] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 261.853798][ T8567] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 261.862625][ T8567] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 261.925871][ T8802] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 261.933800][ T8802] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 261.978366][ T8576] device veth1_vlan entered promiscuous mode [ 261.991751][ T8576] device veth0_macvtap entered promiscuous mode [ 262.057241][ T8576] device veth1_macvtap entered promiscuous mode [ 262.081435][ T78] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 262.089683][ T78] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 262.134754][ T78] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 262.143455][ T78] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 262.180051][ T78] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 262.196204][ T8576] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 262.206777][ T8576] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.216753][ T8576] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 262.227178][ T8576] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.237122][ T8576] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 262.247550][ T8576] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.257366][ T8576] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 262.268336][ T8576] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.278172][ T8576] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 262.288612][ T8576] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.426778][ T8576] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 262.439880][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 262.448198][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 262.485735][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 262.517187][ T8576] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 262.527744][ T8576] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.537562][ T8576] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 262.548059][ T8576] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.557883][ T8576] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 262.568311][ T8576] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! 05:14:38 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8f") 05:14:38 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc52856") [ 262.578132][ T8576] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 262.588588][ T8576] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.598476][ T8576] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 262.609024][ T8576] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 262.836330][ T8576] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 262.848010][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 262.856921][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 262.915830][ T8576] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 262.924687][ T8576] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 262.933510][ T8576] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 262.942237][ T8576] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 263.073120][ T23] audit: type=1400 audit(1668921278.978:133): avc: denied { module_request } for pid=8576 comm="syz-executor.5" kmod="fs-binder" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 05:14:39 executing program 5: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b") 05:14:39 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96") 05:14:39 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b") 05:14:39 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:14:39 executing program 2: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b") 05:14:39 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8f") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:14:39 executing program 5: getpgrp(0x0) syz_clone(0x0, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:39 executing program 2: r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:14:39 executing program 5: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:39 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:39 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc52856") 05:14:39 executing program 5: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:39 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b") 05:14:39 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc52856") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:14:39 executing program 5: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x62, &(0x7f0000000200)=""/4096) 05:14:39 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8f") 05:14:39 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:39 executing program 5: request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='{{[,)]-]*]-:!\\]#]\x00', 0xfffffffffffffffe) keyctl$assume_authority(0x10, 0x0) 05:14:39 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x62, &(0x7f0000000200)=""/4096) 05:14:39 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b") 05:14:40 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc52856") 05:14:40 executing program 5: request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='{{[,)]-]*]-:!\\]#]\x00', 0xfffffffffffffffe) keyctl$assume_authority(0x10, 0x0) 05:14:40 executing program 5: request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='{{[,)]-]*]-:!\\]#]\x00', 0xfffffffffffffffe) keyctl$assume_authority(0x10, 0x0) 05:14:40 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc52856") 05:14:40 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc52856") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:14:40 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b") 05:14:40 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8f") 05:14:40 executing program 5: request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='{{[,)]-]*]-:!\\]#]\x00', 0xfffffffffffffffe) 05:14:40 executing program 5: request_key(0x0, &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='{{[,)]-]*]-:!\\]#]\x00', 0xfffffffffffffffe) 05:14:40 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:40 executing program 5: request_key(0x0, &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='{{[,)]-]*]-:!\\]#]\x00', 0xfffffffffffffffe) 05:14:40 executing program 5: request_key(0x0, &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='{{[,)]-]*]-:!\\]#]\x00', 0xfffffffffffffffe) 05:14:41 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1") 05:14:41 executing program 2: r0 = request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='{{[,)]-]*]-:!\\]#]\x00', 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)={0x0, 0x0, @a}, 0x48, r0) r1 = add_key$fscrypt_provisioning(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)={0x7, 0x0, @c}, 0x29, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r1) r2 = add_key$fscrypt_provisioning(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000340)={0x2, 0x0, @b}, 0x48, r0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f00000003c0)={r2, 0x84, 0xca}, &(0x7f0000000400)={'enc=', 'oaep', ' hash=', {'sha224-asm\x00'}}, &(0x7f0000000480)="4f4294c0de57b3fcf1d124bb86c756e71b114a6fbe7624193c798e165c66b8078d90319f32af7a7e371150d41e26b75707ea30344448b04c5f039dd5ea422491e7d1a689aa4fad6222d224c4a8706a5272342cd82d32f8beffc3350778e58167accafa69a260ea915845ffe3959bd667759bd2695ac49824195bb36af813f7d87bb9058b", &(0x7f0000000540)=""/202) syz_open_dev$sg(&(0x7f0000000280), 0x7, 0x111002) bpf$BPF_LINK_CREATE_XDP(0x3, 0x0, 0xb666f38209c78008) 05:14:41 executing program 5: request_key(&(0x7f0000000000)='rxrpc_s\x00', 0x0, &(0x7f0000000080)='{{[,)]-]*]-:!\\]#]\x00', 0xfffffffffffffffe) 05:14:41 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc52856") 05:14:41 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8f") 05:14:41 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc52856") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:14:41 executing program 5: request_key(&(0x7f0000000000)='rxrpc_s\x00', 0x0, &(0x7f0000000080)='{{[,)]-]*]-:!\\]#]\x00', 0xfffffffffffffffe) 05:14:42 executing program 2: r0 = request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='{{[,)]-]*]-:!\\]#]\x00', 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)={0x0, 0x0, @a}, 0x48, r0) r1 = add_key$fscrypt_provisioning(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)={0x7, 0x0, @c}, 0x29, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r1) r2 = add_key$fscrypt_provisioning(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000340)={0x2, 0x0, @b}, 0x48, r0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f00000003c0)={r2, 0x84, 0xca}, &(0x7f0000000400)={'enc=', 'oaep', ' hash=', {'sha224-asm\x00'}}, &(0x7f0000000480)="4f4294c0de57b3fcf1d124bb86c756e71b114a6fbe7624193c798e165c66b8078d90319f32af7a7e371150d41e26b75707ea30344448b04c5f039dd5ea422491e7d1a689aa4fad6222d224c4a8706a5272342cd82d32f8beffc3350778e58167accafa69a260ea915845ffe3959bd667759bd2695ac49824195bb36af813f7d87bb9058b", &(0x7f0000000540)=""/202) syz_open_dev$sg(&(0x7f0000000280), 0x7, 0x111002) bpf$BPF_LINK_CREATE_XDP(0x3, 0x0, 0xb666f38209c78008) 05:14:42 executing program 5: request_key(&(0x7f0000000000)='rxrpc_s\x00', 0x0, &(0x7f0000000080)='{{[,)]-]*]-:!\\]#]\x00', 0xfffffffffffffffe) 05:14:42 executing program 5: request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) 05:14:42 executing program 2: r0 = request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='{{[,)]-]*]-:!\\]#]\x00', 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)={0x0, 0x0, @a}, 0x48, r0) r1 = add_key$fscrypt_provisioning(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)={0x7, 0x0, @c}, 0x29, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r1) r2 = add_key$fscrypt_provisioning(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000340)={0x2, 0x0, @b}, 0x48, r0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f00000003c0)={r2, 0x84, 0xca}, &(0x7f0000000400)={'enc=', 'oaep', ' hash=', {'sha224-asm\x00'}}, &(0x7f0000000480)="4f4294c0de57b3fcf1d124bb86c756e71b114a6fbe7624193c798e165c66b8078d90319f32af7a7e371150d41e26b75707ea30344448b04c5f039dd5ea422491e7d1a689aa4fad6222d224c4a8706a5272342cd82d32f8beffc3350778e58167accafa69a260ea915845ffe3959bd667759bd2695ac49824195bb36af813f7d87bb9058b", &(0x7f0000000540)=""/202) syz_open_dev$sg(&(0x7f0000000280), 0x7, 0x111002) bpf$BPF_LINK_CREATE_XDP(0x3, 0x0, 0xb666f38209c78008) 05:14:42 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:14:42 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1") 05:14:42 executing program 5: request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) 05:14:42 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc52856") 05:14:42 executing program 2: r0 = request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='{{[,)]-]*]-:!\\]#]\x00', 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)={0x0, 0x0, @a}, 0x48, r0) r1 = add_key$fscrypt_provisioning(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)={0x7, 0x0, @c}, 0x29, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r1) r2 = add_key$fscrypt_provisioning(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000340)={0x2, 0x0, @b}, 0x48, r0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f00000003c0)={r2, 0x84, 0xca}, &(0x7f0000000400)={'enc=', 'oaep', ' hash=', {'sha224-asm\x00'}}, &(0x7f0000000480)="4f4294c0de57b3fcf1d124bb86c756e71b114a6fbe7624193c798e165c66b8078d90319f32af7a7e371150d41e26b75707ea30344448b04c5f039dd5ea422491e7d1a689aa4fad6222d224c4a8706a5272342cd82d32f8beffc3350778e58167accafa69a260ea915845ffe3959bd667759bd2695ac49824195bb36af813f7d87bb9058b", &(0x7f0000000540)=""/202) syz_open_dev$sg(&(0x7f0000000280), 0x7, 0x111002) 05:14:42 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b") 05:14:42 executing program 5: request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) 05:14:42 executing program 2: r0 = request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='{{[,)]-]*]-:!\\]#]\x00', 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)={0x0, 0x0, @a}, 0x48, r0) r1 = add_key$fscrypt_provisioning(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)={0x7, 0x0, @c}, 0x29, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r1) r2 = add_key$fscrypt_provisioning(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000340)={0x2, 0x0, @b}, 0x48, r0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f00000003c0)={r2, 0x84, 0xca}, &(0x7f0000000400)={'enc=', 'oaep', ' hash=', {'sha224-asm\x00'}}, &(0x7f0000000480)="4f4294c0de57b3fcf1d124bb86c756e71b114a6fbe7624193c798e165c66b8078d90319f32af7a7e371150d41e26b75707ea30344448b04c5f039dd5ea422491e7d1a689aa4fad6222d224c4a8706a5272342cd82d32f8beffc3350778e58167accafa69a260ea915845ffe3959bd667759bd2695ac49824195bb36af813f7d87bb9058b", &(0x7f0000000540)=""/202) 05:14:42 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/kexec_crash_size', 0x10000, 0xd) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x0, 0x400, 0x70bd25, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x309, 0x24}}}}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x8018) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_TRIGGER_SCAN(r1, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x30, 0x0, 0x800, 0x70bd25, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x8, 0x77}}}}, [@NL80211_ATTR_SCHED_SCAN_INTERVAL={0x8, 0x77, 0x6}]}, 0x30}, 0x1, 0x0, 0x0, 0x4840}, 0x1) 05:14:43 executing program 5: getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000480)={&(0x7f0000ff1000/0xc000)=nil, 0xc000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/210, 0xd2, 0x1, &(0x7f0000000100)=""/209, 0xd1}, &(0x7f0000000240)=0x40) r0 = syz_open_dev$vcsn(&(0x7f0000000340), 0x3, 0x610001) socketpair(0x1f, 0xc, 0x3, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000400)=0x14) bpf$MAP_CREATE(0x4, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x4, 0x5, 0x9d07, 0x40, 0xffffffffffffffff, 0x2, '\x00', 0x0, r0, 0x1, 0x3, 0x5, 0x6}, 0x48) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000440)={'wg2\x00'}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), r2) 05:14:43 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1") 05:14:43 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b") 05:14:43 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:14:43 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1") 05:14:43 executing program 2: r0 = request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='{{[,)]-]*]-:!\\]#]\x00', 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)={0x0, 0x0, @a}, 0x48, r0) r1 = add_key$fscrypt_provisioning(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)={0x7, 0x0, @c}, 0x29, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r1) add_key$fscrypt_provisioning(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000340)={0x2, 0x0, @b}, 0x48, r0) 05:14:43 executing program 5: getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000480)={&(0x7f0000ff1000/0xc000)=nil, 0xc000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/210, 0xd2, 0x1, &(0x7f0000000100)=""/209, 0xd1}, &(0x7f0000000240)=0x40) r0 = syz_open_dev$vcsn(&(0x7f0000000340), 0x3, 0x610001) socketpair(0x1f, 0xc, 0x3, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000400)=0x14) bpf$MAP_CREATE(0x4, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x4, 0x5, 0x9d07, 0x40, 0xffffffffffffffff, 0x2, '\x00', 0x0, r0, 0x1, 0x3, 0x5, 0x6}, 0x48) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000440)={'wg2\x00'}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), r2) 05:14:43 executing program 5: getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000480)={&(0x7f0000ff1000/0xc000)=nil, 0xc000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/210, 0xd2, 0x1, &(0x7f0000000100)=""/209, 0xd1}, &(0x7f0000000240)=0x40) r0 = syz_open_dev$vcsn(&(0x7f0000000340), 0x3, 0x610001) socketpair(0x1f, 0xc, 0x3, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000400)=0x14) bpf$MAP_CREATE(0x4, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x4, 0x5, 0x9d07, 0x40, 0xffffffffffffffff, 0x2, '\x00', 0x0, r0, 0x1, 0x3, 0x5, 0x6}, 0x48) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000440)={'wg2\x00'}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), r2) 05:14:43 executing program 2: r0 = request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='{{[,)]-]*]-:!\\]#]\x00', 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)={0x0, 0x0, @a}, 0x48, r0) r1 = add_key$fscrypt_provisioning(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)={0x7, 0x0, @c}, 0x29, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r1) 05:14:43 executing program 5: getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000480)={&(0x7f0000ff1000/0xc000)=nil, 0xc000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/210, 0xd2, 0x1, &(0x7f0000000100)=""/209, 0xd1}, &(0x7f0000000240)=0x40) r0 = syz_open_dev$vcsn(&(0x7f0000000340), 0x3, 0x610001) socketpair(0x1f, 0xc, 0x3, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000400)=0x14) bpf$MAP_CREATE(0x4, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x4, 0x5, 0x9d07, 0x40, 0xffffffffffffffff, 0x2, '\x00', 0x0, r0, 0x1, 0x3, 0x5, 0x6}, 0x48) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000440)={'wg2\x00'}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) 05:14:43 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1") 05:14:43 executing program 5: getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000480)={&(0x7f0000ff1000/0xc000)=nil, 0xc000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/210, 0xd2, 0x1, &(0x7f0000000100)=""/209, 0xd1}, &(0x7f0000000240)=0x40) r0 = syz_open_dev$vcsn(&(0x7f0000000340), 0x3, 0x610001) socketpair(0x1f, 0xc, 0x3, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000400)=0x14) bpf$MAP_CREATE(0x4, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x4, 0x5, 0x9d07, 0x40, 0xffffffffffffffff, 0x2, '\x00', 0x0, r0, 0x1, 0x3, 0x5, 0x6}, 0x48) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000440)={'wg2\x00'}) socket$nl_generic(0x10, 0x3, 0x10) 05:14:43 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b") 05:14:43 executing program 2: r0 = request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='{{[,)]-]*]-:!\\]#]\x00', 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)={0x0, 0x0, @a}, 0x48, r0) add_key$fscrypt_provisioning(&(0x7f00000001c0), &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)={0x7, 0x0, @c}, 0x29, 0xfffffffffffffffb) 05:14:43 executing program 5: getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000480)={&(0x7f0000ff1000/0xc000)=nil, 0xc000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/210, 0xd2, 0x1, &(0x7f0000000100)=""/209, 0xd1}, &(0x7f0000000240)=0x40) r0 = syz_open_dev$vcsn(&(0x7f0000000340), 0x3, 0x610001) socketpair(0x1f, 0xc, 0x3, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000400)=0x14) bpf$MAP_CREATE(0x4, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x4, 0x5, 0x9d07, 0x40, 0xffffffffffffffff, 0x2, '\x00', 0x0, r0, 0x1, 0x3, 0x5, 0x6}, 0x48) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000440)={'wg2\x00'}) 05:14:44 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:14:44 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d159") 05:14:44 executing program 5: getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000480)={&(0x7f0000ff1000/0xc000)=nil, 0xc000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/210, 0xd2, 0x1, &(0x7f0000000100)=""/209, 0xd1}, &(0x7f0000000240)=0x40) r0 = syz_open_dev$vcsn(&(0x7f0000000340), 0x3, 0x610001) socketpair(0x1f, 0xc, 0x3, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$packet(r1, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000400)=0x14) bpf$MAP_CREATE(0x4, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x4, 0x5, 0x9d07, 0x40, 0xffffffffffffffff, 0x2, '\x00', 0x0, r0, 0x1, 0x3, 0x5, 0x6}, 0x48) 05:14:44 executing program 2: r0 = request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='{{[,)]-]*]-:!\\]#]\x00', 0xfffffffffffffffe) add_key$fscrypt_provisioning(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)={0x0, 0x0, @a}, 0x48, r0) 05:14:44 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1") 05:14:44 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc52856") 05:14:44 executing program 2: request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='{{[,)]-]*]-:!\\]#]\x00', 0xfffffffffffffffe) 05:14:44 executing program 5: getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000480)={&(0x7f0000ff1000/0xc000)=nil, 0xc000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/210, 0xd2, 0x1, &(0x7f0000000100)=""/209, 0xd1}, &(0x7f0000000240)=0x40) syz_open_dev$vcsn(&(0x7f0000000340), 0x3, 0x610001) socketpair(0x1f, 0xc, 0x3, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000400)=0x14) 05:14:44 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d159") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:14:44 executing program 5: getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000480)={&(0x7f0000ff1000/0xc000)=nil, 0xc000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/210, 0xd2, 0x1, &(0x7f0000000100)=""/209, 0xd1}, &(0x7f0000000240)=0x40) syz_open_dev$vcsn(&(0x7f0000000340), 0x3, 0x610001) socketpair(0x1f, 0xc, 0x3, &(0x7f0000000380)) 05:14:44 executing program 2: request_key(0x0, &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='{{[,)]-]*]-:!\\]#]\x00', 0xfffffffffffffffe) 05:14:45 executing program 5: getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000480)={&(0x7f0000ff1000/0xc000)=nil, 0xc000, 0x0, 0x0, 0x0, &(0x7f0000000000)=""/210, 0xd2, 0x1, &(0x7f0000000100)=""/209, 0xd1}, &(0x7f0000000240)=0x40) socketpair(0x1f, 0xc, 0x3, &(0x7f0000000380)) 05:14:45 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d159") 05:14:45 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d159") 05:14:45 executing program 5: socketpair(0x1f, 0xc, 0x3, &(0x7f0000000380)) 05:14:45 executing program 2: request_key(0x0, &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='{{[,)]-]*]-:!\\]#]\x00', 0xfffffffffffffffe) 05:14:45 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc52856") 05:14:45 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d159") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:14:45 executing program 5: socketpair(0x0, 0xc, 0x3, &(0x7f0000000380)) 05:14:45 executing program 2: request_key(0x0, &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='{{[,)]-]*]-:!\\]#]\x00', 0xfffffffffffffffe) 05:14:45 executing program 5: socketpair(0x0, 0x0, 0x3, &(0x7f0000000380)) 05:14:45 executing program 2: request_key(&(0x7f0000000000)='rxrpc_s\x00', 0x0, &(0x7f0000000080)='{{[,)]-]*]-:!\\]#]\x00', 0xfffffffffffffffe) 05:14:45 executing program 5: socketpair(0x0, 0x0, 0x3, &(0x7f0000000380)) 05:14:46 executing program 5: socketpair(0x0, 0x0, 0x3, &(0x7f0000000380)) 05:14:46 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d159") 05:14:47 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d159") 05:14:47 executing program 2: request_key(&(0x7f0000000000)='rxrpc_s\x00', 0x0, &(0x7f0000000080)='{{[,)]-]*]-:!\\]#]\x00', 0xfffffffffffffffe) 05:14:47 executing program 5: socketpair(0x0, 0xc, 0x0, &(0x7f0000000380)) 05:14:47 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc52856") 05:14:47 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d159") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, &(0x7f0000000200)=""/4096) 05:14:47 executing program 5: socketpair(0x0, 0xc, 0x0, 0x0) 05:14:47 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d159") 05:14:47 executing program 5: socketpair(0x0, 0xc, 0x0, 0x0) 05:14:47 executing program 5: socketpair(0x0, 0xc, 0x0, 0x0) 05:14:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x68, 0x7800, 0x8, 0x5, {{0xf, 0x4, 0x1, 0x2, 0x3c, 0x66, 0x0, 0xd6, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x43}, @empty, {[@timestamp_addr={0x44, 0x24, 0x90, 0x1, 0x5, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0xffffa0de}, {@remote, 0xfffffcab}, {@broadcast, 0xe6c}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xffff8001}]}, @ra={0x94, 0x4, 0x1}]}}}}}) bpf$BPF_LINK_CREATE_XDP(0x6, 0x0, 0x0) 05:14:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x68, 0x7800, 0x8, 0x5, {{0xf, 0x4, 0x1, 0x2, 0x3c, 0x66, 0x0, 0xd6, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x43}, @empty, {[@timestamp_addr={0x44, 0x24, 0x90, 0x1, 0x5, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0xffffa0de}, {@remote, 0xfffffcab}, {@broadcast, 0xe6c}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xffff8001}]}, @ra={0x94, 0x4, 0x1}]}}}}}) bpf$BPF_LINK_CREATE_XDP(0x6, 0x0, 0x0) 05:14:47 executing program 2: request_key(&(0x7f0000000000)='rxrpc_s\x00', 0x0, &(0x7f0000000080)='{{[,)]-]*]-:!\\]#]\x00', 0xfffffffffffffffe) 05:14:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x68, 0x7800, 0x8, 0x5, {{0xf, 0x4, 0x1, 0x2, 0x3c, 0x66, 0x0, 0xd6, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x43}, @empty, {[@timestamp_addr={0x44, 0x24, 0x90, 0x1, 0x5, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0xffffa0de}, {@remote, 0xfffffcab}, {@broadcast, 0xe6c}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xffff8001}]}, @ra={0x94, 0x4, 0x1}]}}}}}) bpf$BPF_LINK_CREATE_XDP(0x6, 0x0, 0x0) 05:14:47 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1") 05:14:47 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x62, &(0x7f0000000200)=""/4096) 05:14:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x68, 0x7800, 0x8, 0x5, {{0xf, 0x4, 0x1, 0x2, 0x3c, 0x66, 0x0, 0xd6, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x43}, @empty, {[@timestamp_addr={0x44, 0x24, 0x90, 0x1, 0x5, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0xffffa0de}, {@remote, 0xfffffcab}, {@broadcast, 0xe6c}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xffff8001}]}, @ra={0x94, 0x4, 0x1}]}}}}}) bpf$BPF_LINK_CREATE_XDP(0x6, 0x0, 0x0) 05:14:47 executing program 2: request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) 05:14:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x68, 0x7800, 0x8, 0x5, {{0xf, 0x4, 0x1, 0x2, 0x3c, 0x66, 0x0, 0xd6, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x43}, @empty, {[@timestamp_addr={0x44, 0x24, 0x90, 0x1, 0x5, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0xffffa0de}, {@remote, 0xfffffcab}, {@broadcast, 0xe6c}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xffff8001}]}, @ra={0x94, 0x4, 0x1}]}}}}}) 05:14:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x68, 0x7800, 0x8, 0x5, {{0xf, 0x4, 0x1, 0x2, 0x3c, 0x66, 0x0, 0xd6, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x43}, @empty, {[@timestamp_addr={0x44, 0x24, 0x90, 0x1, 0x5, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0xffffa0de}, {@remote, 0xfffffcab}, {@broadcast, 0xe6c}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xffff8001}]}, @ra={0x94, 0x4, 0x1}]}}}}}) 05:14:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x68, 0x7800, 0x8, 0x5, {{0xf, 0x4, 0x1, 0x2, 0x3c, 0x66, 0x0, 0xd6, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x43}, @empty, {[@timestamp_addr={0x44, 0x24, 0x90, 0x1, 0x5, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0xffffa0de}, {@remote, 0xfffffcab}, {@broadcast, 0xe6c}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xffff8001}]}, @ra={0x94, 0x4, 0x1}]}}}}}) 05:14:47 executing program 2: request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) 05:14:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x68, 0x7800, 0x8, 0x5, {{0xf, 0x4, 0x1, 0x2, 0x3c, 0x66, 0x0, 0xd6, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x43}, @empty, {[@timestamp_addr={0x44, 0x24, 0x90, 0x1, 0x5, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0xffffa0de}, {@remote, 0xfffffcab}, {@broadcast, 0xe6c}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xffff8001}]}, @ra={0x94, 0x4, 0x1}]}}}}}) 05:14:48 executing program 5: ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x68, 0x7800, 0x8, 0x5, {{0xf, 0x4, 0x1, 0x2, 0x3c, 0x66, 0x0, 0xd6, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x43}, @empty, {[@timestamp_addr={0x44, 0x24, 0x90, 0x1, 0x5, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0xffffa0de}, {@remote, 0xfffffcab}, {@broadcast, 0xe6c}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xffff8001}]}, @ra={0x94, 0x4, 0x1}]}}}}}) 05:14:48 executing program 5: ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x68, 0x7800, 0x8, 0x5, {{0xf, 0x4, 0x1, 0x2, 0x3c, 0x66, 0x0, 0xd6, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x43}, @empty, {[@timestamp_addr={0x44, 0x24, 0x90, 0x1, 0x5, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0xffffa0de}, {@remote, 0xfffffcab}, {@broadcast, 0xe6c}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xffff8001}]}, @ra={0x94, 0x4, 0x1}]}}}}}) 05:14:48 executing program 3: r0 = bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000200)={'gretap0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x40, 0x7800, 0x80, 0x100, {{0x10, 0x4, 0x1, 0x2, 0x40, 0x68, 0x0, 0xff, 0x4, 0x0, @rand_addr=0x64010102, @multicast1, {[@end, @timestamp={0x44, 0x28, 0x4c, 0x0, 0x4, [0x4, 0xfffff11c, 0x7, 0x5, 0x6, 0x100, 0xdc9, 0x3, 0xde6b]}]}}}}}) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/disk', 0x942, 0x18) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r4) socketpair(0x9, 0x80000, 0x4, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(r5, 0x9) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r6) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000000)=@raw=[@alu={0x4, 0x1, 0x1, 0xa, 0x8, 0x2, 0x1}], &(0x7f0000000040)='GPL\x00', 0x7, 0xf2, &(0x7f0000000080)=""/242, 0x41100, 0x8, '\x00', r1, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xf, 0x4, 0x3ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[r0, r0, r2, r0, r3, r4, r6]}, 0x80) 05:14:48 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1") 05:14:48 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x62, &(0x7f0000000200)=""/4096) 05:14:48 executing program 5: ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x68, 0x7800, 0x8, 0x5, {{0xf, 0x4, 0x1, 0x2, 0x3c, 0x66, 0x0, 0xd6, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x43}, @empty, {[@timestamp_addr={0x44, 0x24, 0x90, 0x1, 0x5, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0xffffa0de}, {@remote, 0xfffffcab}, {@broadcast, 0xe6c}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xffff8001}]}, @ra={0x94, 0x4, 0x1}]}}}}}) 05:14:48 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x68, 0x7800, 0x8, 0x5, {{0xf, 0x4, 0x1, 0x2, 0x3c, 0x66, 0x0, 0xd6, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x43}, @empty, {[@timestamp_addr={0x44, 0x24, 0x90, 0x1, 0x5, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0xffffa0de}, {@remote, 0xfffffcab}, {@broadcast, 0xe6c}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xffff8001}]}, @ra={0x94, 0x4, 0x1}]}}}}}) 05:14:48 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x68, 0x7800, 0x8, 0x5, {{0xf, 0x4, 0x1, 0x2, 0x3c, 0x66, 0x0, 0xd6, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x43}, @empty, {[@timestamp_addr={0x44, 0x24, 0x90, 0x1, 0x5, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0xffffa0de}, {@remote, 0xfffffcab}, {@broadcast, 0xe6c}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xffff8001}]}, @ra={0x94, 0x4, 0x1}]}}}}}) 05:14:48 executing program 2: request_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0xfffffffffffffffe) 05:14:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x68, 0x7800, 0x8, 0x5, {{0xf, 0x4, 0x1, 0x2, 0x3c, 0x66, 0x0, 0xd6, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x43}, @empty, {[@timestamp_addr={0x44, 0x24, 0x90, 0x1, 0x5, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0xffffa0de}, {@remote, 0xfffffcab}, {@broadcast, 0xe6c}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xffff8001}]}, @ra={0x94, 0x4, 0x1}]}}}}}) 05:14:48 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x68, 0x7800, 0x8, 0x5, {{0xf, 0x4, 0x1, 0x2, 0x3c, 0x66, 0x0, 0xd6, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x43}, @empty, {[@timestamp_addr={0x44, 0x24, 0x90, 0x1, 0x5, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0xffffa0de}, {@remote, 0xfffffcab}, {@broadcast, 0xe6c}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xffff8001}]}, @ra={0x94, 0x4, 0x1}]}}}}}) 05:14:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) 05:14:48 executing program 2: socketpair(0x22, 0x800, 0x1, &(0x7f0000000040)={0xffffffffffffffff}) syz_genetlink_get_family_id$tipc(&(0x7f0000000000), r0) bpf$MAP_CREATE(0x4, &(0x7f0000002600), 0x48) 05:14:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) [ 272.929847][ T23] audit: type=1400 audit(1668921288.838:134): avc: denied { prog_load } for pid=9333 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 05:14:49 executing program 3: r0 = bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000200)={'gretap0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x40, 0x7800, 0x80, 0x100, {{0x10, 0x4, 0x1, 0x2, 0x40, 0x68, 0x0, 0xff, 0x4, 0x0, @rand_addr=0x64010102, @multicast1, {[@end, @timestamp={0x44, 0x28, 0x4c, 0x0, 0x4, [0x4, 0xfffff11c, 0x7, 0x5, 0x6, 0x100, 0xdc9, 0x3, 0xde6b]}]}}}}}) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/disk', 0x942, 0x18) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r4) socketpair(0x9, 0x80000, 0x4, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(r5, 0x9) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r6) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000000)=@raw=[@alu={0x4, 0x1, 0x1, 0xa, 0x8, 0x2, 0x1}], &(0x7f0000000040)='GPL\x00', 0x7, 0xf2, &(0x7f0000000080)=""/242, 0x41100, 0x8, '\x00', r1, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xf, 0x4, 0x3ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[r0, r0, r2, r0, r3, r4, r6]}, 0x80) 05:14:49 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1") 05:14:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) 05:14:49 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x62, &(0x7f0000000200)=""/4096) 05:14:49 executing program 2: socketpair(0x22, 0x800, 0x1, &(0x7f0000000040)={0xffffffffffffffff}) syz_genetlink_get_family_id$tipc(&(0x7f0000000000), r0) bpf$MAP_CREATE(0x4, &(0x7f0000002600), 0x48) 05:14:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'syztnl2\x00', 0x0}) 05:14:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x68, 0x7800, 0x8, 0x5, {{0xf, 0x4, 0x1, 0x2, 0x3c, 0x66, 0x0, 0xd6, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x43}, @empty, {[@timestamp_addr={0x44, 0x24, 0x90, 0x1, 0x5, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0xffffa0de}, {@remote, 0xfffffcab}, {@broadcast, 0xe6c}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xffff8001}]}, @ra={0x94, 0x4, 0x1}]}}}}}) 05:14:49 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) socketpair(0x0, 0x5, 0x81, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000580), r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_LEAVE_IBSS(r3, &(0x7f0000000140)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x20, r2, 0x100, 0x70bd25, 0x3, {{}, {@void, @val={0xc, 0x99, {0x3, 0x6c}}}}, ["", ""]}, 0x20}}, 0x80) socketpair(0x10, 0x80000, 0x6, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_TDLS_CANCEL_CHANNEL_SWITCH(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r2, 0x4, 0x70bd29, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_MAC={0xa}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x0) bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) 05:14:49 executing program 2: socketpair(0x22, 0x800, 0x1, &(0x7f0000000040)={0xffffffffffffffff}) syz_genetlink_get_family_id$tipc(&(0x7f0000000000), r0) bpf$MAP_CREATE(0x4, &(0x7f0000002600), 0x48) 05:14:49 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) socketpair(0x0, 0x5, 0x81, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000580), r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_LEAVE_IBSS(r3, &(0x7f0000000140)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x20, r2, 0x100, 0x70bd25, 0x3, {{}, {@void, @val={0xc, 0x99, {0x3, 0x6c}}}}, ["", ""]}, 0x20}}, 0x80) socketpair(0x10, 0x80000, 0x6, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_TDLS_CANCEL_CHANNEL_SWITCH(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r2, 0x4, 0x70bd29, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_MAC={0xa}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x0) bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) 05:14:49 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) socketpair(0x0, 0x5, 0x81, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000580), r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_LEAVE_IBSS(r3, &(0x7f0000000140)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x20, r2, 0x100, 0x70bd25, 0x3, {{}, {@void, @val={0xc, 0x99, {0x3, 0x6c}}}}, ["", ""]}, 0x20}}, 0x80) socketpair(0x10, 0x80000, 0x6, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_TDLS_CANCEL_CHANNEL_SWITCH(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r2, 0x4, 0x70bd29, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_MAC={0xa}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x0) bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) 05:14:49 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x0, &(0x7f0000000200)=""/4096) 05:14:49 executing program 3: r0 = bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000200)={'gretap0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x40, 0x7800, 0x80, 0x100, {{0x10, 0x4, 0x1, 0x2, 0x40, 0x68, 0x0, 0xff, 0x4, 0x0, @rand_addr=0x64010102, @multicast1, {[@end, @timestamp={0x44, 0x28, 0x4c, 0x0, 0x4, [0x4, 0xfffff11c, 0x7, 0x5, 0x6, 0x100, 0xdc9, 0x3, 0xde6b]}]}}}}}) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/disk', 0x942, 0x18) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r4) socketpair(0x9, 0x80000, 0x4, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(r5, 0x9) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r6) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000340)=@bpf_lsm={0x1d, 0x1, &(0x7f0000000000)=@raw=[@alu={0x4, 0x1, 0x1, 0xa, 0x8, 0x2, 0x1}], &(0x7f0000000040)='GPL\x00', 0x7, 0xf2, &(0x7f0000000080)=""/242, 0x41100, 0x8, '\x00', r1, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000240)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000280)={0x2, 0xf, 0x4, 0x3ff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000300)=[r0, r0, r2, r0, r3, r4, r6]}, 0x80) 05:14:49 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d159") 05:14:49 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) socketpair(0x0, 0x5, 0x81, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000580), r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_LEAVE_IBSS(r3, &(0x7f0000000140)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x20, r2, 0x100, 0x70bd25, 0x3, {{}, {@void, @val={0xc, 0x99, {0x3, 0x6c}}}}, ["", ""]}, 0x20}}, 0x80) socketpair(0x10, 0x80000, 0x6, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_TDLS_CANCEL_CHANNEL_SWITCH(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, r2, 0x4, 0x70bd29, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_MAC={0xa}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x0) 05:14:49 executing program 2: socketpair(0x22, 0x800, 0x1, &(0x7f0000000040)={0xffffffffffffffff}) syz_genetlink_get_family_id$tipc(&(0x7f0000000000), r0) 05:14:49 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) socketpair(0x0, 0x5, 0x81, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000580), r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_LEAVE_IBSS(r3, &(0x7f0000000140)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x20, r2, 0x100, 0x70bd25, 0x3, {{}, {@void, @val={0xc, 0x99, {0x3, 0x6c}}}}, ["", ""]}, 0x20}}, 0x80) socketpair(0x10, 0x80000, 0x6, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000040)={'wlan0\x00'}) 05:14:50 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) socketpair(0x0, 0x5, 0x81, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000580), r1) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_LEAVE_IBSS(r3, &(0x7f0000000140)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000900)={&(0x7f00000008c0)={0x20, r2, 0x100, 0x70bd25, 0x3, {{}, {@void, @val={0xc, 0x99, {0x3, 0x6c}}}}, ["", ""]}, 0x20}}, 0x80) socketpair(0x10, 0x80000, 0x6, &(0x7f0000000180)) 05:14:50 executing program 4: ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x68, 0x7800, 0x8, 0x5, {{0xf, 0x4, 0x1, 0x2, 0x3c, 0x66, 0x0, 0xd6, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x43}, @empty, {[@timestamp_addr={0x44, 0x24, 0x90, 0x1, 0x5, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0xffffa0de}, {@remote, 0xfffffcab}, {@broadcast, 0xe6c}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xffff8001}]}, @ra={0x94, 0x4, 0x1}]}}}}}) 05:14:50 executing program 2: socketpair(0x22, 0x800, 0x1, &(0x7f0000000040)) 05:14:50 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) socketpair(0x0, 0x5, 0x81, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000580), r1) socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x10, 0x80000, 0x6, &(0x7f0000000180)) 05:14:50 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x0, &(0x7f0000000200)=""/4096) 05:14:50 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) socketpair(0x0, 0x5, 0x81, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000580), r1) socketpair(0x10, 0x80000, 0x6, &(0x7f0000000180)) 05:14:50 executing program 2: socketpair(0x0, 0x800, 0x1, &(0x7f0000000040)) 05:14:50 executing program 3: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000200)={'gretap0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x40, 0x7800, 0x80, 0x100, {{0x10, 0x4, 0x1, 0x2, 0x40, 0x68, 0x0, 0xff, 0x4, 0x0, @rand_addr=0x64010102, @multicast1, {[@end, @timestamp={0x44, 0x28, 0x4c, 0x0, 0x4, [0x4, 0xfffff11c, 0x7, 0x5, 0x6, 0x100, 0xdc9, 0x3, 0xde6b]}]}}}}}) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/disk', 0x942, 0x18) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r1) socketpair(0x9, 0x80000, 0x4, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(r2, 0x9) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r3) 05:14:50 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d159") 05:14:50 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) socketpair(0x0, 0x5, 0x81, &(0x7f0000000200)) socketpair(0x10, 0x80000, 0x6, &(0x7f0000000180)) 05:14:50 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) socketpair(0x10, 0x80000, 0x6, &(0x7f0000000180)) 05:14:50 executing program 5: socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x10, 0x80000, 0x6, &(0x7f0000000180)) 05:14:50 executing program 5: socketpair(0x10, 0x80000, 0x6, &(0x7f0000000180)) 05:14:51 executing program 4: ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x68, 0x7800, 0x8, 0x5, {{0xf, 0x4, 0x1, 0x2, 0x3c, 0x66, 0x0, 0xd6, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x43}, @empty, {[@timestamp_addr={0x44, 0x24, 0x90, 0x1, 0x5, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0xffffa0de}, {@remote, 0xfffffcab}, {@broadcast, 0xe6c}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xffff8001}]}, @ra={0x94, 0x4, 0x1}]}}}}}) 05:14:51 executing program 5: socketpair(0x0, 0x80000, 0x6, &(0x7f0000000180)) 05:14:51 executing program 2: socketpair(0x0, 0x800, 0x1, &(0x7f0000000040)) 05:14:51 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x0, &(0x7f0000000200)=""/4096) 05:14:51 executing program 3: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000200)={'gretap0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x40, 0x7800, 0x80, 0x100, {{0x10, 0x4, 0x1, 0x2, 0x40, 0x68, 0x0, 0xff, 0x4, 0x0, @rand_addr=0x64010102, @multicast1, {[@end, @timestamp={0x44, 0x28, 0x4c, 0x0, 0x4, [0x4, 0xfffff11c, 0x7, 0x5, 0x6, 0x100, 0xdc9, 0x3, 0xde6b]}]}}}}}) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/disk', 0x942, 0x18) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r1) socketpair(0x9, 0x80000, 0x4, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(r2, 0x9) pipe2$watch_queue(&(0x7f0000000380), 0x80) 05:14:51 executing program 5: socketpair(0x0, 0x80000, 0x6, &(0x7f0000000180)) 05:14:51 executing program 5: socketpair(0x0, 0x80000, 0x6, &(0x7f0000000180)) 05:14:51 executing program 1: syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d159") 05:14:51 executing program 2: socketpair(0x0, 0x800, 0x1, &(0x7f0000000040)) 05:14:51 executing program 5: socketpair(0x10, 0x0, 0x6, &(0x7f0000000180)) 05:14:51 executing program 5: socketpair(0x10, 0x0, 0x0, &(0x7f0000000180)) 05:14:51 executing program 4: ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x68, 0x7800, 0x8, 0x5, {{0xf, 0x4, 0x1, 0x2, 0x3c, 0x66, 0x0, 0xd6, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x43}, @empty, {[@timestamp_addr={0x44, 0x24, 0x90, 0x1, 0x5, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0xffffa0de}, {@remote, 0xfffffcab}, {@broadcast, 0xe6c}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xffff8001}]}, @ra={0x94, 0x4, 0x1}]}}}}}) 05:14:51 executing program 5: socketpair(0x10, 0x0, 0x0, &(0x7f0000000180)) 05:14:51 executing program 3: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000200)={'gretap0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x40, 0x7800, 0x80, 0x100, {{0x10, 0x4, 0x1, 0x2, 0x40, 0x68, 0x0, 0xff, 0x4, 0x0, @rand_addr=0x64010102, @multicast1, {[@end, @timestamp={0x44, 0x28, 0x4c, 0x0, 0x4, [0x4, 0xfffff11c, 0x7, 0x5, 0x6, 0x100, 0xdc9, 0x3, 0xde6b]}]}}}}}) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/disk', 0x942, 0x18) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r1) socketpair(0x9, 0x80000, 0x4, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(r2, 0x9) 05:14:51 executing program 5: socketpair(0x10, 0x0, 0x0, &(0x7f0000000180)) 05:14:51 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, 0x0) 05:14:51 executing program 5: socketpair(0x10, 0x0, 0x6, 0x0) 05:14:51 executing program 2: socketpair(0x22, 0x0, 0x1, &(0x7f0000000040)) 05:14:52 executing program 5: socketpair(0x10, 0x0, 0x6, 0x0) 05:14:52 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x68, 0x7800, 0x8, 0x5, {{0xf, 0x4, 0x1, 0x2, 0x3c, 0x66, 0x0, 0xd6, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x43}, @empty, {[@timestamp_addr={0x44, 0x24, 0x90, 0x1, 0x5, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0xffffa0de}, {@remote, 0xfffffcab}, {@broadcast, 0xe6c}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xffff8001}]}, @ra={0x94, 0x4, 0x1}]}}}}}) 05:14:52 executing program 2: socketpair(0x22, 0x0, 0x0, &(0x7f0000000040)) 05:14:52 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x0, &(0x7f0000000200)=""/4096) 05:14:52 executing program 5: socketpair(0x10, 0x0, 0x6, 0x0) 05:14:52 executing program 5: socketpair(0x10, 0x0, 0x0, &(0x7f0000000180)) 05:14:52 executing program 3: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000200)={'gretap0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x40, 0x7800, 0x80, 0x100, {{0x10, 0x4, 0x1, 0x2, 0x40, 0x68, 0x0, 0xff, 0x4, 0x0, @rand_addr=0x64010102, @multicast1, {[@end, @timestamp={0x44, 0x28, 0x4c, 0x0, 0x4, [0x4, 0xfffff11c, 0x7, 0x5, 0x6, 0x100, 0xdc9, 0x3, 0xde6b]}]}}}}}) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/disk', 0x942, 0x18) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r1) socketpair(0x9, 0x80000, 0x4, &(0x7f00000003c0)) 05:14:52 executing program 5: socketpair(0x10, 0x0, 0x0, &(0x7f0000000180)) 05:14:52 executing program 2: socketpair(0x22, 0x0, 0x0, &(0x7f0000000040)) 05:14:53 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, 0x0) 05:14:53 executing program 5: socketpair(0x10, 0x0, 0x0, &(0x7f0000000180)) 05:14:53 executing program 2: socketpair(0x22, 0x0, 0x0, &(0x7f0000000040)) 05:14:53 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x0, &(0x7f0000000200)=""/4096) 05:14:53 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x68, 0x7800, 0x8, 0x5, {{0xf, 0x4, 0x1, 0x2, 0x3c, 0x66, 0x0, 0xd6, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x43}, @empty, {[@timestamp_addr={0x44, 0x24, 0x90, 0x1, 0x5, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0xffffa0de}, {@remote, 0xfffffcab}, {@broadcast, 0xe6c}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xffff8001}]}, @ra={0x94, 0x4, 0x1}]}}}}}) 05:14:53 executing program 3: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000200)={'gretap0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x40, 0x7800, 0x80, 0x100, {{0x10, 0x4, 0x1, 0x2, 0x40, 0x68, 0x0, 0xff, 0x4, 0x0, @rand_addr=0x64010102, @multicast1, {[@end, @timestamp={0x44, 0x28, 0x4c, 0x0, 0x4, [0x4, 0xfffff11c, 0x7, 0x5, 0x6, 0x100, 0xdc9, 0x3, 0xde6b]}]}}}}}) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/disk', 0x942, 0x18) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r1) 05:14:53 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) 05:14:53 executing program 2: socketpair(0x22, 0x0, 0x1, 0x0) 05:14:53 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) 05:14:53 executing program 2: socketpair(0x22, 0x0, 0x1, 0x0) 05:14:53 executing program 5: socketpair(0x0, 0x0, 0x0, &(0x7f0000000180)) 05:14:53 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x0, &(0x7f0000000200)=""/4096) 05:14:54 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r0, 0x62, 0x0) 05:14:54 executing program 2: socketpair(0x22, 0x0, 0x1, 0x0) 05:14:54 executing program 5: socketpair(0x10, 0x0, 0x0, 0x0) 05:14:54 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'syztnl2\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x68, 0x7800, 0x8, 0x5, {{0xf, 0x4, 0x1, 0x2, 0x3c, 0x66, 0x0, 0xd6, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x43}, @empty, {[@timestamp_addr={0x44, 0x24, 0x90, 0x1, 0x5, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0xffffa0de}, {@remote, 0xfffffcab}, {@broadcast, 0xe6c}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xffff8001}]}, @ra={0x94, 0x4, 0x1}]}}}}}) 05:14:54 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000200)={'gretap0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x40, 0x7800, 0x80, 0x100, {{0x10, 0x4, 0x1, 0x2, 0x40, 0x68, 0x0, 0xff, 0x4, 0x0, @rand_addr=0x64010102, @multicast1, {[@end, @timestamp={0x44, 0x28, 0x4c, 0x0, 0x4, [0x4, 0xfffff11c, 0x7, 0x5, 0x6, 0x100, 0xdc9, 0x3, 0xde6b]}]}}}}}) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/disk', 0x942, 0x18) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r1) socketpair(0x9, 0x80000, 0x4, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(r2, 0x9) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r3) 05:14:54 executing program 3: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000200)={'gretap0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x40, 0x7800, 0x80, 0x100, {{0x10, 0x4, 0x1, 0x2, 0x40, 0x68, 0x0, 0xff, 0x4, 0x0, @rand_addr=0x64010102, @multicast1, {[@end, @timestamp={0x44, 0x28, 0x4c, 0x0, 0x4, [0x4, 0xfffff11c, 0x7, 0x5, 0x6, 0x100, 0xdc9, 0x3, 0xde6b]}]}}}}}) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/disk', 0x942, 0x18) pipe2$watch_queue(&(0x7f0000000380), 0x80) 05:14:54 executing program 5: socketpair(0x10, 0x0, 0x0, 0x0) 05:14:54 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:54 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000200)={'gretap0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x40, 0x7800, 0x80, 0x100, {{0x10, 0x4, 0x1, 0x2, 0x40, 0x68, 0x0, 0xff, 0x4, 0x0, @rand_addr=0x64010102, @multicast1, {[@end, @timestamp={0x44, 0x28, 0x4c, 0x0, 0x4, [0x4, 0xfffff11c, 0x7, 0x5, 0x6, 0x100, 0xdc9, 0x3, 0xde6b]}]}}}}}) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/disk', 0x942, 0x18) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r1) socketpair(0x9, 0x80000, 0x4, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(r2, 0x9) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r3) 05:14:54 executing program 5: socketpair(0x10, 0x0, 0x0, 0x0) 05:14:54 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000200)={'gretap0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x40, 0x7800, 0x80, 0x100, {{0x10, 0x4, 0x1, 0x2, 0x40, 0x68, 0x0, 0xff, 0x4, 0x0, @rand_addr=0x64010102, @multicast1, {[@end, @timestamp={0x44, 0x28, 0x4c, 0x0, 0x4, [0x4, 0xfffff11c, 0x7, 0x5, 0x6, 0x100, 0xdc9, 0x3, 0xde6b]}]}}}}}) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/disk', 0x942, 0x18) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r1) socketpair(0x9, 0x80000, 0x4, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(r2, 0x9) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r3) 05:14:54 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000200)={'gretap0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x40, 0x7800, 0x80, 0x100, {{0x10, 0x4, 0x1, 0x2, 0x40, 0x68, 0x0, 0xff, 0x4, 0x0, @rand_addr=0x64010102, @multicast1, {[@end, @timestamp={0x44, 0x28, 0x4c, 0x0, 0x4, [0x4, 0xfffff11c, 0x7, 0x5, 0x6, 0x100, 0xdc9, 0x3, 0xde6b]}]}}}}}) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/disk', 0x942, 0x18) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r1) socketpair(0x9, 0x80000, 0x4, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(r2, 0x9) pipe2$watch_queue(&(0x7f0000000380), 0x80) 05:14:54 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000200)={'gretap0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x40, 0x7800, 0x80, 0x100, {{0x10, 0x4, 0x1, 0x2, 0x40, 0x68, 0x0, 0xff, 0x4, 0x0, @rand_addr=0x64010102, @multicast1, {[@end, @timestamp={0x44, 0x28, 0x4c, 0x0, 0x4, [0x4, 0xfffff11c, 0x7, 0x5, 0x6, 0x100, 0xdc9, 0x3, 0xde6b]}]}}}}}) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/disk', 0x942, 0x18) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r1) socketpair(0x9, 0x80000, 0x4, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$getown(r2, 0x9) 05:14:54 executing program 5: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x62, &(0x7f0000000200)=""/4096) 05:14:54 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0xe, 0x1, 0x5, 0x1, 0x8, 0x1, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0xb, &(0x7f0000000280)=@raw=[@cb_func={0x18, 0x6, 0x4, 0x0, 0x1}, @map_val={0x18, 0x4, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_fd={0x18, 0x2, 0x1, 0x0, r0}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x1}, @map_val={0x18, 0x3, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[r0, r0, r0, 0x1, r0, r0, r0, r0, r0, r0]}, 0x80) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000005c0)={r1, 0x0, 0x25, 0x2}, 0x10) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000680)='/sys/module/usblp', 0x408000, 0x4) sendto$phonet(r3, &(0x7f00000006c0)="36d700804cd32aec8dee27c2f1560bcfb94478d57d7a48a1628138ae97843749f45b753a0f562dd32a3db7f443ebbe99abb73f4e45742bedeeecd2d8204ef7b2440522f014cefc4b7475dbf362194a176dba1ad4361bcc4a3035ec1b332a22e65f0b5e833c099794e1f52d15aa5a8fce", 0x70, 0x808, &(0x7f0000000740)={0x23, 0xff, 0xb7, 0x5}, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000240)={'sit0\x00', &(0x7f0000000840)=ANY=[@ANYBLOB='erspan0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0001070000000006000000094e000038006800000204907800000000e0000002890fc4ffffffffac1e000100000000441401e1ac1414aa00000001ac1e00017fffffff00178d468f423e7666f317261a1aefebc63ed732d177588602d084e7efa1495eab447c607d698849cc9ac87761bc125f51881b646d3f35b4"]}) bpf$MAP_CREATE(0x4, &(0x7f0000002600)=@base={0x17, 0x81, 0x3d, 0x6, 0x2, r2, 0x9, '\x00', r4, 0xffffffffffffffff, 0x2, 0x1, 0x4}, 0x48) r5 = socket$phonet(0x23, 0x2, 0x1) ioctl$SIOCPNADDRESOURCE(r5, 0x89e0, &(0x7f00000003c0)=0x5f2) r6 = syz_open_dev$vcsn(&(0x7f0000000000), 0x100000001, 0x2) sendmsg$GTP_CMD_NEWPDP(r6, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x0, 0x1, 0x70bd2b, 0x25dfdbfe, {}, [@GTPA_VERSION={0x8}, @GTPA_TID={0xc, 0x3, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x4004011}, 0x40000) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/module/port100', 0x220000, 0x135) setsockopt$inet_udp_encap(r7, 0x11, 0x64, &(0x7f0000000640)=0x3, 0x4) 05:14:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) 05:14:54 executing program 5: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x62, &(0x7f0000000200)=""/4096) 05:14:54 executing program 3: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000200)={'gretap0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x40, 0x7800, 0x80, 0x100, {{0x10, 0x4, 0x1, 0x2, 0x40, 0x68, 0x0, 0xff, 0x4, 0x0, @rand_addr=0x64010102, @multicast1, {[@end, @timestamp={0x44, 0x28, 0x4c, 0x0, 0x4, [0x4, 0xfffff11c, 0x7, 0x5, 0x6, 0x100, 0xdc9, 0x3, 0xde6b]}]}}}}}) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/disk', 0x942, 0x18) 05:14:54 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000200)={'gretap0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x40, 0x7800, 0x80, 0x100, {{0x10, 0x4, 0x1, 0x2, 0x40, 0x68, 0x0, 0xff, 0x4, 0x0, @rand_addr=0x64010102, @multicast1, {[@end, @timestamp={0x44, 0x28, 0x4c, 0x0, 0x4, [0x4, 0xfffff11c, 0x7, 0x5, 0x6, 0x100, 0xdc9, 0x3, 0xde6b]}]}}}}}) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/disk', 0x942, 0x18) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r1) socketpair(0x9, 0x80000, 0x4, &(0x7f00000003c0)) [ 278.737873][ T23] audit: type=1400 audit(1668921294.648:135): avc: denied { map_create } for pid=9599 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 05:14:54 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:54 executing program 5: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x62, &(0x7f0000000200)=""/4096) 05:14:54 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000200)={'gretap0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x40, 0x7800, 0x80, 0x100, {{0x10, 0x4, 0x1, 0x2, 0x40, 0x68, 0x0, 0xff, 0x4, 0x0, @rand_addr=0x64010102, @multicast1, {[@end, @timestamp={0x44, 0x28, 0x4c, 0x0, 0x4, [0x4, 0xfffff11c, 0x7, 0x5, 0x6, 0x100, 0xdc9, 0x3, 0xde6b]}]}}}}}) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/disk', 0x942, 0x18) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r1) 05:14:54 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000200)={'gretap0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x40, 0x7800, 0x80, 0x100, {{0x10, 0x4, 0x1, 0x2, 0x40, 0x68, 0x0, 0xff, 0x4, 0x0, @rand_addr=0x64010102, @multicast1, {[@end, @timestamp={0x44, 0x28, 0x4c, 0x0, 0x4, [0x4, 0xfffff11c, 0x7, 0x5, 0x6, 0x100, 0xdc9, 0x3, 0xde6b]}]}}}}}) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/disk', 0x942, 0x18) pipe2$watch_queue(&(0x7f0000000380), 0x80) 05:14:54 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000200)={'gretap0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x40, 0x7800, 0x80, 0x100, {{0x10, 0x4, 0x1, 0x2, 0x40, 0x68, 0x0, 0xff, 0x4, 0x0, @rand_addr=0x64010102, @multicast1, {[@end, @timestamp={0x44, 0x28, 0x4c, 0x0, 0x4, [0x4, 0xfffff11c, 0x7, 0x5, 0x6, 0x100, 0xdc9, 0x3, 0xde6b]}]}}}}}) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/disk', 0x942, 0x18) 05:14:54 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000200)={'gretap0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x40, 0x7800, 0x80, 0x100, {{0x10, 0x4, 0x1, 0x2, 0x40, 0x68, 0x0, 0xff, 0x4, 0x0, @rand_addr=0x64010102, @multicast1, {[@end, @timestamp={0x44, 0x28, 0x4c, 0x0, 0x4, [0x4, 0xfffff11c, 0x7, 0x5, 0x6, 0x100, 0xdc9, 0x3, 0xde6b]}]}}}}}) pipe2$watch_queue(&(0x7f0000000380), 0x80) openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/disk', 0x942, 0x18) 05:14:55 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0xe, 0x1, 0x5, 0x1, 0x8, 0x1, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0xb, &(0x7f0000000280)=@raw=[@cb_func={0x18, 0x6, 0x4, 0x0, 0x1}, @map_val={0x18, 0x4, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_fd={0x18, 0x2, 0x1, 0x0, r0}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x1}, @map_val={0x18, 0x3, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[r0, r0, r0, 0x1, r0, r0, r0, r0, r0, r0]}, 0x80) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000005c0)={r1, 0x0, 0x25, 0x2}, 0x10) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000680)='/sys/module/usblp', 0x408000, 0x4) sendto$phonet(r3, &(0x7f00000006c0)="36d700804cd32aec8dee27c2f1560bcfb94478d57d7a48a1628138ae97843749f45b753a0f562dd32a3db7f443ebbe99abb73f4e45742bedeeecd2d8204ef7b2440522f014cefc4b7475dbf362194a176dba1ad4361bcc4a3035ec1b332a22e65f0b5e833c099794e1f52d15aa5a8fce", 0x70, 0x808, &(0x7f0000000740)={0x23, 0xff, 0xb7, 0x5}, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000240)={'sit0\x00', &(0x7f0000000840)=ANY=[@ANYBLOB='erspan0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0001070000000006000000094e000038006800000204907800000000e0000002890fc4ffffffffac1e000100000000441401e1ac1414aa00000001ac1e00017fffffff00178d468f423e7666f317261a1aefebc63ed732d177588602d084e7efa1495eab447c607d698849cc9ac87761bc125f51881b646d3f35b4"]}) bpf$MAP_CREATE(0x4, &(0x7f0000002600)=@base={0x17, 0x81, 0x3d, 0x6, 0x2, r2, 0x9, '\x00', r4, 0xffffffffffffffff, 0x2, 0x1, 0x4}, 0x48) r5 = socket$phonet(0x23, 0x2, 0x1) ioctl$SIOCPNADDRESOURCE(r5, 0x89e0, &(0x7f00000003c0)=0x5f2) r6 = syz_open_dev$vcsn(&(0x7f0000000000), 0x100000001, 0x2) sendmsg$GTP_CMD_NEWPDP(r6, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x0, 0x1, 0x70bd2b, 0x25dfdbfe, {}, [@GTPA_VERSION={0x8}, @GTPA_TID={0xc, 0x3, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x4004011}, 0x40000) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/module/port100', 0x220000, 0x135) setsockopt$inet_udp_encap(r7, 0x11, 0x64, &(0x7f0000000640)=0x3, 0x4) 05:14:55 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000200)={'gretap0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x40, 0x7800, 0x80, 0x100, {{0x10, 0x4, 0x1, 0x2, 0x40, 0x68, 0x0, 0xff, 0x4, 0x0, @rand_addr=0x64010102, @multicast1, {[@end, @timestamp={0x44, 0x28, 0x4c, 0x0, 0x4, [0x4, 0xfffff11c, 0x7, 0x5, 0x6, 0x100, 0xdc9, 0x3, 0xde6b]}]}}}}}) openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/disk', 0x942, 0x18) 05:14:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) 05:14:55 executing program 5: wait4(0xffffffffffffffff, &(0x7f0000000000), 0x8, &(0x7f0000000040)) bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) sendmsg$NL80211_CMD_REGISTER_BEACONS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, 0x0, 0x800, 0x70bd2a, 0x25dfdbfd, {{}, {@val={0x8, 0x1, 0x4f}, @val={0x8}, @val={0xc, 0x99, {0x0, 0x37}}}}, ["", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x810}, 0x44014) 05:14:55 executing program 3: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000200)={'gretap0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x40, 0x7800, 0x80, 0x100, {{0x10, 0x4, 0x1, 0x2, 0x40, 0x68, 0x0, 0xff, 0x4, 0x0, @rand_addr=0x64010102, @multicast1, {[@end, @timestamp={0x44, 0x28, 0x4c, 0x0, 0x4, [0x4, 0xfffff11c, 0x7, 0x5, 0x6, 0x100, 0xdc9, 0x3, 0xde6b]}]}}}}}) pipe2$watch_queue(&(0x7f0000000380), 0x80) openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/disk', 0x942, 0x18) 05:14:55 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/disk', 0x942, 0x18) 05:14:55 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:55 executing program 5: wait4(0xffffffffffffffff, &(0x7f0000000000), 0x8, &(0x7f0000000040)) bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) sendmsg$NL80211_CMD_REGISTER_BEACONS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, 0x0, 0x800, 0x70bd2a, 0x25dfdbfd, {{}, {@val={0x8, 0x1, 0x4f}, @val={0x8}, @val={0xc, 0x99, {0x0, 0x37}}}}, ["", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x810}, 0x44014) 05:14:55 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/disk', 0x942, 0x18) 05:14:55 executing program 2: openat$sysfs(0xffffffffffffff9c, 0x0, 0x942, 0x18) 05:14:55 executing program 5: wait4(0xffffffffffffffff, &(0x7f0000000000), 0x8, &(0x7f0000000040)) bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) sendmsg$NL80211_CMD_REGISTER_BEACONS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, 0x0, 0x800, 0x70bd2a, 0x25dfdbfd, {{}, {@val={0x8, 0x1, 0x4f}, @val={0x8}, @val={0xc, 0x99, {0x0, 0x37}}}}, ["", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x810}, 0x44014) 05:14:55 executing program 2: openat$sysfs(0xffffffffffffff9c, 0x0, 0x942, 0x18) 05:14:55 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0xe, 0x1, 0x5, 0x1, 0x8, 0x1, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0xb, &(0x7f0000000280)=@raw=[@cb_func={0x18, 0x6, 0x4, 0x0, 0x1}, @map_val={0x18, 0x4, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_fd={0x18, 0x2, 0x1, 0x0, r0}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x1}, @map_val={0x18, 0x3, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[r0, r0, r0, 0x1, r0, r0, r0, r0, r0, r0]}, 0x80) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000005c0)={r1, 0x0, 0x25, 0x2}, 0x10) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000680)='/sys/module/usblp', 0x408000, 0x4) sendto$phonet(r3, &(0x7f00000006c0)="36d700804cd32aec8dee27c2f1560bcfb94478d57d7a48a1628138ae97843749f45b753a0f562dd32a3db7f443ebbe99abb73f4e45742bedeeecd2d8204ef7b2440522f014cefc4b7475dbf362194a176dba1ad4361bcc4a3035ec1b332a22e65f0b5e833c099794e1f52d15aa5a8fce", 0x70, 0x808, &(0x7f0000000740)={0x23, 0xff, 0xb7, 0x5}, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000240)={'sit0\x00', &(0x7f0000000840)=ANY=[@ANYBLOB='erspan0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0001070000000006000000094e000038006800000204907800000000e0000002890fc4ffffffffac1e000100000000441401e1ac1414aa00000001ac1e00017fffffff00178d468f423e7666f317261a1aefebc63ed732d177588602d084e7efa1495eab447c607d698849cc9ac87761bc125f51881b646d3f35b4"]}) bpf$MAP_CREATE(0x4, &(0x7f0000002600)=@base={0x17, 0x81, 0x3d, 0x6, 0x2, r2, 0x9, '\x00', r4, 0xffffffffffffffff, 0x2, 0x1, 0x4}, 0x48) r5 = socket$phonet(0x23, 0x2, 0x1) ioctl$SIOCPNADDRESOURCE(r5, 0x89e0, &(0x7f00000003c0)=0x5f2) r6 = syz_open_dev$vcsn(&(0x7f0000000000), 0x100000001, 0x2) sendmsg$GTP_CMD_NEWPDP(r6, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x0, 0x1, 0x70bd2b, 0x25dfdbfe, {}, [@GTPA_VERSION={0x8}, @GTPA_TID={0xc, 0x3, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x4004011}, 0x40000) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/module/port100', 0x220000, 0x135) setsockopt$inet_udp_encap(r7, 0x11, 0x64, &(0x7f0000000640)=0x3, 0x4) 05:14:55 executing program 2: openat$sysfs(0xffffffffffffff9c, 0x0, 0x942, 0x18) 05:14:55 executing program 5: wait4(0xffffffffffffffff, &(0x7f0000000000), 0x8, &(0x7f0000000040)) bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) 05:14:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) 05:14:55 executing program 3: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000200)={'gretap0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x40, 0x7800, 0x80, 0x100, {{0x10, 0x4, 0x1, 0x2, 0x40, 0x68, 0x0, 0xff, 0x4, 0x0, @rand_addr=0x64010102, @multicast1, {[@end, @timestamp={0x44, 0x28, 0x4c, 0x0, 0x4, [0x4, 0xfffff11c, 0x7, 0x5, 0x6, 0x100, 0xdc9, 0x3, 0xde6b]}]}}}}}) openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/disk', 0x942, 0x18) 05:14:55 executing program 5: wait4(0xffffffffffffffff, &(0x7f0000000000), 0x8, &(0x7f0000000040)) 05:14:55 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:55 executing program 5: wait4(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)) 05:14:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000080)={'syztnl2\x00', 0x0}) 05:14:55 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/disk', 0x0, 0x18) 05:14:55 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0xe, 0x1, 0x5, 0x1, 0x8, 0x1, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0xb, &(0x7f0000000280)=@raw=[@cb_func={0x18, 0x6, 0x4, 0x0, 0x1}, @map_val={0x18, 0x4, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_fd={0x18, 0x2, 0x1, 0x0, r0}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x1}, @map_val={0x18, 0x3, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[r0, r0, r0, 0x1, r0, r0, r0, r0, r0, r0]}, 0x80) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000005c0)={r1, 0x0, 0x25, 0x2}, 0x10) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000680)='/sys/module/usblp', 0x408000, 0x4) sendto$phonet(r3, &(0x7f00000006c0)="36d700804cd32aec8dee27c2f1560bcfb94478d57d7a48a1628138ae97843749f45b753a0f562dd32a3db7f443ebbe99abb73f4e45742bedeeecd2d8204ef7b2440522f014cefc4b7475dbf362194a176dba1ad4361bcc4a3035ec1b332a22e65f0b5e833c099794e1f52d15aa5a8fce", 0x70, 0x808, &(0x7f0000000740)={0x23, 0xff, 0xb7, 0x5}, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000240)={'sit0\x00', &(0x7f0000000840)=ANY=[@ANYBLOB='erspan0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0001070000000006000000094e000038006800000204907800000000e0000002890fc4ffffffffac1e000100000000441401e1ac1414aa00000001ac1e00017fffffff00178d468f423e7666f317261a1aefebc63ed732d177588602d084e7efa1495eab447c607d698849cc9ac87761bc125f51881b646d3f35b4"]}) bpf$MAP_CREATE(0x4, &(0x7f0000002600)=@base={0x17, 0x81, 0x3d, 0x6, 0x2, r2, 0x9, '\x00', r4, 0xffffffffffffffff, 0x2, 0x1, 0x4}, 0x48) r5 = socket$phonet(0x23, 0x2, 0x1) ioctl$SIOCPNADDRESOURCE(r5, 0x89e0, &(0x7f00000003c0)=0x5f2) r6 = syz_open_dev$vcsn(&(0x7f0000000000), 0x100000001, 0x2) sendmsg$GTP_CMD_NEWPDP(r6, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x0, 0x1, 0x70bd2b, 0x25dfdbfe, {}, [@GTPA_VERSION={0x8}, @GTPA_TID={0xc, 0x3, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x4004011}, 0x40000) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000600)='/sys/module/port100', 0x220000, 0x135) 05:14:56 executing program 5: wait4(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)) 05:14:56 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/disk', 0x0, 0x18) 05:14:56 executing program 5: wait4(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:14:56 executing program 5: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000200)={'gretap0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x40, 0x7800, 0x80, 0x100, {{0x10, 0x4, 0x1, 0x2, 0x40, 0x68, 0x0, 0xff, 0x4, 0x0, @rand_addr=0x64010102, @multicast1, {[@end, @timestamp={0x44, 0x28, 0x4c, 0x0, 0x4, [0x4, 0xfffff11c, 0x7, 0x5, 0x6, 0x100, 0xdc9, 0x3, 0xde6b]}]}}}}}) openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/disk', 0x942, 0x18) 05:14:56 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/disk', 0x0, 0x18) 05:14:56 executing program 3: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/disk', 0x942, 0x18) 05:14:56 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/disk', 0x942, 0x0) 05:14:57 executing program 1: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:57 executing program 5: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000200)={'gretap0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x40, 0x7800, 0x80, 0x100, {{0x10, 0x4, 0x1, 0x2, 0x40, 0x68, 0x0, 0xff, 0x4, 0x0, @rand_addr=0x64010102, @multicast1, {[@end, @timestamp={0x44, 0x28, 0x4c, 0x0, 0x4, [0x4, 0xfffff11c, 0x7, 0x5, 0x6, 0x100, 0xdc9, 0x3, 0xde6b]}]}}}}}) openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/disk', 0x942, 0x18) 05:14:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_SCAN(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x400, 0x70bd28, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000880}, 0x8804) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x200, 0x420000) sendmsg$NL80211_CMD_TRIGGER_SCAN(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0x84, r1, 0x200, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x88, 0x32}}}}, [@NL80211_ATTR_MEASUREMENT_DURATION_MANDATORY={0x4}, @NL80211_ATTR_BSSID, @NL80211_ATTR_SCHED_SCAN_INTERVAL={0x8, 0x77, 0x3}, @NL80211_ATTR_BG_SCAN_PERIOD={0x6, 0x98, 0x9}, @NL80211_ATTR_SCHED_SCAN_INTERVAL={0x8, 0x77, 0x3f}]}, 0xffffff12}, 0x1, 0x0, 0x0, 0x2}, 0x20000800) getpid() write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x49, 0x2, {0x22, 0x2, 0x6}}, 0x14) 05:14:57 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0xe, 0x1, 0x5, 0x1, 0x8, 0x1, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0xb, &(0x7f0000000280)=@raw=[@cb_func={0x18, 0x6, 0x4, 0x0, 0x1}, @map_val={0x18, 0x4, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_fd={0x18, 0x2, 0x1, 0x0, r0}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x1}, @map_val={0x18, 0x3, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[r0, r0, r0, 0x1, r0, r0, r0, r0, r0, r0]}, 0x80) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000005c0)={r1, 0x0, 0x25, 0x2}, 0x10) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000680)='/sys/module/usblp', 0x408000, 0x4) sendto$phonet(r3, &(0x7f00000006c0)="36d700804cd32aec8dee27c2f1560bcfb94478d57d7a48a1628138ae97843749f45b753a0f562dd32a3db7f443ebbe99abb73f4e45742bedeeecd2d8204ef7b2440522f014cefc4b7475dbf362194a176dba1ad4361bcc4a3035ec1b332a22e65f0b5e833c099794e1f52d15aa5a8fce", 0x70, 0x808, &(0x7f0000000740)={0x23, 0xff, 0xb7, 0x5}, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000240)={'sit0\x00', &(0x7f0000000840)=ANY=[@ANYBLOB='erspan0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0001070000000006000000094e000038006800000204907800000000e0000002890fc4ffffffffac1e000100000000441401e1ac1414aa00000001ac1e00017fffffff00178d468f423e7666f317261a1aefebc63ed732d177588602d084e7efa1495eab447c607d698849cc9ac87761bc125f51881b646d3f35b4"]}) bpf$MAP_CREATE(0x4, &(0x7f0000002600)=@base={0x17, 0x81, 0x3d, 0x6, 0x2, r2, 0x9, '\x00', r4, 0xffffffffffffffff, 0x2, 0x1, 0x4}, 0x48) r5 = socket$phonet(0x23, 0x2, 0x1) ioctl$SIOCPNADDRESOURCE(r5, 0x89e0, &(0x7f00000003c0)=0x5f2) r6 = syz_open_dev$vcsn(&(0x7f0000000000), 0x100000001, 0x2) sendmsg$GTP_CMD_NEWPDP(r6, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x28, 0x0, 0x1, 0x70bd2b, 0x25dfdbfe, {}, [@GTPA_VERSION={0x8}, @GTPA_TID={0xc, 0x3, 0x1}]}, 0x28}, 0x1, 0x0, 0x0, 0x4004011}, 0x40000) 05:14:57 executing program 4: bpf$MAP_CREATE(0x4, &(0x7f0000002600), 0x48) socketpair(0x0, 0x0, 0x81, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4800}, 0x8080) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000540)={'erspan0\x00', &(0x7f00000004c0)={'sit0\x00', 0x0, 0x80, 0x80, 0x20, 0xfffffffd, {{0x16, 0x4, 0x1, 0x17, 0x58, 0x66, 0x0, 0x80, 0x29, 0x0, @rand_addr=0x64010101, @broadcast, {[@end, @timestamp_addr={0x44, 0x3c, 0xb6, 0x1, 0x6, [{@remote}, {@private=0xa010100, 0x3}, {@multicast1, 0x1}, {@dev={0xac, 0x14, 0x14, 0x42}, 0xa04}, {@dev={0xac, 0x14, 0x14, 0x21}, 0x401}, {@local, 0x40}, {@empty, 0x2}]}, @ra={0x94, 0x4, 0x1}]}}}}}) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/module/comedi', 0x450c40, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x1d, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000410900009d11000080000000470410000400000085200000030000001800000004000000000000003f000000180000008c9f00000000000004000000d500e0ff10000000183900000100000000000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x3, 0x38, &(0x7f00000000c0)=""/56, 0x40f00, 0x2, '\x00', 0x0, 0x1b, r1, 0x8, &(0x7f0000000140)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000180)={0x4, 0x4, 0xf0, 0xffff2f23}, 0x10}, 0x80) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r2, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000280)={0x1a0, 0x0, 0x6b7a4d2eaf42947d, 0x70bd2d, 0x25dfdbfd, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0x7}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x25}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x9}, {0x6, 0x16, 0x7f}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x7}, {0x8, 0xb, 0x1800000}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0xfca0}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x4}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x10001}, {0x6, 0x16, 0x1000}, {0x5}, {0x6, 0x11, 0x6}, {0x8, 0xb, 0x57}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6, 0x16, 0x3}, {0x5}, {0x6, 0x11, 0xfff7}, {0x8, 0xb, 0x2bf}}]}, 0x1a0}}, 0x44000) 05:14:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_SCAN(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x400, 0x70bd28, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000880}, 0x8804) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x200, 0x420000) sendmsg$NL80211_CMD_TRIGGER_SCAN(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0x84, r1, 0x200, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x88, 0x32}}}}, [@NL80211_ATTR_MEASUREMENT_DURATION_MANDATORY={0x4}, @NL80211_ATTR_BSSID, @NL80211_ATTR_SCHED_SCAN_INTERVAL={0x8, 0x77, 0x3}, @NL80211_ATTR_BG_SCAN_PERIOD={0x6, 0x98, 0x9}, @NL80211_ATTR_SCHED_SCAN_INTERVAL={0x8, 0x77, 0x3f}]}, 0xffffff12}, 0x1, 0x0, 0x0, 0x2}, 0x20000800) getpid() write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x49, 0x2, {0x22, 0x2, 0x6}}, 0x14) 05:14:57 executing program 3: openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/disk', 0x942, 0x18) 05:14:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_SCAN(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x400, 0x70bd28, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000880}, 0x8804) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x200, 0x420000) sendmsg$NL80211_CMD_TRIGGER_SCAN(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0x84, r1, 0x200, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x88, 0x32}}}}, [@NL80211_ATTR_MEASUREMENT_DURATION_MANDATORY={0x4}, @NL80211_ATTR_BSSID, @NL80211_ATTR_SCHED_SCAN_INTERVAL={0x8, 0x77, 0x3}, @NL80211_ATTR_BG_SCAN_PERIOD={0x6, 0x98, 0x9}, @NL80211_ATTR_SCHED_SCAN_INTERVAL={0x8, 0x77, 0x3f}]}, 0xffffff12}, 0x1, 0x0, 0x0, 0x2}, 0x20000800) getpid() write$P9_RMKDIR(0xffffffffffffffff, &(0x7f0000000000)={0x14, 0x49, 0x2, {0x22, 0x2, 0x6}}, 0x14) 05:14:57 executing program 5: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000200)={'gretap0\x00', &(0x7f0000000180)={'syztnl1\x00', 0x0, 0x40, 0x7800, 0x80, 0x100, {{0x10, 0x4, 0x1, 0x2, 0x40, 0x68, 0x0, 0xff, 0x4, 0x0, @rand_addr=0x64010102, @multicast1, {[@end, @timestamp={0x44, 0x28, 0x4c, 0x0, 0x4, [0x4, 0xfffff11c, 0x7, 0x5, 0x6, 0x100, 0xdc9, 0x3, 0xde6b]}]}}}}}) openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/disk', 0x942, 0x18) 05:14:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_SCAN(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x400, 0x70bd28, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000880}, 0x8804) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x200, 0x420000) sendmsg$NL80211_CMD_TRIGGER_SCAN(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)={0x84, r1, 0x200, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x88, 0x32}}}}, [@NL80211_ATTR_MEASUREMENT_DURATION_MANDATORY={0x4}, @NL80211_ATTR_BSSID, @NL80211_ATTR_SCHED_SCAN_INTERVAL={0x8, 0x77, 0x3}, @NL80211_ATTR_BG_SCAN_PERIOD={0x6, 0x98, 0x9}, @NL80211_ATTR_SCHED_SCAN_INTERVAL={0x8, 0x77, 0x3f}]}, 0xffffff12}, 0x1, 0x0, 0x0, 0x2}, 0x20000800) getpid() 05:14:57 executing program 5: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/disk', 0x942, 0x18) 05:14:57 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/disk', 0x942, 0x18) 05:14:57 executing program 1: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_SCAN(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x400, 0x70bd28, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000880}, 0x8804) syz_open_dev$vcsn(&(0x7f0000000180), 0x200, 0x420000) getpid() 05:14:57 executing program 5: openat$sysfs(0xffffffffffffff9c, 0x0, 0x942, 0x18) 05:14:57 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0xe, 0x1, 0x5, 0x1, 0x8, 0x1, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0xb, &(0x7f0000000280)=@raw=[@cb_func={0x18, 0x6, 0x4, 0x0, 0x1}, @map_val={0x18, 0x4, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_fd={0x18, 0x2, 0x1, 0x0, r0}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x1}, @map_val={0x18, 0x3, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[r0, r0, r0, 0x1, r0, r0, r0, r0, r0, r0]}, 0x80) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000005c0)={r1, 0x0, 0x25, 0x2}, 0x10) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000680)='/sys/module/usblp', 0x408000, 0x4) sendto$phonet(r3, &(0x7f00000006c0)="36d700804cd32aec8dee27c2f1560bcfb94478d57d7a48a1628138ae97843749f45b753a0f562dd32a3db7f443ebbe99abb73f4e45742bedeeecd2d8204ef7b2440522f014cefc4b7475dbf362194a176dba1ad4361bcc4a3035ec1b332a22e65f0b5e833c099794e1f52d15aa5a8fce", 0x70, 0x808, &(0x7f0000000740)={0x23, 0xff, 0xb7, 0x5}, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000240)={'sit0\x00', &(0x7f0000000840)=ANY=[@ANYBLOB='erspan0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0001070000000006000000094e000038006800000204907800000000e0000002890fc4ffffffffac1e000100000000441401e1ac1414aa00000001ac1e00017fffffff00178d468f423e7666f317261a1aefebc63ed732d177588602d084e7efa1495eab447c607d698849cc9ac87761bc125f51881b646d3f35b4"]}) bpf$MAP_CREATE(0x4, &(0x7f0000002600)=@base={0x17, 0x81, 0x3d, 0x6, 0x2, r2, 0x9, '\x00', r4, 0xffffffffffffffff, 0x2, 0x1, 0x4}, 0x48) r5 = socket$phonet(0x23, 0x2, 0x1) ioctl$SIOCPNADDRESOURCE(r5, 0x89e0, &(0x7f00000003c0)=0x5f2) syz_open_dev$vcsn(&(0x7f0000000000), 0x100000001, 0x2) 05:14:57 executing program 4: bpf$MAP_CREATE(0x4, &(0x7f0000002600), 0x48) socketpair(0x0, 0x0, 0x81, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4800}, 0x8080) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000540)={'erspan0\x00', &(0x7f00000004c0)={'sit0\x00', 0x0, 0x80, 0x80, 0x20, 0xfffffffd, {{0x16, 0x4, 0x1, 0x17, 0x58, 0x66, 0x0, 0x80, 0x29, 0x0, @rand_addr=0x64010101, @broadcast, {[@end, @timestamp_addr={0x44, 0x3c, 0xb6, 0x1, 0x6, [{@remote}, {@private=0xa010100, 0x3}, {@multicast1, 0x1}, {@dev={0xac, 0x14, 0x14, 0x42}, 0xa04}, {@dev={0xac, 0x14, 0x14, 0x21}, 0x401}, {@local, 0x40}, {@empty, 0x2}]}, @ra={0x94, 0x4, 0x1}]}}}}}) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/module/comedi', 0x450c40, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x1d, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000410900009d11000080000000470410000400000085200000030000001800000004000000000000003f000000180000008c9f00000000000004000000d500e0ff10000000183900000100000000000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x3, 0x38, &(0x7f00000000c0)=""/56, 0x40f00, 0x2, '\x00', 0x0, 0x1b, r1, 0x8, &(0x7f0000000140)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000180)={0x4, 0x4, 0xf0, 0xffff2f23}, 0x10}, 0x80) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r2, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000280)={0x1a0, 0x0, 0x6b7a4d2eaf42947d, 0x70bd2d, 0x25dfdbfd, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0x7}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x25}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x9}, {0x6, 0x16, 0x7f}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x7}, {0x8, 0xb, 0x1800000}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0xfca0}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x4}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x10001}, {0x6, 0x16, 0x1000}, {0x5}, {0x6, 0x11, 0x6}, {0x8, 0xb, 0x57}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6, 0x16, 0x3}, {0x5}, {0x6, 0x11, 0xfff7}, {0x8, 0xb, 0x2bf}}]}, 0x1a0}}, 0x44000) 05:14:57 executing program 3: openat$sysfs(0xffffffffffffff9c, 0x0, 0x942, 0x18) 05:14:57 executing program 5: openat$sysfs(0xffffffffffffff9c, 0x0, 0x942, 0x18) 05:14:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_SCAN(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r1, 0x400, 0x70bd28, 0x25dfdbfb, {{}, {@val={0x8}, @void}}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000880}, 0x8804) getpid() 05:14:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) getpid() 05:14:57 executing program 5: openat$sysfs(0xffffffffffffff9c, 0x0, 0x942, 0x18) 05:14:57 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/disk', 0x0, 0x18) 05:14:58 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/disk', 0x0, 0x18) 05:14:58 executing program 1: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) getpid() 05:14:58 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/disk', 0x0, 0x18) 05:14:58 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0xe, 0x1, 0x5, 0x1, 0x8, 0x1, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0xb, &(0x7f0000000280)=@raw=[@cb_func={0x18, 0x6, 0x4, 0x0, 0x1}, @map_val={0x18, 0x4, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_fd={0x18, 0x2, 0x1, 0x0, r0}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x1}, @map_val={0x18, 0x3, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[r0, r0, r0, 0x1, r0, r0, r0, r0, r0, r0]}, 0x80) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000005c0)={r1, 0x0, 0x25, 0x2}, 0x10) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000680)='/sys/module/usblp', 0x408000, 0x4) sendto$phonet(r3, &(0x7f00000006c0)="36d700804cd32aec8dee27c2f1560bcfb94478d57d7a48a1628138ae97843749f45b753a0f562dd32a3db7f443ebbe99abb73f4e45742bedeeecd2d8204ef7b2440522f014cefc4b7475dbf362194a176dba1ad4361bcc4a3035ec1b332a22e65f0b5e833c099794e1f52d15aa5a8fce", 0x70, 0x808, &(0x7f0000000740)={0x23, 0xff, 0xb7, 0x5}, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000240)={'sit0\x00', &(0x7f0000000840)=ANY=[@ANYBLOB='erspan0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0001070000000006000000094e000038006800000204907800000000e0000002890fc4ffffffffac1e000100000000441401e1ac1414aa00000001ac1e00017fffffff00178d468f423e7666f317261a1aefebc63ed732d177588602d084e7efa1495eab447c607d698849cc9ac87761bc125f51881b646d3f35b4"]}) bpf$MAP_CREATE(0x4, &(0x7f0000002600)=@base={0x17, 0x81, 0x3d, 0x6, 0x2, r2, 0x9, '\x00', r4, 0xffffffffffffffff, 0x2, 0x1, 0x4}, 0x48) r5 = socket$phonet(0x23, 0x2, 0x1) ioctl$SIOCPNADDRESOURCE(r5, 0x89e0, &(0x7f00000003c0)=0x5f2) 05:14:58 executing program 3: openat$sysfs(0xffffffffffffff9c, 0x0, 0x942, 0x18) 05:14:58 executing program 4: bpf$MAP_CREATE(0x4, &(0x7f0000002600), 0x48) socketpair(0x0, 0x0, 0x81, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4800}, 0x8080) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000540)={'erspan0\x00', &(0x7f00000004c0)={'sit0\x00', 0x0, 0x80, 0x80, 0x20, 0xfffffffd, {{0x16, 0x4, 0x1, 0x17, 0x58, 0x66, 0x0, 0x80, 0x29, 0x0, @rand_addr=0x64010101, @broadcast, {[@end, @timestamp_addr={0x44, 0x3c, 0xb6, 0x1, 0x6, [{@remote}, {@private=0xa010100, 0x3}, {@multicast1, 0x1}, {@dev={0xac, 0x14, 0x14, 0x42}, 0xa04}, {@dev={0xac, 0x14, 0x14, 0x21}, 0x401}, {@local, 0x40}, {@empty, 0x2}]}, @ra={0x94, 0x4, 0x1}]}}}}}) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/module/comedi', 0x450c40, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x1d, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000410900009d11000080000000470410000400000085200000030000001800000004000000000000003f000000180000008c9f00000000000004000000d500e0ff10000000183900000100000000000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x3, 0x38, &(0x7f00000000c0)=""/56, 0x40f00, 0x2, '\x00', 0x0, 0x1b, r1, 0x8, &(0x7f0000000140)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000180)={0x4, 0x4, 0xf0, 0xffff2f23}, 0x10}, 0x80) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r2, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000280)={0x1a0, 0x0, 0x6b7a4d2eaf42947d, 0x70bd2d, 0x25dfdbfd, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0x7}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x25}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x9}, {0x6, 0x16, 0x7f}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x7}, {0x8, 0xb, 0x1800000}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0xfca0}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x4}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x10001}, {0x6, 0x16, 0x1000}, {0x5}, {0x6, 0x11, 0x6}, {0x8, 0xb, 0x57}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6, 0x16, 0x3}, {0x5}, {0x6, 0x11, 0xfff7}, {0x8, 0xb, 0x2bf}}]}, 0x1a0}}, 0x44000) 05:14:58 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) getpid() 05:14:58 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/disk', 0x942, 0x0) 05:14:58 executing program 2: getpid() 05:14:58 executing program 2: r0 = request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='%\'{+@\xe5\\,/&{\x00', 0xfffffffffffffffe) request_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='batadv\x00', r0) add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0, r0) add_key$fscrypt_provisioning(&(0x7f00000004c0), &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)={0x3, 0x0, @a}, 0x48, r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000340)='/sys/module/dm_mod', 0x400, 0x110) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x44, 0x0, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x5}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}]}, 0x44}}, 0xc000) syz_genetlink_get_family_id$batadv(&(0x7f0000000000), r1) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(r1, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r3, 0x400, 0x70bd26, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000004}, 0x4040004) bpf$BPF_LINK_CREATE_XDP(0x6, 0x0, 0xffffffffffffff8a) 05:14:58 executing program 5: recvfrom$phonet(0xffffffffffffffff, &(0x7f0000000000)=""/50, 0x32, 0x0, &(0x7f0000000040)={0x23, 0x7f, 0x4, 0x5}, 0x10) sendto$phonet(0xffffffffffffffff, &(0x7f0000000080)="6e77d2905894bcec02351d5ae01f8d93b425630b151e0c94e561ef89", 0x1c, 0x0, &(0x7f00000000c0)={0x23, 0x1, 0x48, 0x1f}, 0x10) r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000001c0)={'batadv_slave_0\x00'}) recvfrom$phonet(0xffffffffffffffff, &(0x7f0000000100)=""/80, 0x50, 0x1, &(0x7f0000000180)={0x23, 0x56, 0x95, 0x80}, 0x10) bpf$MAP_CREATE(0x4, &(0x7f0000002600), 0x48) 05:14:58 executing program 2: r0 = request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='%\'{+@\xe5\\,/&{\x00', 0xfffffffffffffffe) request_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='batadv\x00', r0) add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0, r0) add_key$fscrypt_provisioning(&(0x7f00000004c0), &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)={0x3, 0x0, @a}, 0x48, r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000340)='/sys/module/dm_mod', 0x400, 0x110) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x44, 0x0, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x5}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}]}, 0x44}}, 0xc000) syz_genetlink_get_family_id$batadv(&(0x7f0000000000), r1) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(r1, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r3, 0x400, 0x70bd26, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000004}, 0x4040004) bpf$BPF_LINK_CREATE_XDP(0x6, 0x0, 0xffffffffffffff8a) 05:14:59 executing program 1: bpf$MAP_CREATE(0x3, 0x0, 0x0) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:59 executing program 2: r0 = request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='%\'{+@\xe5\\,/&{\x00', 0xfffffffffffffffe) request_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='batadv\x00', r0) add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0, r0) add_key$fscrypt_provisioning(&(0x7f00000004c0), &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)={0x3, 0x0, @a}, 0x48, r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000340)='/sys/module/dm_mod', 0x400, 0x110) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x44, 0x0, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x5}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}]}, 0x44}}, 0xc000) syz_genetlink_get_family_id$batadv(&(0x7f0000000000), r1) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(r1, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r3, 0x400, 0x70bd26, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000004}, 0x4040004) bpf$BPF_LINK_CREATE_XDP(0x6, 0x0, 0xffffffffffffff8a) 05:14:59 executing program 5: recvfrom$phonet(0xffffffffffffffff, &(0x7f0000000000)=""/50, 0x32, 0x0, &(0x7f0000000040)={0x23, 0x7f, 0x4, 0x5}, 0x10) sendto$phonet(0xffffffffffffffff, &(0x7f0000000080)="6e77d2905894bcec02351d5ae01f8d93b425630b151e0c94e561ef89", 0x1c, 0x0, &(0x7f00000000c0)={0x23, 0x1, 0x48, 0x1f}, 0x10) r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000001c0)={'batadv_slave_0\x00'}) recvfrom$phonet(0xffffffffffffffff, &(0x7f0000000100)=""/80, 0x50, 0x1, &(0x7f0000000180)={0x23, 0x56, 0x95, 0x80}, 0x10) bpf$MAP_CREATE(0x4, &(0x7f0000002600), 0x48) 05:14:59 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0xe, 0x1, 0x5, 0x1, 0x8, 0x1, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0xb, &(0x7f0000000280)=@raw=[@cb_func={0x18, 0x6, 0x4, 0x0, 0x1}, @map_val={0x18, 0x4, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_fd={0x18, 0x2, 0x1, 0x0, r0}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x1}, @map_val={0x18, 0x3, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[r0, r0, r0, 0x1, r0, r0, r0, r0, r0, r0]}, 0x80) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000005c0)={r1, 0x0, 0x25, 0x2}, 0x10) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000680)='/sys/module/usblp', 0x408000, 0x4) sendto$phonet(r3, &(0x7f00000006c0)="36d700804cd32aec8dee27c2f1560bcfb94478d57d7a48a1628138ae97843749f45b753a0f562dd32a3db7f443ebbe99abb73f4e45742bedeeecd2d8204ef7b2440522f014cefc4b7475dbf362194a176dba1ad4361bcc4a3035ec1b332a22e65f0b5e833c099794e1f52d15aa5a8fce", 0x70, 0x808, &(0x7f0000000740)={0x23, 0xff, 0xb7, 0x5}, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000240)={'sit0\x00', &(0x7f0000000840)=ANY=[@ANYBLOB='erspan0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0001070000000006000000094e000038006800000204907800000000e0000002890fc4ffffffffac1e000100000000441401e1ac1414aa00000001ac1e00017fffffff00178d468f423e7666f317261a1aefebc63ed732d177588602d084e7efa1495eab447c607d698849cc9ac87761bc125f51881b646d3f35b4"]}) bpf$MAP_CREATE(0x4, &(0x7f0000002600)=@base={0x17, 0x81, 0x3d, 0x6, 0x2, r2, 0x9, '\x00', r4, 0xffffffffffffffff, 0x2, 0x1, 0x4}, 0x48) socket$phonet(0x23, 0x2, 0x1) 05:14:59 executing program 3: openat$sysfs(0xffffffffffffff9c, 0x0, 0x942, 0x18) 05:14:59 executing program 4: bpf$MAP_CREATE(0x4, &(0x7f0000002600), 0x48) socketpair(0x0, 0x0, 0x81, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4800}, 0x8080) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000540)={'erspan0\x00', &(0x7f00000004c0)={'sit0\x00', 0x0, 0x80, 0x80, 0x20, 0xfffffffd, {{0x16, 0x4, 0x1, 0x17, 0x58, 0x66, 0x0, 0x80, 0x29, 0x0, @rand_addr=0x64010101, @broadcast, {[@end, @timestamp_addr={0x44, 0x3c, 0xb6, 0x1, 0x6, [{@remote}, {@private=0xa010100, 0x3}, {@multicast1, 0x1}, {@dev={0xac, 0x14, 0x14, 0x42}, 0xa04}, {@dev={0xac, 0x14, 0x14, 0x21}, 0x401}, {@local, 0x40}, {@empty, 0x2}]}, @ra={0x94, 0x4, 0x1}]}}}}}) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/module/comedi', 0x450c40, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x1d, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000410900009d11000080000000470410000400000085200000030000001800000004000000000000003f000000180000008c9f00000000000004000000d500e0ff10000000183900000100000000000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x3, 0x38, &(0x7f00000000c0)=""/56, 0x40f00, 0x2, '\x00', 0x0, 0x1b, r1, 0x8, &(0x7f0000000140)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000180)={0x4, 0x4, 0xf0, 0xffff2f23}, 0x10}, 0x80) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r2, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000280)={0x1a0, 0x0, 0x6b7a4d2eaf42947d, 0x70bd2d, 0x25dfdbfd, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0x7}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x25}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x9}, {0x6, 0x16, 0x7f}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x7}, {0x8, 0xb, 0x1800000}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0xfca0}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x4}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x10001}, {0x6, 0x16, 0x1000}, {0x5}, {0x6, 0x11, 0x6}, {0x8, 0xb, 0x57}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6, 0x16, 0x3}, {0x5}, {0x6, 0x11, 0xfff7}, {0x8, 0xb, 0x2bf}}]}, 0x1a0}}, 0x44000) 05:14:59 executing program 5: recvfrom$phonet(0xffffffffffffffff, &(0x7f0000000000)=""/50, 0x32, 0x0, &(0x7f0000000040)={0x23, 0x7f, 0x4, 0x5}, 0x10) sendto$phonet(0xffffffffffffffff, &(0x7f0000000080)="6e77d2905894bcec02351d5ae01f8d93b425630b151e0c94e561ef89", 0x1c, 0x0, &(0x7f00000000c0)={0x23, 0x1, 0x48, 0x1f}, 0x10) r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000001c0)={'batadv_slave_0\x00'}) recvfrom$phonet(0xffffffffffffffff, &(0x7f0000000100)=""/80, 0x50, 0x1, &(0x7f0000000180)={0x23, 0x56, 0x95, 0x80}, 0x10) bpf$MAP_CREATE(0x4, &(0x7f0000002600), 0x48) 05:14:59 executing program 2: r0 = request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='%\'{+@\xe5\\,/&{\x00', 0xfffffffffffffffe) request_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='batadv\x00', r0) add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0, r0) add_key$fscrypt_provisioning(&(0x7f00000004c0), &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)={0x3, 0x0, @a}, 0x48, r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000340)='/sys/module/dm_mod', 0x400, 0x110) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x44, 0x0, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x5}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}]}, 0x44}}, 0xc000) syz_genetlink_get_family_id$batadv(&(0x7f0000000000), r1) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(r1, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r3, 0x400, 0x70bd26, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000004}, 0x4040004) 05:14:59 executing program 5: recvfrom$phonet(0xffffffffffffffff, &(0x7f0000000000)=""/50, 0x32, 0x0, &(0x7f0000000040)={0x23, 0x7f, 0x4, 0x5}, 0x10) sendto$phonet(0xffffffffffffffff, &(0x7f0000000080)="6e77d2905894bcec02351d5ae01f8d93b425630b151e0c94e561ef89", 0x1c, 0x0, &(0x7f00000000c0)={0x23, 0x1, 0x48, 0x1f}, 0x10) r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000001c0)={'batadv_slave_0\x00'}) recvfrom$phonet(0xffffffffffffffff, &(0x7f0000000100)=""/80, 0x50, 0x1, &(0x7f0000000180)={0x23, 0x56, 0x95, 0x80}, 0x10) 05:14:59 executing program 2: r0 = request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='%\'{+@\xe5\\,/&{\x00', 0xfffffffffffffffe) request_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='batadv\x00', r0) add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0, r0) add_key$fscrypt_provisioning(&(0x7f00000004c0), &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)={0x3, 0x0, @a}, 0x48, r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000340)='/sys/module/dm_mod', 0x400, 0x110) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x44, 0x0, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x5}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}]}, 0x44}}, 0xc000) syz_genetlink_get_family_id$batadv(&(0x7f0000000000), r1) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) 05:14:59 executing program 5: recvfrom$phonet(0xffffffffffffffff, &(0x7f0000000000)=""/50, 0x32, 0x0, &(0x7f0000000040)={0x23, 0x7f, 0x4, 0x5}, 0x10) sendto$phonet(0xffffffffffffffff, &(0x7f0000000080)="6e77d2905894bcec02351d5ae01f8d93b425630b151e0c94e561ef89", 0x1c, 0x0, &(0x7f00000000c0)={0x23, 0x1, 0x48, 0x1f}, 0x10) r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000001c0)={'batadv_slave_0\x00'}) 05:14:59 executing program 5: recvfrom$phonet(0xffffffffffffffff, &(0x7f0000000000)=""/50, 0x32, 0x0, &(0x7f0000000040)={0x23, 0x7f, 0x4, 0x5}, 0x10) sendto$phonet(0xffffffffffffffff, &(0x7f0000000080)="6e77d2905894bcec02351d5ae01f8d93b425630b151e0c94e561ef89", 0x1c, 0x0, &(0x7f00000000c0)={0x23, 0x1, 0x48, 0x1f}, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'batadv_slave_0\x00'}) 05:14:59 executing program 1: bpf$MAP_CREATE(0x3, 0x0, 0x0) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:14:59 executing program 2: r0 = request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='%\'{+@\xe5\\,/&{\x00', 0xfffffffffffffffe) request_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='batadv\x00', r0) add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0, r0) add_key$fscrypt_provisioning(&(0x7f00000004c0), &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)={0x3, 0x0, @a}, 0x48, r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000340)='/sys/module/dm_mod', 0x400, 0x110) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x44, 0x0, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x5}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}]}, 0x44}}, 0xc000) syz_genetlink_get_family_id$batadv(&(0x7f0000000000), r1) 05:14:59 executing program 5: recvfrom$phonet(0xffffffffffffffff, &(0x7f0000000000)=""/50, 0x32, 0x0, &(0x7f0000000040)={0x23, 0x7f, 0x4, 0x5}, 0x10) sendto$phonet(0xffffffffffffffff, &(0x7f0000000080)="6e77d2905894bcec02351d5ae01f8d93b425630b151e0c94e561ef89", 0x1c, 0x0, &(0x7f00000000c0)={0x23, 0x1, 0x48, 0x1f}, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'batadv_slave_0\x00'}) 05:14:59 executing program 3: openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/disk', 0x0, 0x18) 05:14:59 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0xe, 0x1, 0x5, 0x1, 0x8, 0x1, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0xb, &(0x7f0000000280)=@raw=[@cb_func={0x18, 0x6, 0x4, 0x0, 0x1}, @map_val={0x18, 0x4, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_fd={0x18, 0x2, 0x1, 0x0, r0}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x1}, @map_val={0x18, 0x3, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[r0, r0, r0, 0x1, r0, r0, r0, r0, r0, r0]}, 0x80) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000005c0)={r1, 0x0, 0x25, 0x2}, 0x10) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000680)='/sys/module/usblp', 0x408000, 0x4) sendto$phonet(r3, &(0x7f00000006c0)="36d700804cd32aec8dee27c2f1560bcfb94478d57d7a48a1628138ae97843749f45b753a0f562dd32a3db7f443ebbe99abb73f4e45742bedeeecd2d8204ef7b2440522f014cefc4b7475dbf362194a176dba1ad4361bcc4a3035ec1b332a22e65f0b5e833c099794e1f52d15aa5a8fce", 0x70, 0x808, &(0x7f0000000740)={0x23, 0xff, 0xb7, 0x5}, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000240)={'sit0\x00', &(0x7f0000000840)=ANY=[@ANYBLOB='erspan0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0001070000000006000000094e000038006800000204907800000000e0000002890fc4ffffffffac1e000100000000441401e1ac1414aa00000001ac1e00017fffffff00178d468f423e7666f317261a1aefebc63ed732d177588602d084e7efa1495eab447c607d698849cc9ac87761bc125f51881b646d3f35b4"]}) bpf$MAP_CREATE(0x4, &(0x7f0000002600)=@base={0x17, 0x81, 0x3d, 0x6, 0x2, r2, 0x9, '\x00', r4, 0xffffffffffffffff, 0x2, 0x1, 0x4}, 0x48) 05:14:59 executing program 4: bpf$MAP_CREATE(0x4, &(0x7f0000002600), 0x48) socketpair(0x0, 0x0, 0x81, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4800}, 0x8080) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000540)={'erspan0\x00', &(0x7f00000004c0)={'sit0\x00', 0x0, 0x80, 0x80, 0x20, 0xfffffffd, {{0x16, 0x4, 0x1, 0x17, 0x58, 0x66, 0x0, 0x80, 0x29, 0x0, @rand_addr=0x64010101, @broadcast, {[@end, @timestamp_addr={0x44, 0x3c, 0xb6, 0x1, 0x6, [{@remote}, {@private=0xa010100, 0x3}, {@multicast1, 0x1}, {@dev={0xac, 0x14, 0x14, 0x42}, 0xa04}, {@dev={0xac, 0x14, 0x14, 0x21}, 0x401}, {@local, 0x40}, {@empty, 0x2}]}, @ra={0x94, 0x4, 0x1}]}}}}}) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/module/comedi', 0x450c40, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x1d, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000410900009d11000080000000470410000400000085200000030000001800000004000000000000003f000000180000008c9f00000000000004000000d500e0ff10000000183900000100000000000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x3, 0x38, &(0x7f00000000c0)=""/56, 0x40f00, 0x2, '\x00', 0x0, 0x1b, r1, 0x8, &(0x7f0000000140)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000180)={0x4, 0x4, 0xf0, 0xffff2f23}, 0x10}, 0x80) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000280)={0x1a0, 0x0, 0x6b7a4d2eaf42947d, 0x70bd2d, 0x25dfdbfd, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0x7}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x25}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x9}, {0x6, 0x16, 0x7f}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x7}, {0x8, 0xb, 0x1800000}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0xfca0}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x4}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x10001}, {0x6, 0x16, 0x1000}, {0x5}, {0x6, 0x11, 0x6}, {0x8, 0xb, 0x57}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6, 0x16, 0x3}, {0x5}, {0x6, 0x11, 0xfff7}, {0x8, 0xb, 0x2bf}}]}, 0x1a0}}, 0x44000) 05:14:59 executing program 5: recvfrom$phonet(0xffffffffffffffff, &(0x7f0000000000)=""/50, 0x32, 0x0, &(0x7f0000000040)={0x23, 0x7f, 0x4, 0x5}, 0x10) sendto$phonet(0xffffffffffffffff, &(0x7f0000000080)="6e77d2905894bcec02351d5ae01f8d93b425630b151e0c94e561ef89", 0x1c, 0x0, &(0x7f00000000c0)={0x23, 0x1, 0x48, 0x1f}, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'batadv_slave_0\x00'}) 05:14:59 executing program 2: r0 = request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='%\'{+@\xe5\\,/&{\x00', 0xfffffffffffffffe) request_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='batadv\x00', r0) add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0, r0) add_key$fscrypt_provisioning(&(0x7f00000004c0), &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)={0x3, 0x0, @a}, 0x48, r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000340)='/sys/module/dm_mod', 0x400, 0x110) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x44, 0x0, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x5}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}]}, 0x44}}, 0xc000) 05:14:59 executing program 5: recvfrom$phonet(0xffffffffffffffff, &(0x7f0000000000)=""/50, 0x32, 0x0, &(0x7f0000000040)={0x23, 0x7f, 0x4, 0x5}, 0x10) r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000001c0)={'batadv_slave_0\x00'}) 05:14:59 executing program 2: r0 = request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='%\'{+@\xe5\\,/&{\x00', 0xfffffffffffffffe) request_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='batadv\x00', r0) add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0, r0) add_key$fscrypt_provisioning(&(0x7f00000004c0), &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)={0x3, 0x0, @a}, 0x48, r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000340)='/sys/module/dm_mod', 0x400, 0x110) 05:15:00 executing program 5: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000001c0)={'batadv_slave_0\x00'}) 05:15:00 executing program 2: r0 = request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='%\'{+@\xe5\\,/&{\x00', 0xfffffffffffffffe) request_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='batadv\x00', r0) add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0, r0) add_key$fscrypt_provisioning(&(0x7f00000004c0), &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)={0x3, 0x0, @a}, 0x48, r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) 05:15:00 executing program 1: bpf$MAP_CREATE(0x3, 0x0, 0x0) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:15:00 executing program 5: socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'batadv_slave_0\x00'}) 05:15:00 executing program 2: r0 = request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='%\'{+@\xe5\\,/&{\x00', 0xfffffffffffffffe) request_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='batadv\x00', r0) add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0, r0) add_key$fscrypt_provisioning(&(0x7f00000004c0), &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)={0x3, 0x0, @a}, 0x48, r0) socket$nl_generic(0x10, 0x3, 0x10) 05:15:00 executing program 3: openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/disk', 0x0, 0x18) 05:15:00 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0xe, 0x1, 0x5, 0x1, 0x8, 0x1, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0xb, &(0x7f0000000280)=@raw=[@cb_func={0x18, 0x6, 0x4, 0x0, 0x1}, @map_val={0x18, 0x4, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_fd={0x18, 0x2, 0x1, 0x0, r0}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x1}, @map_val={0x18, 0x3, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[r0, r0, r0, 0x1, r0, r0, r0, r0, r0, r0]}, 0x80) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000005c0)={r1, 0x0, 0x25, 0x2}, 0x10) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000680)='/sys/module/usblp', 0x408000, 0x4) sendto$phonet(r3, &(0x7f00000006c0)="36d700804cd32aec8dee27c2f1560bcfb94478d57d7a48a1628138ae97843749f45b753a0f562dd32a3db7f443ebbe99abb73f4e45742bedeeecd2d8204ef7b2440522f014cefc4b7475dbf362194a176dba1ad4361bcc4a3035ec1b332a22e65f0b5e833c099794e1f52d15aa5a8fce", 0x70, 0x808, &(0x7f0000000740)={0x23, 0xff, 0xb7, 0x5}, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000240)={'sit0\x00', &(0x7f0000000840)=ANY=[@ANYBLOB='erspan0\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0001070000000006000000094e000038006800000204907800000000e0000002890fc4ffffffffac1e000100000000441401e1ac1414aa00000001ac1e00017fffffff00178d468f423e7666f317261a1aefebc63ed732d177588602d084e7efa1495eab447c607d698849cc9ac87761bc125f51881b646d3f35b4"]}) 05:15:00 executing program 4: bpf$MAP_CREATE(0x4, &(0x7f0000002600), 0x48) socketpair(0x0, 0x0, 0x81, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4800}, 0x8080) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000540)={'erspan0\x00', &(0x7f00000004c0)={'sit0\x00', 0x0, 0x80, 0x80, 0x20, 0xfffffffd, {{0x16, 0x4, 0x1, 0x17, 0x58, 0x66, 0x0, 0x80, 0x29, 0x0, @rand_addr=0x64010101, @broadcast, {[@end, @timestamp_addr={0x44, 0x3c, 0xb6, 0x1, 0x6, [{@remote}, {@private=0xa010100, 0x3}, {@multicast1, 0x1}, {@dev={0xac, 0x14, 0x14, 0x42}, 0xa04}, {@dev={0xac, 0x14, 0x14, 0x21}, 0x401}, {@local, 0x40}, {@empty, 0x2}]}, @ra={0x94, 0x4, 0x1}]}}}}}) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/module/comedi', 0x450c40, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x1d, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000410900009d11000080000000470410000400000085200000030000001800000004000000000000003f000000180000008c9f00000000000004000000d500e0ff10000000183900000100000000000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x3, 0x38, &(0x7f00000000c0)=""/56, 0x40f00, 0x2, '\x00', 0x0, 0x1b, r1, 0x8, &(0x7f0000000140)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000180)={0x4, 0x4, 0xf0, 0xffff2f23}, 0x10}, 0x80) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000280)={0x1a0, 0x0, 0x6b7a4d2eaf42947d, 0x70bd2d, 0x25dfdbfd, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0x7}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x25}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x9}, {0x6, 0x16, 0x7f}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x7}, {0x8, 0xb, 0x1800000}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0xfca0}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x4}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x10001}, {0x6, 0x16, 0x1000}, {0x5}, {0x6, 0x11, 0x6}, {0x8, 0xb, 0x57}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6, 0x16, 0x3}, {0x5}, {0x6, 0x11, 0xfff7}, {0x8, 0xb, 0x2bf}}]}, 0x1a0}}, 0x44000) 05:15:00 executing program 5: socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'batadv_slave_0\x00'}) 05:15:00 executing program 5: socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'batadv_slave_0\x00'}) 05:15:00 executing program 2: r0 = request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='%\'{+@\xe5\\,/&{\x00', 0xfffffffffffffffe) request_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='batadv\x00', r0) add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0, r0) add_key$fscrypt_provisioning(&(0x7f00000004c0), &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)={0x3, 0x0, @a}, 0x48, r0) 05:15:00 executing program 5: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, 0x0) 05:15:00 executing program 2: r0 = request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='%\'{+@\xe5\\,/&{\x00', 0xfffffffffffffffe) request_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='batadv\x00', r0) add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0, r0) 05:15:00 executing program 5: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, 0x0) 05:15:00 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x0, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:15:00 executing program 2: r0 = request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='%\'{+@\xe5\\,/&{\x00', 0xfffffffffffffffe) request_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='batadv\x00', r0) 05:15:00 executing program 5: r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, 0x0) 05:15:00 executing program 3: openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/disk', 0x0, 0x18) 05:15:00 executing program 4: bpf$MAP_CREATE(0x4, &(0x7f0000002600), 0x48) socketpair(0x0, 0x0, 0x81, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4800}, 0x8080) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000540)={'erspan0\x00', &(0x7f00000004c0)={'sit0\x00', 0x0, 0x80, 0x80, 0x20, 0xfffffffd, {{0x16, 0x4, 0x1, 0x17, 0x58, 0x66, 0x0, 0x80, 0x29, 0x0, @rand_addr=0x64010101, @broadcast, {[@end, @timestamp_addr={0x44, 0x3c, 0xb6, 0x1, 0x6, [{@remote}, {@private=0xa010100, 0x3}, {@multicast1, 0x1}, {@dev={0xac, 0x14, 0x14, 0x42}, 0xa04}, {@dev={0xac, 0x14, 0x14, 0x21}, 0x401}, {@local, 0x40}, {@empty, 0x2}]}, @ra={0x94, 0x4, 0x1}]}}}}}) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/module/comedi', 0x450c40, 0x20) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x1d, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000410900009d11000080000000470410000400000085200000030000001800000004000000000000003f000000180000008c9f00000000000004000000d500e0ff10000000183900000100000000000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x3, 0x38, &(0x7f00000000c0)=""/56, 0x40f00, 0x2, '\x00', 0x0, 0x1b, r1, 0x8, &(0x7f0000000140)={0x3, 0x4}, 0x8, 0x10, &(0x7f0000000180)={0x4, 0x4, 0xf0, 0xffff2f23}, 0x10}, 0x80) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000280)={0x1a0, 0x0, 0x6b7a4d2eaf42947d, 0x70bd2d, 0x25dfdbfd, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0x7}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x25}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x9}, {0x6, 0x16, 0x7f}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x7}, {0x8, 0xb, 0x1800000}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0xfca0}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x4}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x10001}, {0x6, 0x16, 0x1000}, {0x5}, {0x6, 0x11, 0x6}, {0x8, 0xb, 0x57}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6, 0x16, 0x3}, {0x5}, {0x6, 0x11, 0xfff7}, {0x8, 0xb, 0x2bf}}]}, 0x1a0}}, 0x44000) 05:15:00 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0xe, 0x1, 0x5, 0x1, 0x8, 0x1, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0xb, &(0x7f0000000280)=@raw=[@cb_func={0x18, 0x6, 0x4, 0x0, 0x1}, @map_val={0x18, 0x4, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_fd={0x18, 0x2, 0x1, 0x0, r0}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x1}, @map_val={0x18, 0x3, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[r0, r0, r0, 0x1, r0, r0, r0, r0, r0, r0]}, 0x80) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000005c0)={r1, 0x0, 0x25, 0x2}, 0x10) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000680)='/sys/module/usblp', 0x408000, 0x4) sendto$phonet(r3, &(0x7f00000006c0)="36d700804cd32aec8dee27c2f1560bcfb94478d57d7a48a1628138ae97843749f45b753a0f562dd32a3db7f443ebbe99abb73f4e45742bedeeecd2d8204ef7b2440522f014cefc4b7475dbf362194a176dba1ad4361bcc4a3035ec1b332a22e65f0b5e833c099794e1f52d15aa5a8fce", 0x70, 0x808, &(0x7f0000000740)={0x23, 0xff, 0xb7, 0x5}, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) 05:15:00 executing program 5: bpf$MAP_CREATE(0x3, 0x0, 0x0) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:15:00 executing program 2: request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='%\'{+@\xe5\\,/&{\x00', 0xfffffffffffffffe) 05:15:01 executing program 5: r0 = request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='%\'{+@\xe5\\,/&{\x00', 0xfffffffffffffffe) request_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='batadv\x00', r0) add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0, r0) add_key$fscrypt_provisioning(&(0x7f00000004c0), &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)={0x3, 0x0, @a}, 0x48, r0) socket$nl_generic(0x10, 0x3, 0x10) 05:15:01 executing program 2: request_key(0x0, &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='%\'{+@\xe5\\,/&{\x00', 0xfffffffffffffffe) 05:15:01 executing program 2: request_key(0x0, &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='%\'{+@\xe5\\,/&{\x00', 0xfffffffffffffffe) 05:15:01 executing program 5: r0 = request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='%\'{+@\xe5\\,/&{\x00', 0xfffffffffffffffe) request_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='batadv\x00', r0) add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0, r0) add_key$fscrypt_provisioning(&(0x7f00000004c0), &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)={0x3, 0x0, @a}, 0x48, r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000340)='/sys/module/dm_mod', 0x400, 0x110) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x44, 0x0, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x5}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}]}, 0x44}}, 0xc000) syz_genetlink_get_family_id$batadv(&(0x7f0000000000), r1) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(r1, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r3, 0x400, 0x70bd26, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000004}, 0x4040004) 05:15:01 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x0, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:15:01 executing program 2: request_key(0x0, &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='%\'{+@\xe5\\,/&{\x00', 0xfffffffffffffffe) 05:15:01 executing program 3: openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/disk', 0x942, 0x0) 05:15:01 executing program 4: bpf$MAP_CREATE(0x4, &(0x7f0000002600), 0x48) socketpair(0x0, 0x0, 0x81, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4800}, 0x8080) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000540)={'erspan0\x00', &(0x7f00000004c0)={'sit0\x00', 0x0, 0x80, 0x80, 0x20, 0xfffffffd, {{0x16, 0x4, 0x1, 0x17, 0x58, 0x66, 0x0, 0x80, 0x29, 0x0, @rand_addr=0x64010101, @broadcast, {[@end, @timestamp_addr={0x44, 0x3c, 0xb6, 0x1, 0x6, [{@remote}, {@private=0xa010100, 0x3}, {@multicast1, 0x1}, {@dev={0xac, 0x14, 0x14, 0x42}, 0xa04}, {@dev={0xac, 0x14, 0x14, 0x21}, 0x401}, {@local, 0x40}, {@empty, 0x2}]}, @ra={0x94, 0x4, 0x1}]}}}}}) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/module/comedi', 0x450c40, 0x20) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r1, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000280)={0x1a0, 0x0, 0x6b7a4d2eaf42947d, 0x70bd2d, 0x25dfdbfd, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0x7}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x25}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x9}, {0x6, 0x16, 0x7f}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x7}, {0x8, 0xb, 0x1800000}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0xfca0}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x4}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x10001}, {0x6, 0x16, 0x1000}, {0x5}, {0x6, 0x11, 0x6}, {0x8, 0xb, 0x57}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6, 0x16, 0x3}, {0x5}, {0x6, 0x11, 0xfff7}, {0x8, 0xb, 0x2bf}}]}, 0x1a0}}, 0x44000) 05:15:01 executing program 5: r0 = request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='%\'{+@\xe5\\,/&{\x00', 0xfffffffffffffffe) request_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='batadv\x00', r0) add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0, r0) add_key$fscrypt_provisioning(&(0x7f00000004c0), &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)={0x3, 0x0, @a}, 0x48, r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000340)='/sys/module/dm_mod', 0x400, 0x110) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x44, 0x0, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x5}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}]}, 0x44}}, 0xc000) syz_genetlink_get_family_id$batadv(&(0x7f0000000000), r1) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(r1, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r3, 0x400, 0x70bd26, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000004}, 0x4040004) 05:15:01 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0xe, 0x1, 0x5, 0x1, 0x8, 0x1, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0xb, &(0x7f0000000280)=@raw=[@cb_func={0x18, 0x6, 0x4, 0x0, 0x1}, @map_val={0x18, 0x4, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_fd={0x18, 0x2, 0x1, 0x0, r0}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x1}, @map_val={0x18, 0x3, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[r0, r0, r0, 0x1, r0, r0, r0, r0, r0, r0]}, 0x80) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000005c0)={r1, 0x0, 0x25, 0x2}, 0x10) pipe2$watch_queue(&(0x7f0000000380), 0x80) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000680)='/sys/module/usblp', 0x408000, 0x4) sendto$phonet(r2, &(0x7f00000006c0)="36d700804cd32aec8dee27c2f1560bcfb94478d57d7a48a1628138ae97843749f45b753a0f562dd32a3db7f443ebbe99abb73f4e45742bedeeecd2d8204ef7b2440522f014cefc4b7475dbf362194a176dba1ad4361bcc4a3035ec1b332a22e65f0b5e833c099794e1f52d15aa5a8fce", 0x70, 0x808, &(0x7f0000000740)={0x23, 0xff, 0xb7, 0x5}, 0x10) 05:15:01 executing program 2: request_key(&(0x7f0000000140)='dns_resolver\x00', 0x0, &(0x7f00000001c0)='%\'{+@\xe5\\,/&{\x00', 0xfffffffffffffffe) 05:15:01 executing program 2: request_key(&(0x7f0000000140)='dns_resolver\x00', 0x0, &(0x7f00000001c0)='%\'{+@\xe5\\,/&{\x00', 0xfffffffffffffffe) 05:15:01 executing program 2: request_key(&(0x7f0000000140)='dns_resolver\x00', 0x0, &(0x7f00000001c0)='%\'{+@\xe5\\,/&{\x00', 0xfffffffffffffffe) 05:15:01 executing program 2: request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0xfffffffffffffffe) 05:15:01 executing program 5: r0 = request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='%\'{+@\xe5\\,/&{\x00', 0xfffffffffffffffe) request_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='batadv\x00', r0) add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0, r0) add_key$fscrypt_provisioning(&(0x7f00000004c0), &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)={0x3, 0x0, @a}, 0x48, r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000340)='/sys/module/dm_mod', 0x400, 0x110) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x44, 0x0, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x5}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}]}, 0x44}}, 0xc000) syz_genetlink_get_family_id$batadv(&(0x7f0000000000), r1) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) sendmsg$NL80211_CMD_STOP_P2P_DEVICE(r1, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r3, 0x400, 0x70bd26, 0x25dfdbfc, {{}, {@val={0x8}, @void}}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000004}, 0x4040004) 05:15:01 executing program 2: request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0xfffffffffffffffe) 05:15:02 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x0, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:15:02 executing program 2: request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0xfffffffffffffffe) 05:15:02 executing program 5: r0 = request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='%\'{+@\xe5\\,/&{\x00', 0xfffffffffffffffe) request_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='batadv\x00', r0) add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0, r0) add_key$fscrypt_provisioning(&(0x7f00000004c0), &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)={0x3, 0x0, @a}, 0x48, r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000340)='/sys/module/dm_mod', 0x400, 0x110) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x44, 0x0, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x5}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}]}, 0x44}}, 0xc000) syz_genetlink_get_family_id$batadv(&(0x7f0000000000), r1) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) 05:15:02 executing program 3: getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:15:02 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0xe, 0x1, 0x5, 0x1, 0x8, 0x1, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0xb, &(0x7f0000000280)=@raw=[@cb_func={0x18, 0x6, 0x4, 0x0, 0x1}, @map_val={0x18, 0x4, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_fd={0x18, 0x2, 0x1, 0x0, r0}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x1}, @map_val={0x18, 0x3, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[r0, r0, r0, 0x1, r0, r0, r0, r0, r0, r0]}, 0x80) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000005c0)={r1, 0x0, 0x25, 0x2}, 0x10) pipe2$watch_queue(&(0x7f0000000380), 0x80) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000680)='/sys/module/usblp', 0x408000, 0x4) 05:15:02 executing program 4: bpf$MAP_CREATE(0x4, &(0x7f0000002600), 0x48) socketpair(0x0, 0x0, 0x81, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4800}, 0x8080) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000540)={'erspan0\x00', &(0x7f00000004c0)={'sit0\x00', 0x0, 0x80, 0x80, 0x20, 0xfffffffd, {{0x16, 0x4, 0x1, 0x17, 0x58, 0x66, 0x0, 0x80, 0x29, 0x0, @rand_addr=0x64010101, @broadcast, {[@end, @timestamp_addr={0x44, 0x3c, 0xb6, 0x1, 0x6, [{@remote}, {@private=0xa010100, 0x3}, {@multicast1, 0x1}, {@dev={0xac, 0x14, 0x14, 0x42}, 0xa04}, {@dev={0xac, 0x14, 0x14, 0x21}, 0x401}, {@local, 0x40}, {@empty, 0x2}]}, @ra={0x94, 0x4, 0x1}]}}}}}) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r1, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000280)={0x1a0, 0x0, 0x6b7a4d2eaf42947d, 0x70bd2d, 0x25dfdbfd, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0x7}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x25}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x9}, {0x6, 0x16, 0x7f}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x7}, {0x8, 0xb, 0x1800000}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0xfca0}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x4}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x10001}, {0x6, 0x16, 0x1000}, {0x5}, {0x6, 0x11, 0x6}, {0x8, 0xb, 0x57}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6, 0x16, 0x3}, {0x5}, {0x6, 0x11, 0xfff7}, {0x8, 0xb, 0x2bf}}]}, 0x1a0}}, 0x44000) 05:15:02 executing program 2: recvfrom$phonet(0xffffffffffffffff, &(0x7f0000000000)=""/50, 0x32, 0x0, &(0x7f0000000040)={0x23, 0x7f, 0x4, 0x5}, 0x10) sendto$phonet(0xffffffffffffffff, &(0x7f0000000080)="6e77d2905894bcec02351d5ae01f8d93b425630b151e0c94e561ef89", 0x1c, 0x0, &(0x7f00000000c0)={0x23, 0x1, 0x48, 0x1f}, 0x10) r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000001c0)={'batadv_slave_0\x00'}) recvfrom$phonet(0xffffffffffffffff, &(0x7f0000000100)=""/80, 0x50, 0x1, &(0x7f0000000180)={0x23, 0x56, 0x95, 0x80}, 0x10) bpf$MAP_CREATE(0x4, &(0x7f0000002600), 0x48) 05:15:02 executing program 2: recvfrom$phonet(0xffffffffffffffff, &(0x7f0000000000)=""/50, 0x32, 0x0, &(0x7f0000000040)={0x23, 0x7f, 0x4, 0x5}, 0x10) sendto$phonet(0xffffffffffffffff, &(0x7f0000000080)="6e77d2905894bcec02351d5ae01f8d93b425630b151e0c94e561ef89", 0x1c, 0x0, &(0x7f00000000c0)={0x23, 0x1, 0x48, 0x1f}, 0x10) r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000001c0)={'batadv_slave_0\x00'}) recvfrom$phonet(0xffffffffffffffff, &(0x7f0000000100)=""/80, 0x50, 0x1, &(0x7f0000000180)={0x23, 0x56, 0x95, 0x80}, 0x10) bpf$MAP_CREATE(0x4, &(0x7f0000002600), 0x48) 05:15:02 executing program 2: recvfrom$phonet(0xffffffffffffffff, &(0x7f0000000000)=""/50, 0x32, 0x0, &(0x7f0000000040)={0x23, 0x7f, 0x4, 0x5}, 0x10) sendto$phonet(0xffffffffffffffff, &(0x7f0000000080)="6e77d2905894bcec02351d5ae01f8d93b425630b151e0c94e561ef89", 0x1c, 0x0, &(0x7f00000000c0)={0x23, 0x1, 0x48, 0x1f}, 0x10) r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000001c0)={'batadv_slave_0\x00'}) recvfrom$phonet(0xffffffffffffffff, &(0x7f0000000100)=""/80, 0x50, 0x1, &(0x7f0000000180)={0x23, 0x56, 0x95, 0x80}, 0x10) bpf$MAP_CREATE(0x4, &(0x7f0000002600), 0x48) 05:15:02 executing program 5: r0 = request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='%\'{+@\xe5\\,/&{\x00', 0xfffffffffffffffe) request_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='batadv\x00', r0) add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0, r0) add_key$fscrypt_provisioning(&(0x7f00000004c0), &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)={0x3, 0x0, @a}, 0x48, r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000340)='/sys/module/dm_mod', 0x400, 0x110) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x44, 0x0, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x5}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}]}, 0x44}}, 0xc000) syz_genetlink_get_family_id$batadv(&(0x7f0000000000), r1) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r1) 05:15:02 executing program 2: recvfrom$phonet(0xffffffffffffffff, &(0x7f0000000000)=""/50, 0x32, 0x0, &(0x7f0000000040)={0x23, 0x7f, 0x4, 0x5}, 0x10) sendto$phonet(0xffffffffffffffff, &(0x7f0000000080)="6e77d2905894bcec02351d5ae01f8d93b425630b151e0c94e561ef89", 0x1c, 0x0, &(0x7f00000000c0)={0x23, 0x1, 0x48, 0x1f}, 0x10) r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000001c0)={'batadv_slave_0\x00'}) recvfrom$phonet(0xffffffffffffffff, &(0x7f0000000100)=""/80, 0x50, 0x1, &(0x7f0000000180)={0x23, 0x56, 0x95, 0x80}, 0x10) 05:15:02 executing program 2: recvfrom$phonet(0xffffffffffffffff, &(0x7f0000000000)=""/50, 0x32, 0x0, &(0x7f0000000040)={0x23, 0x7f, 0x4, 0x5}, 0x10) sendto$phonet(0xffffffffffffffff, &(0x7f0000000080)="6e77d2905894bcec02351d5ae01f8d93b425630b151e0c94e561ef89", 0x1c, 0x0, &(0x7f00000000c0)={0x23, 0x1, 0x48, 0x1f}, 0x10) r0 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000001c0)={'batadv_slave_0\x00'}) 05:15:03 executing program 2: recvfrom$phonet(0xffffffffffffffff, &(0x7f0000000000)=""/50, 0x32, 0x0, &(0x7f0000000040)={0x23, 0x7f, 0x4, 0x5}, 0x10) sendto$phonet(0xffffffffffffffff, &(0x7f0000000080)="6e77d2905894bcec02351d5ae01f8d93b425630b151e0c94e561ef89", 0x1c, 0x0, &(0x7f00000000c0)={0x23, 0x1, 0x48, 0x1f}, 0x10) socket$inet_mptcp(0x2, 0x1, 0x106) 05:15:03 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:15:03 executing program 5: r0 = request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='%\'{+@\xe5\\,/&{\x00', 0xfffffffffffffffe) request_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='batadv\x00', r0) add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0, r0) add_key$fscrypt_provisioning(&(0x7f00000004c0), &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)={0x3, 0x0, @a}, 0x48, r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000340)='/sys/module/dm_mod', 0x400, 0x110) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x44, 0x0, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x5}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}]}, 0x44}}, 0xc000) syz_genetlink_get_family_id$batadv(&(0x7f0000000000), r1) 05:15:03 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/iscsi_host', 0x20002, 0x8) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') fcntl$getownex(r1, 0x10, &(0x7f0000000240)) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_CREATE(0x5, &(0x7f0000002600)=@bloom_filter={0x1e, 0xffffffff, 0x9, 0x7, 0x132, r2, 0x0, '\x00', 0x0, r0, 0x1, 0x0, 0x4, 0xa}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0xff58, 0x7, 0x40, 0x2, r0, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x1, 0x3}, 0x48) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_clone(0x800000, &(0x7f00000002c0)="962afe0659a024b61a539cc3d083e1ae3f020ed204b257af91609a221979e1bff9c3ed357339ce58c0759e1c2fecb126c7514a9362073dee5afccf378aa3f251f7768c60daf10c7ad0f9e043abab91467eaccaa924ff1b573130dd0b45fa5787aeb37807c10befc57e18c0cb7330531211ef4f79", 0x74, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="92e6e181de94e25b7673b0ea39d29d9296b1b0c8c5a878f069df1e9af52b9318141fffd5dee425aae6abcdbfcc34a546a15627cb973b8410e115e6241e91daa9c8e1812033a13e8799797d9d268ee639e37428e40a33fa9951c6dd0ec2e9da8c") ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'wpan3\x00', 0x0}) sysfs$3(0x3) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r4, &(0x7f0000000640)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, 0x0, 0x2, 0x70bd2b, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_SEC_LEVEL={0x1c, 0x22, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x2}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x3}, @NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x2}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r6}]}, 0x44}, 0x1, 0x0, 0x0, 0x10050}, 0x0) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000500)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="38010000", @ANYRES16=0x0, @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100020000000c00060003000000ff070000"], 0x38}, 0x1, 0x0, 0x0, 0x450}, 0x20000000) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000080)="43ed249569a588cd1b5f7f41f0bee0f107ebc0ba7e13c5c5f3b90830de48773281352f9e0f9775a0101ef68b25bd29db9b243e8313eec234692cacaf8b1e4682586caa6665efb7cdd5772854", 0x4c, r3}, 0x68) 05:15:03 executing program 4: bpf$MAP_CREATE(0x4, &(0x7f0000002600), 0x48) socketpair(0x0, 0x0, 0x81, &(0x7f0000000200)={0xffffffffffffffff}) sendmsg$TIPC_CMD_GET_NETID(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, 0x0, 0x0, 0x70bd28, 0x25dfdbfb, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4800}, 0x8080) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r1, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000280)={0x1a0, 0x0, 0x6b7a4d2eaf42947d, 0x70bd2d, 0x25dfdbfd, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0x7}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x25}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x9}, {0x6, 0x16, 0x7f}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x7}, {0x8, 0xb, 0x1800000}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0xfca0}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x4}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x10001}, {0x6, 0x16, 0x1000}, {0x5}, {0x6, 0x11, 0x6}, {0x8, 0xb, 0x57}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6, 0x16, 0x3}, {0x5}, {0x6, 0x11, 0xfff7}, {0x8, 0xb, 0x2bf}}]}, 0x1a0}}, 0x44000) 05:15:03 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0xe, 0x1, 0x5, 0x1, 0x8, 0x1, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0xb, &(0x7f0000000280)=@raw=[@cb_func={0x18, 0x6, 0x4, 0x0, 0x1}, @map_val={0x18, 0x4, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_fd={0x18, 0x2, 0x1, 0x0, r0}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x1}, @map_val={0x18, 0x3, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[r0, r0, r0, 0x1, r0, r0, r0, r0, r0, r0]}, 0x80) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000005c0)={r1, 0x0, 0x25, 0x2}, 0x10) pipe2$watch_queue(&(0x7f0000000380), 0x80) 05:15:03 executing program 2: recvfrom$phonet(0xffffffffffffffff, &(0x7f0000000000)=""/50, 0x32, 0x0, &(0x7f0000000040)={0x23, 0x7f, 0x4, 0x5}, 0x10) socket$inet_mptcp(0x2, 0x1, 0x106) 05:15:03 executing program 2: socket$inet_mptcp(0x2, 0x1, 0x106) 05:15:03 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/iscsi_host', 0x20002, 0x8) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') fcntl$getownex(r1, 0x10, &(0x7f0000000240)) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_CREATE(0x5, &(0x7f0000002600)=@bloom_filter={0x1e, 0xffffffff, 0x9, 0x7, 0x132, r2, 0x0, '\x00', 0x0, r0, 0x1, 0x0, 0x4, 0xa}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0xff58, 0x7, 0x40, 0x2, r0, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x1, 0x3}, 0x48) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_clone(0x800000, &(0x7f00000002c0)="962afe0659a024b61a539cc3d083e1ae3f020ed204b257af91609a221979e1bff9c3ed357339ce58c0759e1c2fecb126c7514a9362073dee5afccf378aa3f251f7768c60daf10c7ad0f9e043abab91467eaccaa924ff1b573130dd0b45fa5787aeb37807c10befc57e18c0cb7330531211ef4f79", 0x74, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="92e6e181de94e25b7673b0ea39d29d9296b1b0c8c5a878f069df1e9af52b9318141fffd5dee425aae6abcdbfcc34a546a15627cb973b8410e115e6241e91daa9c8e1812033a13e8799797d9d268ee639e37428e40a33fa9951c6dd0ec2e9da8c") ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'wpan3\x00', 0x0}) sysfs$3(0x3) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r4, &(0x7f0000000640)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, 0x0, 0x2, 0x70bd2b, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_SEC_LEVEL={0x1c, 0x22, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x2}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x3}, @NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x2}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r6}]}, 0x44}, 0x1, 0x0, 0x0, 0x10050}, 0x0) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000500)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="38010000", @ANYRES16=0x0, @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100020000000c00060003000000ff070000"], 0x38}, 0x1, 0x0, 0x0, 0x450}, 0x20000000) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000080)="43ed249569a588cd1b5f7f41f0bee0f107ebc0ba7e13c5c5f3b90830de48773281352f9e0f9775a0101ef68b25bd29db9b243e8313eec234692cacaf8b1e4682586caa6665efb7cdd5772854", 0x4c, r3}, 0x68) 05:15:03 executing program 5: r0 = request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='%\'{+@\xe5\\,/&{\x00', 0xfffffffffffffffe) request_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='batadv\x00', r0) add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0, r0) add_key$fscrypt_provisioning(&(0x7f00000004c0), &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)={0x3, 0x0, @a}, 0x48, r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000340)='/sys/module/dm_mod', 0x400, 0x110) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x44, 0x0, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x5}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}]}, 0x44}}, 0xc000) 05:15:03 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/iscsi_host', 0x20002, 0x8) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') fcntl$getownex(r1, 0x10, &(0x7f0000000240)) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_CREATE(0x5, &(0x7f0000002600)=@bloom_filter={0x1e, 0xffffffff, 0x9, 0x7, 0x132, r2, 0x0, '\x00', 0x0, r0, 0x1, 0x0, 0x4, 0xa}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0xff58, 0x7, 0x40, 0x2, r0, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x1, 0x3}, 0x48) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_clone(0x800000, &(0x7f00000002c0)="962afe0659a024b61a539cc3d083e1ae3f020ed204b257af91609a221979e1bff9c3ed357339ce58c0759e1c2fecb126c7514a9362073dee5afccf378aa3f251f7768c60daf10c7ad0f9e043abab91467eaccaa924ff1b573130dd0b45fa5787aeb37807c10befc57e18c0cb7330531211ef4f79", 0x74, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="92e6e181de94e25b7673b0ea39d29d9296b1b0c8c5a878f069df1e9af52b9318141fffd5dee425aae6abcdbfcc34a546a15627cb973b8410e115e6241e91daa9c8e1812033a13e8799797d9d268ee639e37428e40a33fa9951c6dd0ec2e9da8c") ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'wpan3\x00', 0x0}) sysfs$3(0x3) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r4, &(0x7f0000000640)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, 0x0, 0x2, 0x70bd2b, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_SEC_LEVEL={0x1c, 0x22, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x2}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x3}, @NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x2}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r6}]}, 0x44}, 0x1, 0x0, 0x0, 0x10050}, 0x0) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000500)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="38010000", @ANYRES16=0x0, @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100020000000c00060003000000ff070000"], 0x38}, 0x1, 0x0, 0x0, 0x450}, 0x20000000) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000080)="43ed249569a588cd1b5f7f41f0bee0f107ebc0ba7e13c5c5f3b90830de48773281352f9e0f9775a0101ef68b25bd29db9b243e8313eec234692cacaf8b1e4682586caa6665efb7cdd5772854", 0x4c, r3}, 0x68) 05:15:03 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/iscsi_host', 0x20002, 0x8) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') fcntl$getownex(r1, 0x10, &(0x7f0000000240)) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_CREATE(0x5, &(0x7f0000002600)=@bloom_filter={0x1e, 0xffffffff, 0x9, 0x7, 0x132, r2, 0x0, '\x00', 0x0, r0, 0x1, 0x0, 0x4, 0xa}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0xff58, 0x7, 0x40, 0x2, r0, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x1, 0x3}, 0x48) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_clone(0x800000, &(0x7f00000002c0)="962afe0659a024b61a539cc3d083e1ae3f020ed204b257af91609a221979e1bff9c3ed357339ce58c0759e1c2fecb126c7514a9362073dee5afccf378aa3f251f7768c60daf10c7ad0f9e043abab91467eaccaa924ff1b573130dd0b45fa5787aeb37807c10befc57e18c0cb7330531211ef4f79", 0x74, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="92e6e181de94e25b7673b0ea39d29d9296b1b0c8c5a878f069df1e9af52b9318141fffd5dee425aae6abcdbfcc34a546a15627cb973b8410e115e6241e91daa9c8e1812033a13e8799797d9d268ee639e37428e40a33fa9951c6dd0ec2e9da8c") ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'wpan3\x00', 0x0}) sysfs$3(0x3) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r4, &(0x7f0000000640)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, 0x0, 0x2, 0x70bd2b, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_SEC_LEVEL={0x1c, 0x22, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x2}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x3}, @NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x2}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r6}]}, 0x44}, 0x1, 0x0, 0x0, 0x10050}, 0x0) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000500)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="38010000", @ANYRES16=0x0, @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100020000000c00060003000000ff070000"], 0x38}, 0x1, 0x0, 0x0, 0x450}, 0x20000000) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000080)="43ed249569a588cd1b5f7f41f0bee0f107ebc0ba7e13c5c5f3b90830de48773281352f9e0f9775a0101ef68b25bd29db9b243e8313eec234692cacaf8b1e4682586caa6665efb7cdd5772854", 0x4c, r3}, 0x68) 05:15:03 executing program 5: r0 = request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='%\'{+@\xe5\\,/&{\x00', 0xfffffffffffffffe) request_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='batadv\x00', r0) add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0, r0) add_key$fscrypt_provisioning(&(0x7f00000004c0), &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)={0x3, 0x0, @a}, 0x48, r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000340)='/sys/module/dm_mod', 0x400, 0x110) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x44, 0x0, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x5}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x5}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}]}, 0x44}}, 0xc000) 05:15:03 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:15:03 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/iscsi_host', 0x20002, 0x8) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') fcntl$getownex(r1, 0x10, &(0x7f0000000240)) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_CREATE(0x5, &(0x7f0000002600)=@bloom_filter={0x1e, 0xffffffff, 0x9, 0x7, 0x132, r2, 0x0, '\x00', 0x0, r0, 0x1, 0x0, 0x4, 0xa}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0xff58, 0x7, 0x40, 0x2, r0, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x1, 0x3}, 0x48) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_clone(0x800000, &(0x7f00000002c0)="962afe0659a024b61a539cc3d083e1ae3f020ed204b257af91609a221979e1bff9c3ed357339ce58c0759e1c2fecb126c7514a9362073dee5afccf378aa3f251f7768c60daf10c7ad0f9e043abab91467eaccaa924ff1b573130dd0b45fa5787aeb37807c10befc57e18c0cb7330531211ef4f79", 0x74, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="92e6e181de94e25b7673b0ea39d29d9296b1b0c8c5a878f069df1e9af52b9318141fffd5dee425aae6abcdbfcc34a546a15627cb973b8410e115e6241e91daa9c8e1812033a13e8799797d9d268ee639e37428e40a33fa9951c6dd0ec2e9da8c") ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'wpan3\x00', 0x0}) sysfs$3(0x3) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r3, &(0x7f0000000640)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, 0x0, 0x2, 0x70bd2b, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_SEC_LEVEL={0x1c, 0x22, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x2}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x3}, @NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x2}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r5}]}, 0x44}, 0x1, 0x0, 0x0, 0x10050}, 0x0) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r3, &(0x7f0000000500)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="38010000", @ANYRES16=0x0, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="08000300", @ANYRES32=r5, @ANYBLOB="08000100020000000c00060003000000ff070000"], 0x38}, 0x1, 0x0, 0x0, 0x450}, 0x20000000) 05:15:03 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0xe, 0x1, 0x5, 0x1, 0x8, 0x1, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0xb, &(0x7f0000000280)=@raw=[@cb_func={0x18, 0x6, 0x4, 0x0, 0x1}, @map_val={0x18, 0x4, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_fd={0x18, 0x2, 0x1, 0x0, r0}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x1}, @map_val={0x18, 0x3, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[r0, r0, r0, 0x1, r0, r0, r0, r0, r0, r0]}, 0x80) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000005c0)={r1, 0x0, 0x25, 0x2}, 0x10) 05:15:03 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/iscsi_host', 0x20002, 0x8) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') fcntl$getownex(r1, 0x10, &(0x7f0000000240)) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_CREATE(0x5, &(0x7f0000002600)=@bloom_filter={0x1e, 0xffffffff, 0x9, 0x7, 0x132, r2, 0x0, '\x00', 0x0, r0, 0x1, 0x0, 0x4, 0xa}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0xff58, 0x7, 0x40, 0x2, r0, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x1, 0x3}, 0x48) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_clone(0x800000, &(0x7f00000002c0)="962afe0659a024b61a539cc3d083e1ae3f020ed204b257af91609a221979e1bff9c3ed357339ce58c0759e1c2fecb126c7514a9362073dee5afccf378aa3f251f7768c60daf10c7ad0f9e043abab91467eaccaa924ff1b573130dd0b45fa5787aeb37807c10befc57e18c0cb7330531211ef4f79", 0x74, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="92e6e181de94e25b7673b0ea39d29d9296b1b0c8c5a878f069df1e9af52b9318141fffd5dee425aae6abcdbfcc34a546a15627cb973b8410e115e6241e91daa9c8e1812033a13e8799797d9d268ee639e37428e40a33fa9951c6dd0ec2e9da8c") ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'wpan3\x00', 0x0}) sysfs$3(0x3) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r4, &(0x7f0000000640)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, 0x0, 0x2, 0x70bd2b, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_SEC_LEVEL={0x1c, 0x22, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x2}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x3}, @NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x2}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r6}]}, 0x44}, 0x1, 0x0, 0x0, 0x10050}, 0x0) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000500)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="38010000", @ANYRES16=0x0, @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100020000000c00060003000000ff070000"], 0x38}, 0x1, 0x0, 0x0, 0x450}, 0x20000000) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000080)="43ed249569a588cd1b5f7f41f0bee0f107ebc0ba7e13c5c5f3b90830de48773281352f9e0f9775a0101ef68b25bd29db9b243e8313eec234692cacaf8b1e4682586caa6665efb7cdd5772854", 0x4c, r3}, 0x68) 05:15:03 executing program 4: bpf$MAP_CREATE(0x4, &(0x7f0000002600), 0x48) socketpair(0x0, 0x0, 0x81, &(0x7f0000000200)) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r0, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000280)={0x1a0, 0x0, 0x6b7a4d2eaf42947d, 0x70bd2d, 0x25dfdbfd, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0x7}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x25}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x9}, {0x6, 0x16, 0x7f}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x7}, {0x8, 0xb, 0x1800000}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0xfca0}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x4}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x10001}, {0x6, 0x16, 0x1000}, {0x5}, {0x6, 0x11, 0x6}, {0x8, 0xb, 0x57}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6, 0x16, 0x3}, {0x5}, {0x6, 0x11, 0xfff7}, {0x8, 0xb, 0x2bf}}]}, 0x1a0}}, 0x44000) 05:15:03 executing program 5: r0 = request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='%\'{+@\xe5\\,/&{\x00', 0xfffffffffffffffe) request_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='batadv\x00', r0) add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0, r0) add_key$fscrypt_provisioning(&(0x7f00000004c0), &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)={0x3, 0x0, @a}, 0x48, r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000340)='/sys/module/dm_mod', 0x400, 0x110) 05:15:03 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/iscsi_host', 0x20002, 0x8) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') fcntl$getownex(r1, 0x10, &(0x7f0000000240)) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_CREATE(0x5, &(0x7f0000002600)=@bloom_filter={0x1e, 0xffffffff, 0x9, 0x7, 0x132, r2, 0x0, '\x00', 0x0, r0, 0x1, 0x0, 0x4, 0xa}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0xff58, 0x7, 0x40, 0x2, r0, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x1, 0x3}, 0x48) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_clone(0x800000, &(0x7f00000002c0)="962afe0659a024b61a539cc3d083e1ae3f020ed204b257af91609a221979e1bff9c3ed357339ce58c0759e1c2fecb126c7514a9362073dee5afccf378aa3f251f7768c60daf10c7ad0f9e043abab91467eaccaa924ff1b573130dd0b45fa5787aeb37807c10befc57e18c0cb7330531211ef4f79", 0x74, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="92e6e181de94e25b7673b0ea39d29d9296b1b0c8c5a878f069df1e9af52b9318141fffd5dee425aae6abcdbfcc34a546a15627cb973b8410e115e6241e91daa9c8e1812033a13e8799797d9d268ee639e37428e40a33fa9951c6dd0ec2e9da8c") ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'wpan3\x00', 0x0}) sysfs$3(0x3) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r3, &(0x7f0000000640)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, 0x0, 0x2, 0x70bd2b, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_SEC_LEVEL={0x1c, 0x22, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x2}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x3}, @NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x2}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}]}, 0x44}, 0x1, 0x0, 0x0, 0x10050}, 0x0) 05:15:03 executing program 5: r0 = request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='%\'{+@\xe5\\,/&{\x00', 0xfffffffffffffffe) request_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='batadv\x00', r0) add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0, r0) add_key$fscrypt_provisioning(&(0x7f00000004c0), &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)={0x3, 0x0, @a}, 0x48, r0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) 05:15:03 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/iscsi_host', 0x20002, 0x8) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') fcntl$getownex(r1, 0x10, &(0x7f0000000240)) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_CREATE(0x5, &(0x7f0000002600)=@bloom_filter={0x1e, 0xffffffff, 0x9, 0x7, 0x132, r2, 0x0, '\x00', 0x0, r0, 0x1, 0x0, 0x4, 0xa}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0xff58, 0x7, 0x40, 0x2, r0, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x1, 0x3}, 0x48) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_clone(0x800000, &(0x7f00000002c0)="962afe0659a024b61a539cc3d083e1ae3f020ed204b257af91609a221979e1bff9c3ed357339ce58c0759e1c2fecb126c7514a9362073dee5afccf378aa3f251f7768c60daf10c7ad0f9e043abab91467eaccaa924ff1b573130dd0b45fa5787aeb37807c10befc57e18c0cb7330531211ef4f79", 0x74, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="92e6e181de94e25b7673b0ea39d29d9296b1b0c8c5a878f069df1e9af52b9318141fffd5dee425aae6abcdbfcc34a546a15627cb973b8410e115e6241e91daa9c8e1812033a13e8799797d9d268ee639e37428e40a33fa9951c6dd0ec2e9da8c") ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'wpan3\x00'}) sysfs$3(0x3) 05:15:03 executing program 5: r0 = request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='%\'{+@\xe5\\,/&{\x00', 0xfffffffffffffffe) request_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='batadv\x00', r0) add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0, r0) add_key$fscrypt_provisioning(&(0x7f00000004c0), &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)={0x3, 0x0, @a}, 0x48, r0) socket$nl_generic(0x10, 0x3, 0x10) 05:15:04 executing program 5: r0 = request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='%\'{+@\xe5\\,/&{\x00', 0xfffffffffffffffe) request_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='batadv\x00', r0) add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0, r0) add_key$fscrypt_provisioning(&(0x7f00000004c0), &(0x7f0000000500)={'syz', 0x2}, &(0x7f0000000540)={0x3, 0x0, @a}, 0x48, r0) 05:15:04 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0xe, 0x1, 0x5, 0x1, 0x8, 0x1, 0x20, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x2}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0xb, &(0x7f0000000280)=@raw=[@cb_func={0x18, 0x6, 0x4, 0x0, 0x1}, @map_val={0x18, 0x4, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_fd={0x18, 0x2, 0x1, 0x0, r0}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x1}, @map_val={0x18, 0x3, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[r0, r0, r0, 0x1, r0, r0, r0, r0, r0, r0]}, 0x80) 05:15:04 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:15:04 executing program 5: r0 = request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='%\'{+@\xe5\\,/&{\x00', 0xfffffffffffffffe) request_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='batadv\x00', r0) add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0, r0) 05:15:04 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/iscsi_host', 0x20002, 0x8) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') fcntl$getownex(r1, 0x10, &(0x7f0000000240)) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_CREATE(0x5, &(0x7f0000002600)=@bloom_filter={0x1e, 0xffffffff, 0x9, 0x7, 0x132, r2, 0x0, '\x00', 0x0, r0, 0x1, 0x0, 0x4, 0xa}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0xff58, 0x7, 0x40, 0x2, r0, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x1, 0x3}, 0x48) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_clone(0x800000, &(0x7f00000002c0)="962afe0659a024b61a539cc3d083e1ae3f020ed204b257af91609a221979e1bff9c3ed357339ce58c0759e1c2fecb126c7514a9362073dee5afccf378aa3f251f7768c60daf10c7ad0f9e043abab91467eaccaa924ff1b573130dd0b45fa5787aeb37807c10befc57e18c0cb7330531211ef4f79", 0x74, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="92e6e181de94e25b7673b0ea39d29d9296b1b0c8c5a878f069df1e9af52b9318141fffd5dee425aae6abcdbfcc34a546a15627cb973b8410e115e6241e91daa9c8e1812033a13e8799797d9d268ee639e37428e40a33fa9951c6dd0ec2e9da8c") ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'wpan3\x00'}) 05:15:04 executing program 4: bpf$MAP_CREATE(0x4, &(0x7f0000002600), 0x48) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r0, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000280)={0x1a0, 0x0, 0x6b7a4d2eaf42947d, 0x70bd2d, 0x25dfdbfd, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0x7}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x25}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x9}, {0x6, 0x16, 0x7f}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x7}, {0x8, 0xb, 0x1800000}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0xfca0}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x4}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x10001}, {0x6, 0x16, 0x1000}, {0x5}, {0x6, 0x11, 0x6}, {0x8, 0xb, 0x57}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6, 0x16, 0x3}, {0x5}, {0x6, 0x11, 0xfff7}, {0x8, 0xb, 0x2bf}}]}, 0x1a0}}, 0x44000) 05:15:04 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0xb, &(0x7f0000000280)=@raw=[@cb_func={0x18, 0x6, 0x4, 0x0, 0x1}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_fd={0x18, 0x2}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x1}, @map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1}], &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:04 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/iscsi_host', 0x20002, 0x8) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') fcntl$getownex(r1, 0x10, &(0x7f0000000240)) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_CREATE(0x5, &(0x7f0000002600)=@bloom_filter={0x1e, 0xffffffff, 0x9, 0x7, 0x132, r2, 0x0, '\x00', 0x0, r0, 0x1, 0x0, 0x4, 0xa}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0xff58, 0x7, 0x40, 0x2, r0, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x1, 0x3}, 0x48) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_clone(0x800000, &(0x7f00000002c0)="962afe0659a024b61a539cc3d083e1ae3f020ed204b257af91609a221979e1bff9c3ed357339ce58c0759e1c2fecb126c7514a9362073dee5afccf378aa3f251f7768c60daf10c7ad0f9e043abab91467eaccaa924ff1b573130dd0b45fa5787aeb37807c10befc57e18c0cb7330531211ef4f79", 0x74, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="92e6e181de94e25b7673b0ea39d29d9296b1b0c8c5a878f069df1e9af52b9318141fffd5dee425aae6abcdbfcc34a546a15627cb973b8410e115e6241e91daa9c8e1812033a13e8799797d9d268ee639e37428e40a33fa9951c6dd0ec2e9da8c") ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'wpan3\x00', 0x0}) sysfs$3(0x3) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r4, &(0x7f0000000640)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, 0x0, 0x2, 0x70bd2b, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_SEC_LEVEL={0x1c, 0x22, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x2}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x3}, @NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x2}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r6}]}, 0x44}, 0x1, 0x0, 0x0, 0x10050}, 0x0) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r4, &(0x7f0000000500)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="38010000", @ANYRES16=0x0, @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="08000100020000000c00060003000000ff070000"], 0x38}, 0x1, 0x0, 0x0, 0x450}, 0x20000000) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000080)="43ed249569a588cd1b5f7f41f0bee0f107ebc0ba7e13c5c5f3b90830de48773281352f9e0f9775a0101ef68b25bd29db9b243e8313eec234692cacaf8b1e4682586caa6665efb7cdd5772854", 0x4c, r3}, 0x68) 05:15:04 executing program 5: r0 = request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='%\'{+@\xe5\\,/&{\x00', 0xfffffffffffffffe) request_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000100)='batadv\x00', r0) 05:15:04 executing program 5: request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='%\'{+@\xe5\\,/&{\x00', 0xfffffffffffffffe) 05:15:04 executing program 5: request_key(0x0, &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='%\'{+@\xe5\\,/&{\x00', 0xfffffffffffffffe) 05:15:05 executing program 5: request_key(0x0, &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='%\'{+@\xe5\\,/&{\x00', 0xfffffffffffffffe) 05:15:05 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/iscsi_host', 0x20002, 0x8) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') fcntl$getownex(r1, 0x10, &(0x7f0000000240)) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_CREATE(0x5, &(0x7f0000002600)=@bloom_filter={0x1e, 0xffffffff, 0x9, 0x7, 0x132, r2, 0x0, '\x00', 0x0, r0, 0x1, 0x0, 0x4, 0xa}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0xff58, 0x7, 0x40, 0x2, r0, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x1, 0x3}, 0x48) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_clone(0x800000, &(0x7f00000002c0)="962afe0659a024b61a539cc3d083e1ae3f020ed204b257af91609a221979e1bff9c3ed357339ce58c0759e1c2fecb126c7514a9362073dee5afccf378aa3f251f7768c60daf10c7ad0f9e043abab91467eaccaa924ff1b573130dd0b45fa5787aeb37807c10befc57e18c0cb7330531211ef4f79", 0x74, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="92e6e181de94e25b7673b0ea39d29d9296b1b0c8c5a878f069df1e9af52b9318141fffd5dee425aae6abcdbfcc34a546a15627cb973b8410e115e6241e91daa9c8e1812033a13e8799797d9d268ee639e37428e40a33fa9951c6dd0ec2e9da8c") 05:15:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r0, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000280)={0x1a0, 0x0, 0x6b7a4d2eaf42947d, 0x70bd2d, 0x25dfdbfd, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0x7}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x25}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x9}, {0x6, 0x16, 0x7f}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x7}, {0x8, 0xb, 0x1800000}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0xfca0}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x4}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x10001}, {0x6, 0x16, 0x1000}, {0x5}, {0x6, 0x11, 0x6}, {0x8, 0xb, 0x57}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6, 0x16, 0x3}, {0x5}, {0x6, 0x11, 0xfff7}, {0x8, 0xb, 0x2bf}}]}, 0x1a0}}, 0x44000) 05:15:05 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000), 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:15:05 executing program 0: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 05:15:05 executing program 5: request_key(0x0, &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='%\'{+@\xe5\\,/&{\x00', 0xfffffffffffffffe) 05:15:05 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/iscsi_host', 0x20002, 0x8) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') fcntl$getownex(r1, 0x10, &(0x7f0000000240)) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_CREATE(0x5, &(0x7f0000002600)=@bloom_filter={0x1e, 0xffffffff, 0x9, 0x7, 0x132, r2, 0x0, '\x00', 0x0, r0, 0x1, 0x0, 0x4, 0xa}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0xff58, 0x7, 0x40, 0x2, r0, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x1, 0x3}, 0x48) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_clone(0x800000, &(0x7f00000002c0)="962afe0659a024b61a539cc3d083e1ae3f020ed204b257af91609a221979e1bff9c3ed357339ce58c0759e1c2fecb126c7514a9362073dee5afccf378aa3f251f7768c60daf10c7ad0f9e043abab91467eaccaa924ff1b573130dd0b45fa5787aeb37807c10befc57e18c0cb7330531211ef4f79", 0x74, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="92e6e181de94e25b7673b0ea39d29d9296b1b0c8c5a878f069df1e9af52b9318141fffd5dee425aae6abcdbfcc34a546a15627cb973b8410e115e6241e91daa9c8e1812033a13e8799797d9d268ee639e37428e40a33fa9951c6dd0ec2e9da8c") ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'wpan3\x00', 0x0}) sysfs$3(0x3) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r3, &(0x7f0000000640)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, 0x0, 0x2, 0x70bd2b, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_SEC_LEVEL={0x1c, 0x22, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x2}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x3}, @NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x2}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r5}]}, 0x44}, 0x1, 0x0, 0x0, 0x10050}, 0x0) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r3, &(0x7f0000000500)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="38010000", @ANYRES16=0x0, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="08000300", @ANYRES32=r5, @ANYBLOB="08000100020000000c00060003000000ff070000"], 0x38}, 0x1, 0x0, 0x0, 0x450}, 0x20000000) 05:15:05 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/iscsi_host', 0x20002, 0x8) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') fcntl$getownex(r1, 0x10, &(0x7f0000000240)) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_CREATE(0x5, &(0x7f0000002600)=@bloom_filter={0x1e, 0xffffffff, 0x9, 0x7, 0x132, r2, 0x0, '\x00', 0x0, r0, 0x1, 0x0, 0x4, 0xa}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0xff58, 0x7, 0x40, 0x2, r0, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x1, 0x3}, 0x48) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 05:15:05 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000280)={0x1a0, 0x0, 0x6b7a4d2eaf42947d, 0x70bd2d, 0x25dfdbfd, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0x7}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x25}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x9}, {0x6, 0x16, 0x7f}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x7}, {0x8, 0xb, 0x1800000}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0xfca0}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x4}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x10001}, {0x6, 0x16, 0x1000}, {0x5}, {0x6, 0x11, 0x6}, {0x8, 0xb, 0x57}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6, 0x16, 0x3}, {0x5}, {0x6, 0x11, 0xfff7}, {0x8, 0xb, 0x2bf}}]}, 0x1a0}}, 0x44000) 05:15:05 executing program 5: request_key(&(0x7f0000000140)='dns_resolver\x00', 0x0, &(0x7f00000001c0)='%\'{+@\xe5\\,/&{\x00', 0xfffffffffffffffe) 05:15:05 executing program 5: request_key(&(0x7f0000000140)='dns_resolver\x00', 0x0, &(0x7f00000001c0)='%\'{+@\xe5\\,/&{\x00', 0xfffffffffffffffe) 05:15:05 executing program 5: request_key(&(0x7f0000000140)='dns_resolver\x00', 0x0, &(0x7f00000001c0)='%\'{+@\xe5\\,/&{\x00', 0xfffffffffffffffe) 05:15:05 executing program 5: request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0xfffffffffffffffe) 05:15:05 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/iscsi_host', 0x20002, 0x8) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') fcntl$getownex(r1, 0x10, &(0x7f0000000240)) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_CREATE(0x5, &(0x7f0000002600)=@bloom_filter={0x1e, 0xffffffff, 0x9, 0x7, 0x132, r2, 0x0, '\x00', 0x0, r0, 0x1, 0x0, 0x4, 0xa}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0xff58, 0x7, 0x40, 0x2, r0, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x1, 0x3}, 0x48) 05:15:05 executing program 5: request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0xfffffffffffffffe) 05:15:06 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000), 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:15:06 executing program 5: request_key(&(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0, 0xfffffffffffffffe) 05:15:06 executing program 0: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 05:15:06 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/iscsi_host', 0x20002, 0x8) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') fcntl$getownex(r1, 0x10, &(0x7f0000000240)) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_CREATE(0x5, &(0x7f0000002600)=@bloom_filter={0x1e, 0xffffffff, 0x9, 0x7, 0x132, r2, 0x0, '\x00', 0x0, r0, 0x1, 0x0, 0x4, 0xa}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0xff58, 0x7, 0x40, 0x2, r0, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x1, 0x3}, 0x48) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_clone(0x800000, &(0x7f00000002c0)="962afe0659a024b61a539cc3d083e1ae3f020ed204b257af91609a221979e1bff9c3ed357339ce58c0759e1c2fecb126c7514a9362073dee5afccf378aa3f251f7768c60daf10c7ad0f9e043abab91467eaccaa924ff1b573130dd0b45fa5787aeb37807c10befc57e18c0cb7330531211ef4f79", 0x74, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="92e6e181de94e25b7673b0ea39d29d9296b1b0c8c5a878f069df1e9af52b9318141fffd5dee425aae6abcdbfcc34a546a15627cb973b8410e115e6241e91daa9c8e1812033a13e8799797d9d268ee639e37428e40a33fa9951c6dd0ec2e9da8c") ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'wpan3\x00', 0x0}) sysfs$3(0x3) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r3, &(0x7f0000000640)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, 0x0, 0x2, 0x70bd2b, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_SEC_LEVEL={0x1c, 0x22, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x2}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x3}, @NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x2}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}]}, 0x44}, 0x1, 0x0, 0x0, 0x10050}, 0x0) 05:15:06 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/iscsi_host', 0x20002, 0x8) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') fcntl$getownex(r1, 0x10, &(0x7f0000000240)) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_CREATE(0x5, &(0x7f0000002600)=@bloom_filter={0x1e, 0xffffffff, 0x9, 0x7, 0x132, r2, 0x0, '\x00', 0x0, r0, 0x1, 0x0, 0x4, 0xa}, 0x48) 05:15:06 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000280)={0x1a0, 0x0, 0x6b7a4d2eaf42947d, 0x70bd2d, 0x25dfdbfd, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0x7}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x25}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x9}, {0x6, 0x16, 0x7f}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x7}, {0x8, 0xb, 0x1800000}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0xfca0}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x4}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x10001}, {0x6, 0x16, 0x1000}, {0x5}, {0x6, 0x11, 0x6}, {0x8, 0xb, 0x57}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6, 0x16, 0x3}, {0x5}, {0x6, 0x11, 0xfff7}, {0x8, 0xb, 0x2bf}}]}, 0x1a0}}, 0x44000) 05:15:06 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/iscsi_host', 0x20002, 0x8) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') fcntl$getownex(r1, 0x10, &(0x7f0000000240)) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_CREATE(0x5, &(0x7f0000002600)=@bloom_filter={0x1e, 0xffffffff, 0x9, 0x7, 0x132, r2, 0x0, '\x00', 0x0, r0, 0x1, 0x0, 0x4, 0xa}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0xff58, 0x7, 0x40, 0x2, r0, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x1, 0x3}, 0x48) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_clone(0x800000, &(0x7f00000002c0)="962afe0659a024b61a539cc3d083e1ae3f020ed204b257af91609a221979e1bff9c3ed357339ce58c0759e1c2fecb126c7514a9362073dee5afccf378aa3f251f7768c60daf10c7ad0f9e043abab91467eaccaa924ff1b573130dd0b45fa5787aeb37807c10befc57e18c0cb7330531211ef4f79", 0x74, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="92e6e181de94e25b7673b0ea39d29d9296b1b0c8c5a878f069df1e9af52b9318141fffd5dee425aae6abcdbfcc34a546a15627cb973b8410e115e6241e91daa9c8e1812033a13e8799797d9d268ee639e37428e40a33fa9951c6dd0ec2e9da8c") ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'wpan3\x00', 0x0}) sysfs$3(0x3) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r3, &(0x7f0000000640)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, 0x0, 0x2, 0x70bd2b, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_SEC_LEVEL={0x1c, 0x22, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x2}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x3}, @NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x2}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r5}]}, 0x44}, 0x1, 0x0, 0x0, 0x10050}, 0x0) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r3, &(0x7f0000000500)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="38010000", @ANYRES16=0x0, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="08000300", @ANYRES32=r5, @ANYBLOB="08000100020000000c00060003000000ff070000"], 0x38}, 0x1, 0x0, 0x0, 0x450}, 0x20000000) 05:15:06 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/iscsi_host', 0x20002, 0x8) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') fcntl$getownex(r1, 0x10, &(0x7f0000000240)) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_CREATE(0x5, &(0x7f0000002600)=@bloom_filter={0x1e, 0xffffffff, 0x9, 0x7, 0x132, r2, 0x0, '\x00', 0x0, r0, 0x1, 0x0, 0x4, 0xa}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0xff58, 0x7, 0x40, 0x2, r0, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x1, 0x3}, 0x48) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_clone(0x800000, &(0x7f00000002c0)="962afe0659a024b61a539cc3d083e1ae3f020ed204b257af91609a221979e1bff9c3ed357339ce58c0759e1c2fecb126c7514a9362073dee5afccf378aa3f251f7768c60daf10c7ad0f9e043abab91467eaccaa924ff1b573130dd0b45fa5787aeb37807c10befc57e18c0cb7330531211ef4f79", 0x74, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="92e6e181de94e25b7673b0ea39d29d9296b1b0c8c5a878f069df1e9af52b9318141fffd5dee425aae6abcdbfcc34a546a15627cb973b8410e115e6241e91daa9c8e1812033a13e8799797d9d268ee639e37428e40a33fa9951c6dd0ec2e9da8c") ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'wpan3\x00', 0x0}) sysfs$3(0x3) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r3, &(0x7f0000000640)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, 0x0, 0x2, 0x70bd2b, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_SEC_LEVEL={0x1c, 0x22, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x2}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x3}, @NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x2}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r5}]}, 0x44}, 0x1, 0x0, 0x0, 0x10050}, 0x0) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r3, &(0x7f0000000500)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="38010000", @ANYRES16=0x0, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="08000300", @ANYRES32=r5, @ANYBLOB="08000100020000000c00060003000000ff070000"], 0x38}, 0x1, 0x0, 0x0, 0x450}, 0x20000000) 05:15:06 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/iscsi_host', 0x20002, 0x8) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') fcntl$getownex(r0, 0x10, &(0x7f0000000240)) pipe2$watch_queue(&(0x7f0000000040), 0x80) 05:15:06 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/iscsi_host', 0x20002, 0x8) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') fcntl$getownex(r1, 0x10, &(0x7f0000000240)) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_CREATE(0x5, &(0x7f0000002600)=@bloom_filter={0x1e, 0xffffffff, 0x9, 0x7, 0x132, r2, 0x0, '\x00', 0x0, r0, 0x1, 0x0, 0x4, 0xa}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0xff58, 0x7, 0x40, 0x2, r0, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x1, 0x3}, 0x48) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_clone(0x800000, &(0x7f00000002c0)="962afe0659a024b61a539cc3d083e1ae3f020ed204b257af91609a221979e1bff9c3ed357339ce58c0759e1c2fecb126c7514a9362073dee5afccf378aa3f251f7768c60daf10c7ad0f9e043abab91467eaccaa924ff1b573130dd0b45fa5787aeb37807c10befc57e18c0cb7330531211ef4f79", 0x74, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="92e6e181de94e25b7673b0ea39d29d9296b1b0c8c5a878f069df1e9af52b9318141fffd5dee425aae6abcdbfcc34a546a15627cb973b8410e115e6241e91daa9c8e1812033a13e8799797d9d268ee639e37428e40a33fa9951c6dd0ec2e9da8c") ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'wpan3\x00', 0x0}) sysfs$3(0x3) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r3, &(0x7f0000000640)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, 0x0, 0x2, 0x70bd2b, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_SEC_LEVEL={0x1c, 0x22, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x2}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x3}, @NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x2}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r5}]}, 0x44}, 0x1, 0x0, 0x0, 0x10050}, 0x0) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r3, &(0x7f0000000500)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="38010000", @ANYRES16=0x0, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="08000300", @ANYRES32=r5, @ANYBLOB="08000100020000000c00060003000000ff070000"], 0x38}, 0x1, 0x0, 0x0, 0x450}, 0x20000000) 05:15:06 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/iscsi_host', 0x20002, 0x8) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') fcntl$getownex(r1, 0x10, &(0x7f0000000240)) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_CREATE(0x5, &(0x7f0000002600)=@bloom_filter={0x1e, 0xffffffff, 0x9, 0x7, 0x132, r2, 0x0, '\x00', 0x0, r0, 0x1, 0x0, 0x4, 0xa}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0xff58, 0x7, 0x40, 0x2, r0, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x1, 0x3}, 0x48) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_clone(0x800000, &(0x7f00000002c0)="962afe0659a024b61a539cc3d083e1ae3f020ed204b257af91609a221979e1bff9c3ed357339ce58c0759e1c2fecb126c7514a9362073dee5afccf378aa3f251f7768c60daf10c7ad0f9e043abab91467eaccaa924ff1b573130dd0b45fa5787aeb37807c10befc57e18c0cb7330531211ef4f79", 0x74, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="92e6e181de94e25b7673b0ea39d29d9296b1b0c8c5a878f069df1e9af52b9318141fffd5dee425aae6abcdbfcc34a546a15627cb973b8410e115e6241e91daa9c8e1812033a13e8799797d9d268ee639e37428e40a33fa9951c6dd0ec2e9da8c") ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'wpan3\x00'}) sysfs$3(0x3) 05:15:06 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/iscsi_host', 0x20002, 0x8) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') fcntl$getownex(r1, 0x10, &(0x7f0000000240)) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_CREATE(0x5, &(0x7f0000002600)=@bloom_filter={0x1e, 0xffffffff, 0x9, 0x7, 0x132, r2, 0x0, '\x00', 0x0, r0, 0x1, 0x0, 0x4, 0xa}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0xff58, 0x7, 0x40, 0x2, r0, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x1, 0x3}, 0x48) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_clone(0x800000, &(0x7f00000002c0)="962afe0659a024b61a539cc3d083e1ae3f020ed204b257af91609a221979e1bff9c3ed357339ce58c0759e1c2fecb126c7514a9362073dee5afccf378aa3f251f7768c60daf10c7ad0f9e043abab91467eaccaa924ff1b573130dd0b45fa5787aeb37807c10befc57e18c0cb7330531211ef4f79", 0x74, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="92e6e181de94e25b7673b0ea39d29d9296b1b0c8c5a878f069df1e9af52b9318141fffd5dee425aae6abcdbfcc34a546a15627cb973b8410e115e6241e91daa9c8e1812033a13e8799797d9d268ee639e37428e40a33fa9951c6dd0ec2e9da8c") ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'wpan3\x00', 0x0}) sysfs$3(0x3) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r3, &(0x7f0000000640)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000600)={&(0x7f0000000580)={0x44, 0x0, 0x2, 0x70bd2b, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_SEC_LEVEL={0x1c, 0x22, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x2}, @NL802154_SECLEVEL_ATTR_CMD_FRAME={0x8, 0x3, 0x3}, @NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x2}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r4}]}, 0x44}, 0x1, 0x0, 0x0, 0x10050}, 0x0) 05:15:07 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000), 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:15:07 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/iscsi_host', 0x20002, 0x8) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') fcntl$getownex(r1, 0x10, &(0x7f0000000240)) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_CREATE(0x5, &(0x7f0000002600)=@bloom_filter={0x1e, 0xffffffff, 0x9, 0x7, 0x132, r2, 0x0, '\x00', 0x0, r0, 0x1, 0x0, 0x4, 0xa}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0xff58, 0x7, 0x40, 0x2, r0, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x1, 0x3}, 0x48) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_clone(0x800000, &(0x7f00000002c0)="962afe0659a024b61a539cc3d083e1ae3f020ed204b257af91609a221979e1bff9c3ed357339ce58c0759e1c2fecb126c7514a9362073dee5afccf378aa3f251f7768c60daf10c7ad0f9e043abab91467eaccaa924ff1b573130dd0b45fa5787aeb37807c10befc57e18c0cb7330531211ef4f79", 0x74, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="92e6e181de94e25b7673b0ea39d29d9296b1b0c8c5a878f069df1e9af52b9318141fffd5dee425aae6abcdbfcc34a546a15627cb973b8410e115e6241e91daa9c8e1812033a13e8799797d9d268ee639e37428e40a33fa9951c6dd0ec2e9da8c") ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'wpan3\x00'}) sysfs$3(0x3) 05:15:07 executing program 0: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 05:15:07 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/iscsi_host', 0x20002, 0x8) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') fcntl$getownex(r0, 0x10, &(0x7f0000000240)) 05:15:07 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000280)={0x1a0, 0x0, 0x6b7a4d2eaf42947d, 0x70bd2d, 0x25dfdbfd, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0x7}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x25}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x9}, {0x6, 0x16, 0x7f}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x7}, {0x8, 0xb, 0x1800000}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0xfca0}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x4}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x10001}, {0x6, 0x16, 0x1000}, {0x5}, {0x6, 0x11, 0x6}, {0x8, 0xb, 0x57}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6, 0x16, 0x3}, {0x5}, {0x6, 0x11, 0xfff7}, {0x8, 0xb, 0x2bf}}]}, 0x1a0}}, 0x44000) 05:15:07 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/iscsi_host', 0x20002, 0x8) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') fcntl$getownex(r1, 0x10, &(0x7f0000000240)) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_CREATE(0x5, &(0x7f0000002600)=@bloom_filter={0x1e, 0xffffffff, 0x9, 0x7, 0x132, r2, 0x0, '\x00', 0x0, r0, 0x1, 0x0, 0x4, 0xa}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0xff58, 0x7, 0x40, 0x2, r0, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x1, 0x3}, 0x48) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_clone(0x800000, &(0x7f00000002c0)="962afe0659a024b61a539cc3d083e1ae3f020ed204b257af91609a221979e1bff9c3ed357339ce58c0759e1c2fecb126c7514a9362073dee5afccf378aa3f251f7768c60daf10c7ad0f9e043abab91467eaccaa924ff1b573130dd0b45fa5787aeb37807c10befc57e18c0cb7330531211ef4f79", 0x74, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="92e6e181de94e25b7673b0ea39d29d9296b1b0c8c5a878f069df1e9af52b9318141fffd5dee425aae6abcdbfcc34a546a15627cb973b8410e115e6241e91daa9c8e1812033a13e8799797d9d268ee639e37428e40a33fa9951c6dd0ec2e9da8c") ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'wpan3\x00'}) 05:15:07 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x0, 0x0, &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:07 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/iscsi_host', 0x20002, 0x8) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') fcntl$getownex(r1, 0x10, &(0x7f0000000240)) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_CREATE(0x5, &(0x7f0000002600)=@bloom_filter={0x1e, 0xffffffff, 0x9, 0x7, 0x132, r2, 0x0, '\x00', 0x0, r0, 0x1, 0x0, 0x4, 0xa}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0xff58, 0x7, 0x40, 0x2, r0, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x1, 0x3}, 0x48) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_clone(0x800000, &(0x7f00000002c0)="962afe0659a024b61a539cc3d083e1ae3f020ed204b257af91609a221979e1bff9c3ed357339ce58c0759e1c2fecb126c7514a9362073dee5afccf378aa3f251f7768c60daf10c7ad0f9e043abab91467eaccaa924ff1b573130dd0b45fa5787aeb37807c10befc57e18c0cb7330531211ef4f79", 0x74, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="92e6e181de94e25b7673b0ea39d29d9296b1b0c8c5a878f069df1e9af52b9318141fffd5dee425aae6abcdbfcc34a546a15627cb973b8410e115e6241e91daa9c8e1812033a13e8799797d9d268ee639e37428e40a33fa9951c6dd0ec2e9da8c") ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'wpan3\x00'}) 05:15:07 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/iscsi_host', 0x20002, 0x8) syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') 05:15:07 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/iscsi_host', 0x20002, 0x8) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') fcntl$getownex(r1, 0x10, &(0x7f0000000240)) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_CREATE(0x5, &(0x7f0000002600)=@bloom_filter={0x1e, 0xffffffff, 0x9, 0x7, 0x132, r2, 0x0, '\x00', 0x0, r0, 0x1, 0x0, 0x4, 0xa}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0xff58, 0x7, 0x40, 0x2, r0, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x1, 0x3}, 0x48) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_clone(0x800000, &(0x7f00000002c0)="962afe0659a024b61a539cc3d083e1ae3f020ed204b257af91609a221979e1bff9c3ed357339ce58c0759e1c2fecb126c7514a9362073dee5afccf378aa3f251f7768c60daf10c7ad0f9e043abab91467eaccaa924ff1b573130dd0b45fa5787aeb37807c10befc57e18c0cb7330531211ef4f79", 0x74, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="92e6e181de94e25b7673b0ea39d29d9296b1b0c8c5a878f069df1e9af52b9318141fffd5dee425aae6abcdbfcc34a546a15627cb973b8410e115e6241e91daa9c8e1812033a13e8799797d9d268ee639e37428e40a33fa9951c6dd0ec2e9da8c") 05:15:07 executing program 2: syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') 05:15:07 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/iscsi_host', 0x20002, 0x8) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') fcntl$getownex(r1, 0x10, &(0x7f0000000240)) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_CREATE(0x5, &(0x7f0000002600)=@bloom_filter={0x1e, 0xffffffff, 0x9, 0x7, 0x132, r2, 0x0, '\x00', 0x0, r0, 0x1, 0x0, 0x4, 0xa}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0xff58, 0x7, 0x40, 0x2, r0, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x1, 0x3}, 0x48) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 05:15:07 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e143", 0x5e, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:15:07 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x0, 0x0, &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:07 executing program 2: syz_open_procfs$namespace(0x0, 0x0) 05:15:08 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/iscsi_host', 0x20002, 0x8) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') fcntl$getownex(r1, 0x10, &(0x7f0000000240)) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_CREATE(0x5, &(0x7f0000002600)=@bloom_filter={0x1e, 0xffffffff, 0x9, 0x7, 0x132, r2, 0x0, '\x00', 0x0, r0, 0x1, 0x0, 0x4, 0xa}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0xff58, 0x7, 0x40, 0x2, r0, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x1, 0x3}, 0x48) 05:15:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r0, 0x0, 0x44000) 05:15:08 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/iscsi_host', 0x20002, 0x8) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') fcntl$getownex(r1, 0x10, &(0x7f0000000240)) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_CREATE(0x5, &(0x7f0000002600)=@bloom_filter={0x1e, 0xffffffff, 0x9, 0x7, 0x132, r2, 0x0, '\x00', 0x0, r0, 0x1, 0x0, 0x4, 0xa}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0xff58, 0x7, 0x40, 0x2, r0, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x1, 0x3}, 0x48) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_clone(0x800000, &(0x7f00000002c0)="962afe0659a024b61a539cc3d083e1ae3f020ed204b257af91609a221979e1bff9c3ed357339ce58c0759e1c2fecb126c7514a9362073dee5afccf378aa3f251f7768c60daf10c7ad0f9e043abab91467eaccaa924ff1b573130dd0b45fa5787aeb37807c10befc57e18c0cb7330531211ef4f79", 0x74, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="92e6e181de94e25b7673b0ea39d29d9296b1b0c8c5a878f069df1e9af52b9318141fffd5dee425aae6abcdbfcc34a546a15627cb973b8410e115e6241e91daa9c8e1812033a13e8799797d9d268ee639e37428e40a33fa9951c6dd0ec2e9da8c") 05:15:08 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x0, 0x0, &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:08 executing program 2: syz_open_procfs$namespace(0x0, 0x0) 05:15:08 executing program 5: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/iscsi_host', 0x20002, 0x8) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') fcntl$getownex(r1, 0x10, &(0x7f0000000240)) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_CREATE(0x5, &(0x7f0000002600)=@bloom_filter={0x1e, 0xffffffff, 0x9, 0x7, 0x132, r2, 0x0, '\x00', 0x0, r0, 0x1, 0x0, 0x4, 0xa}, 0x48) 05:15:08 executing program 2: syz_open_procfs$namespace(0x0, 0x0) 05:15:08 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x9, &(0x7f0000000280)=@raw=[@cb_func={0x18, 0x6, 0x4, 0x0, 0x1}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_fd={0x18, 0x2}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x1}], &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r0, 0x0, 0x44000) 05:15:08 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e143", 0x5e, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:15:08 executing program 2: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/iscsi_host', 0x20002, 0x8) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') fcntl$getownex(r1, 0x10, &(0x7f0000000240)) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_CREATE(0x5, &(0x7f0000002600)=@bloom_filter={0x1e, 0xffffffff, 0x9, 0x7, 0x132, r2, 0x0, '\x00', 0x0, r0, 0x1, 0x0, 0x4, 0xa}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0xff58, 0x7, 0x40, 0x2, r0, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x1, 0x3}, 0x48) 05:15:08 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x7, &(0x7f0000000280)=@raw=[@cb_func={0x18, 0x6, 0x4, 0x0, 0x1}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @map_fd={0x18, 0x2}], &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:08 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/iscsi_host', 0x20002, 0x8) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') fcntl$getownex(r0, 0x10, &(0x7f0000000240)) pipe2$watch_queue(&(0x7f0000000040), 0x80) 05:15:08 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000002600)=@base={0x0, 0x0, 0x0, 0x0, 0x1246, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x500}, 0x48) 05:15:08 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/iscsi_host', 0x20002, 0x8) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') fcntl$getownex(r1, 0x10, &(0x7f0000000240)) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_CREATE(0x5, &(0x7f0000002600)=@bloom_filter={0x1e, 0xffffffff, 0x9, 0x7, 0x132, r2, 0x0, '\x00', 0x0, r0, 0x1, 0x0, 0x4, 0xa}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0xff58, 0x7, 0x40, 0x2, r0, 0x5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x4, 0x1, 0x3}, 0x48) syz_clone(0x800000, &(0x7f00000002c0)="962afe0659a024b61a539cc3d083e1ae3f020ed204b257af91609a221979e1bff9c3ed357339ce58c0759e1c2fecb126c7514a9362073dee5afccf378aa3f251f7768c60daf10c7ad0f9e043abab91467eaccaa924ff1b573130dd0b45fa5787aeb37807c10befc57e18c0cb7330531211ef4f79", 0x74, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="92e6e181de94e25b7673b0ea39d29d9296b1b0c8c5a878f069df1e9af52b9318141fffd5dee425aae6abcdbfcc34a546a15627cb973b8410e115e6241e91daa9c8e1812033a13e8799797d9d268ee639e37428e40a33fa9951c6dd0ec2e9da8c") 05:15:08 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/iscsi_host', 0x20002, 0x8) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') fcntl$getownex(r0, 0x10, &(0x7f0000000240)) 05:15:08 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x5, &(0x7f0000000280)=@raw=[@cb_func={0x18, 0x6, 0x4, 0x0, 0x1}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:08 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000002600)=@base={0x0, 0x0, 0x0, 0x0, 0x1246, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x500}, 0x48) 05:15:08 executing program 5: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/iscsi_host', 0x20002, 0x8) syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') 05:15:08 executing program 3: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/iscsi_host', 0x20002, 0x8) r1 = syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') fcntl$getownex(r1, 0x10, &(0x7f0000000240)) pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$MAP_CREATE(0x5, &(0x7f0000002600)=@bloom_filter={0x1e, 0xffffffff, 0x9, 0x7, 0x132, r2, 0x0, '\x00', 0x0, r0, 0x1, 0x0, 0x4, 0xa}, 0x48) syz_clone(0x800000, &(0x7f00000002c0)="962afe0659a024b61a539cc3d083e1ae3f020ed204b257af91609a221979e1bff9c3ed357339ce58c0759e1c2fecb126c7514a9362073dee5afccf378aa3f251f7768c60daf10c7ad0f9e043abab91467eaccaa924ff1b573130dd0b45fa5787aeb37807c10befc57e18c0cb7330531211ef4f79", 0x74, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="92e6e181de94e25b7673b0ea39d29d9296b1b0c8c5a878f069df1e9af52b9318141fffd5dee425aae6abcdbfcc34a546a15627cb973b8410e115e6241e91daa9c8e1812033a13e8799797d9d268ee639e37428e40a33fa9951c6dd0ec2e9da8c") 05:15:09 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r0, 0x0, 0x44000) 05:15:09 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e143", 0x5e, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:15:09 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x4, &(0x7f0000000280)=@raw=[@cb_func={0x18, 0x6, 0x4, 0x0, 0x1}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}], &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:09 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000002600)=@base={0x0, 0x0, 0x0, 0x0, 0x1246, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x500}, 0x48) 05:15:09 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') 05:15:09 executing program 5: syz_open_procfs$namespace(0x0, 0x0) 05:15:09 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x1a0, 0x0, 0x6b7a4d2eaf42947d, 0x70bd2d, 0x25dfdbfd, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0x7}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x25}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x9}, {0x6, 0x16, 0x7f}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x7}, {0x8, 0xb, 0x1800000}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0xfca0}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x4}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x10001}, {0x6, 0x16, 0x1000}, {0x5}, {0x6, 0x11, 0x6}, {0x8, 0xb, 0x57}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6, 0x16, 0x3}, {0x5}, {0x6, 0x11, 0xfff7}, {0x8, 0xb, 0x2bf}}]}, 0x1a0}}, 0x44000) 05:15:09 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) 05:15:09 executing program 3: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/iscsi_host', 0x20002, 0x8) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') fcntl$getownex(r0, 0x10, &(0x7f0000000240)) pipe2$watch_queue(&(0x7f0000000040), 0x80) syz_clone(0x800000, &(0x7f00000002c0)="962afe0659a024b61a539cc3d083e1ae3f020ed204b257af91609a221979e1bff9c3ed357339ce58c0759e1c2fecb126c7514a9362073dee5afccf378aa3f251f7768c60daf10c7ad0f9e043abab91467eaccaa924ff1b573130dd0b45fa5787aeb37807c10befc57e18c0cb7330531211ef4f79", 0x74, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="92e6e181de94e25b7673b0ea39d29d9296b1b0c8c5a878f069df1e9af52b9318141fffd5dee425aae6abcdbfcc34a546a15627cb973b8410e115e6241e91daa9c8e1812033a13e8799797d9d268ee639e37428e40a33fa9951c6dd0ec2e9da8c") 05:15:09 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x4, &(0x7f0000000280)=@raw=[@cb_func={0x18, 0x6, 0x4, 0x0, 0x1}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}], &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:09 executing program 5: syz_open_procfs$namespace(0x0, 0x0) 05:15:09 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) 05:15:09 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x44000) 05:15:10 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee", 0x8d, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:15:10 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x4, &(0x7f0000000280)=@raw=[@cb_func={0x18, 0x6, 0x4, 0x0, 0x1}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}], &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:10 executing program 5: syz_open_procfs$namespace(0x0, 0x0) 05:15:10 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) 05:15:10 executing program 3: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/iscsi_host', 0x20002, 0x8) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') fcntl$getownex(r0, 0x10, &(0x7f0000000240)) syz_clone(0x800000, &(0x7f00000002c0)="962afe0659a024b61a539cc3d083e1ae3f020ed204b257af91609a221979e1bff9c3ed357339ce58c0759e1c2fecb126c7514a9362073dee5afccf378aa3f251f7768c60daf10c7ad0f9e043abab91467eaccaa924ff1b573130dd0b45fa5787aeb37807c10befc57e18c0cb7330531211ef4f79", 0x74, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="92e6e181de94e25b7673b0ea39d29d9296b1b0c8c5a878f069df1e9af52b9318141fffd5dee425aae6abcdbfcc34a546a15627cb973b8410e115e6241e91daa9c8e1812033a13e8799797d9d268ee639e37428e40a33fa9951c6dd0ec2e9da8c") 05:15:10 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x44000) 05:15:10 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000002600)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x500}, 0x48) 05:15:10 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x4, &(0x7f0000000280)=@raw=[@cb_func={0x18, 0x6, 0x4, 0x0, 0x1}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}], &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:10 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r0, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x44000) 05:15:10 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x5, &(0x7f0000000280)=@raw=[@cb_func={0x18, 0x6, 0x4, 0x0, 0x1}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}, @kfunc], &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:10 executing program 3: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/iscsi_host', 0x20002, 0x8) syz_open_procfs$namespace(0x0, &(0x7f0000000200)='ns/pid\x00') syz_clone(0x800000, &(0x7f00000002c0)="962afe0659a024b61a539cc3d083e1ae3f020ed204b257af91609a221979e1bff9c3ed357339ce58c0759e1c2fecb126c7514a9362073dee5afccf378aa3f251f7768c60daf10c7ad0f9e043abab91467eaccaa924ff1b573130dd0b45fa5787aeb37807c10befc57e18c0cb7330531211ef4f79", 0x74, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="92e6e181de94e25b7673b0ea39d29d9296b1b0c8c5a878f069df1e9af52b9318141fffd5dee425aae6abcdbfcc34a546a15627cb973b8410e115e6241e91daa9c8e1812033a13e8799797d9d268ee639e37428e40a33fa9951c6dd0ec2e9da8c") 05:15:10 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r0, &(0x7f0000000b40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000b00)={&(0x7f0000000a40)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), r0) setgid(0xffffffffffffffff) r1 = getgid() setgid(r1) 05:15:11 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee", 0x8d, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:15:11 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x4, &(0x7f0000000280)=@raw=[@cb_func={0x18, 0x6, 0x4, 0x0, 0x1}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}], &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:11 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f0000000280)=@raw=[@cb_func={0x18, 0x6, 0x4, 0x0, 0x1}, @kfunc], &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:11 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r0, &(0x7f0000000b40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000b00)={&(0x7f0000000a40)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), r0) setgid(0xffffffffffffffff) r1 = getgid() setgid(r1) 05:15:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x44000) 05:15:11 executing program 3: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/iscsi_host', 0x20002, 0x8) syz_clone(0x800000, &(0x7f00000002c0)="962afe0659a024b61a539cc3d083e1ae3f020ed204b257af91609a221979e1bff9c3ed357339ce58c0759e1c2fecb126c7514a9362073dee5afccf378aa3f251f7768c60daf10c7ad0f9e043abab91467eaccaa924ff1b573130dd0b45fa5787aeb37807c10befc57e18c0cb7330531211ef4f79", 0x74, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="92e6e181de94e25b7673b0ea39d29d9296b1b0c8c5a878f069df1e9af52b9318141fffd5dee425aae6abcdbfcc34a546a15627cb973b8410e115e6241e91daa9c8e1812033a13e8799797d9d268ee639e37428e40a33fa9951c6dd0ec2e9da8c") 05:15:11 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r0, &(0x7f0000000b40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000b00)={&(0x7f0000000a40)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), r0) setgid(0xffffffffffffffff) r1 = getgid() setgid(r1) 05:15:11 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x4, &(0x7f0000000280)=@raw=[@cb_func={0x18, 0x6, 0x4, 0x0, 0x1}, @map_val={0x18, 0x4, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffff}], &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:11 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x1, &(0x7f0000000280)=@raw=[@kfunc], &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:11 executing program 5: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 05:15:11 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r0, &(0x7f0000000b40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000b00)={&(0x7f0000000a40)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), r0) setgid(0xffffffffffffffff) getgid() 05:15:11 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x1, &(0x7f0000000280)=@raw=[@kfunc], &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) [ 296.881234][T10345] cgroup: fork rejected by pids controller in /syz1 05:15:13 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee", 0x8d, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:15:13 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x1, &(0x7f0000000280)=@raw=[@kfunc], &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:13 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r0, &(0x7f0000000b40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000b00)={&(0x7f0000000a40)={0x14}, 0x14}}, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), r0) setgid(0xffffffffffffffff) 05:15:13 executing program 5: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 05:15:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x44000) 05:15:13 executing program 3: syz_clone(0x800000, &(0x7f00000002c0)="962afe0659a024b61a539cc3d083e1ae3f020ed204b257af91609a221979e1bff9c3ed357339ce58c0759e1c2fecb126c7514a9362073dee5afccf378aa3f251f7768c60daf10c7ad0f9e043abab91467eaccaa924ff1b573130dd0b45fa5787aeb37807c10befc57e18c0cb7330531211ef4f79", 0x74, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="92e6e181de94e25b7673b0ea39d29d9296b1b0c8c5a878f069df1e9af52b9318141fffd5dee425aae6abcdbfcc34a546a15627cb973b8410e115e6241e91daa9c8e1812033a13e8799797d9d268ee639e37428e40a33fa9951c6dd0ec2e9da8c") 05:15:13 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(r0, &(0x7f0000000b40)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000b00)={&(0x7f0000000a40)={0x14}, 0x14}}, 0x0) setgid(0xffffffffffffffff) 05:15:13 executing program 5: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 05:15:13 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f0000000280)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0x1}, @kfunc], &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:13 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x0, 0x0, &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:13 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14}, 0x14}}, 0x0) setgid(0xffffffffffffffff) 05:15:13 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f0000000280)=@raw=[@cb_func, @kfunc], &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:14 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b03", 0xa5, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:15:14 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x0, 0x0, &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:14 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0}}, 0x44000) 05:15:14 executing program 2: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) setgid(0xffffffffffffffff) 05:15:14 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f0000000280)=@raw=[@cb_func, @kfunc], 0x0, 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:14 executing program 3: syz_clone(0x0, &(0x7f00000002c0)="962afe0659a024b61a539cc3d083e1ae3f020ed204b257af91609a221979e1bff9c3ed357339ce58c0759e1c2fecb126c7514a9362073dee5afccf378aa3f251f7768c60daf10c7ad0f9e043abab91467eaccaa924ff1b573130dd0b45fa5787aeb37807c10befc57e18c0cb7330531211ef4f79", 0x74, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="92e6e181de94e25b7673b0ea39d29d9296b1b0c8c5a878f069df1e9af52b9318141fffd5dee425aae6abcdbfcc34a546a15627cb973b8410e115e6241e91daa9c8e1812033a13e8799797d9d268ee639e37428e40a33fa9951c6dd0ec2e9da8c") 05:15:14 executing program 2: setgid(0xffffffffffffffff) 05:15:14 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f0000000280)=@raw=[@cb_func, @kfunc], 0x0, 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:14 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x0, 0x0, &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:14 executing program 2: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee", 0x8d, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:15:14 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x1a0, 0x0, 0x0, 0x70bd2d, 0x25dfdbfd, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0x7}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x25}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x9}, {0x6, 0x16, 0x7f}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x7}, {0x8, 0xb, 0x1800000}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0xfca0}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x4}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x10001}, {0x6, 0x16, 0x1000}, {0x5}, {0x6, 0x11, 0x6}, {0x8, 0xb, 0x57}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6, 0x16, 0x3}, {0x5}, {0x6, 0x11, 0xfff7}, {0x8, 0xb, 0x2bf}}]}, 0x1a0}}, 0x44000) 05:15:14 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f0000000280)=@raw=[@cb_func, @kfunc], 0x0, 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:14 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b03", 0xa5, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:15:14 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x1a0, 0x0, 0x0, 0x70bd2d, 0x25dfdbfd, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0x7}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x25}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x9}, {0x6, 0x16, 0x7f}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x7}, {0x8, 0xb, 0x1800000}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0xfca0}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x4}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x10001}, {0x6, 0x16, 0x1000}, {0x5}, {0x6, 0x11, 0x6}, {0x8, 0xb, 0x57}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6, 0x16, 0x3}, {0x5}, {0x6, 0x11, 0xfff7}, {0x8, 0xb, 0x2bf}}]}, 0x1a0}}, 0x44000) 05:15:14 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x2, &(0x7f0000000280)=@raw=[@cb_func={0x18, 0x6, 0x4, 0x0, 0x1}], &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:14 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f0000000280)=@raw=[@cb_func, @kfunc], &(0x7f0000000300)='GPL\x00', 0x0, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:14 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/iscsi_host', 0x20002, 0x8) syz_clone(0x800000, &(0x7f00000002c0)="962afe0659a024b61a539cc3d083e1ae3f020ed204b257af91609a221979e1bff9c3ed357339ce58c0759e1c2fecb126c7514a9362073dee5afccf378aa3f251f7768c60daf10c7ad0f9e043abab91467eaccaa924ff1b573130dd0b45fa5787aeb37807c10befc57e18c0cb7330531211ef4f79", 0x74, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="92e6e181de94e25b7673b0ea39d29d9296b1b0c8c5a878f069df1e9af52b9318141fffd5dee425aae6abcdbfcc34a546a15627cb973b8410e115e6241e91daa9c8e1812033a13e8799797d9d268ee639e37428e40a33fa9951c6dd0ec2e9da8c") 05:15:14 executing program 3: syz_clone(0x0, &(0x7f00000002c0)="962afe0659a024b61a539cc3d083e1ae3f020ed204b257af91609a221979e1bff9c3ed357339ce58c0759e1c2fecb126c7514a9362073dee5afccf378aa3f251f7768c60daf10c7ad0f9e043abab91467eaccaa924ff1b573130dd0b45fa5787aeb37807c10befc57e18c0cb7330531211ef4f79", 0x74, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="92e6e181de94e25b7673b0ea39d29d9296b1b0c8c5a878f069df1e9af52b9318141fffd5dee425aae6abcdbfcc34a546a15627cb973b8410e115e6241e91daa9c8e1812033a13e8799797d9d268ee639e37428e40a33fa9951c6dd0ec2e9da8c") 05:15:14 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x0, &(0x7f0000000280), &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:14 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f0000000280)=@raw=[@cb_func, @kfunc], &(0x7f0000000300)='GPL\x00', 0x0, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:14 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x1a0, 0x0, 0x0, 0x70bd2d, 0x25dfdbfd, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0x7}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x25}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x9}, {0x6, 0x16, 0x7f}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x7}, {0x8, 0xb, 0x1800000}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0xfca0}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x4}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x10001}, {0x6, 0x16, 0x1000}, {0x5}, {0x6, 0x11, 0x6}, {0x8, 0xb, 0x57}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6, 0x16, 0x3}, {0x5}, {0x6, 0x11, 0xfff7}, {0x8, 0xb, 0x2bf}}]}, 0x1a0}}, 0x44000) 05:15:14 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x0, &(0x7f0000000280), &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:14 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/iscsi_host', 0x20002, 0x8) syz_clone(0x800000, &(0x7f00000002c0)="962afe0659a024b61a539cc3d083e1ae3f020ed204b257af91609a221979e1bff9c3ed357339ce58c0759e1c2fecb126c7514a9362073dee5afccf378aa3f251f7768c60daf10c7ad0f9e043abab91467eaccaa924ff1b573130dd0b45fa5787aeb37807c10befc57e18c0cb7330531211ef4f79", 0x74, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="92e6e181de94e25b7673b0ea39d29d9296b1b0c8c5a878f069df1e9af52b9318141fffd5dee425aae6abcdbfcc34a546a15627cb973b8410e115e6241e91daa9c8e1812033a13e8799797d9d268ee639e37428e40a33fa9951c6dd0ec2e9da8c") 05:15:14 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x1a0, 0x0, 0x6b7a4d2eaf42947d, 0x0, 0x25dfdbfd, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0x7}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x25}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x9}, {0x6, 0x16, 0x7f}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x7}, {0x8, 0xb, 0x1800000}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0xfca0}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x4}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x10001}, {0x6, 0x16, 0x1000}, {0x5}, {0x6, 0x11, 0x6}, {0x8, 0xb, 0x57}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6, 0x16, 0x3}, {0x5}, {0x6, 0x11, 0xfff7}, {0x8, 0xb, 0x2bf}}]}, 0x1a0}}, 0x44000) 05:15:15 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b03", 0xa5, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:15:15 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x0, &(0x7f0000000280), &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x1a0, 0x0, 0x6b7a4d2eaf42947d, 0x0, 0x0, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0x7}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x25}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x9}, {0x6, 0x16, 0x7f}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x7}, {0x8, 0xb, 0x1800000}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0xfca0}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x4}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x10001}, {0x6, 0x16, 0x1000}, {0x5}, {0x6, 0x11, 0x6}, {0x8, 0xb, 0x57}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}, {0x6, 0x16, 0x3}, {0x5}, {0x6, 0x11, 0xfff7}, {0x8, 0xb, 0x2bf}}]}, 0x1a0}}, 0x44000) 05:15:15 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f0000000280)=@raw=[@cb_func, @kfunc], &(0x7f0000000300)='GPL\x00', 0x0, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:15 executing program 3: syz_clone(0x0, &(0x7f00000002c0)="962afe0659a024b61a539cc3d083e1ae3f020ed204b257af91609a221979e1bff9c3ed357339ce58c0759e1c2fecb126c7514a9362073dee5afccf378aa3f251f7768c60daf10c7ad0f9e043abab91467eaccaa924ff1b573130dd0b45fa5787aeb37807c10befc57e18c0cb7330531211ef4f79", 0x74, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="92e6e181de94e25b7673b0ea39d29d9296b1b0c8c5a878f069df1e9af52b9318141fffd5dee425aae6abcdbfcc34a546a15627cb973b8410e115e6241e91daa9c8e1812033a13e8799797d9d268ee639e37428e40a33fa9951c6dd0ec2e9da8c") 05:15:15 executing program 2: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/class/iscsi_host', 0x20002, 0x8) syz_clone(0x800000, &(0x7f00000002c0)="962afe0659a024b61a539cc3d083e1ae3f020ed204b257af91609a221979e1bff9c3ed357339ce58c0759e1c2fecb126c7514a9362073dee5afccf378aa3f251f7768c60daf10c7ad0f9e043abab91467eaccaa924ff1b573130dd0b45fa5787aeb37807c10befc57e18c0cb7330531211ef4f79", 0x74, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="92e6e181de94e25b7673b0ea39d29d9296b1b0c8c5a878f069df1e9af52b9318141fffd5dee425aae6abcdbfcc34a546a15627cb973b8410e115e6241e91daa9c8e1812033a13e8799797d9d268ee639e37428e40a33fa9951c6dd0ec2e9da8c") 05:15:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x150, 0x0, 0x6b7a4d2eaf42947d, 0x0, 0x0, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0x7}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x25}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x9}, {0x6, 0x16, 0x7f}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x7}, {0x8, 0xb, 0x1800000}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0xfca0}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x4}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x10001}, {0x6, 0x16, 0x1000}, {0x5}, {0x6, 0x11, 0x6}, {0x8, 0xb, 0x57}}]}, 0x150}}, 0x44000) 05:15:15 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x2, &(0x7f0000000280)=@raw=[@cb_func={0x18, 0x0, 0x4, 0x0, 0x1}], &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:15 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f0000000280)=@raw=[@cb_func, @kfunc], &(0x7f0000000300)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:15 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f0000000280)=@raw=[@cb_func, @kfunc], &(0x7f0000000300)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:15 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x2, &(0x7f0000000280)=@raw=[@cb_func], &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x104, 0x0, 0x6b7a4d2eaf42947d, 0x0, 0x0, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0x7}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x25}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x9}, {0x6, 0x16, 0x7f}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x7}, {0x8, 0xb, 0x1800000}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0xfca0}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x4}}]}, 0x104}}, 0x44000) 05:15:16 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad", 0xb1, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:15:16 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x2, &(0x7f0000000280)=@raw=[@cb_func], 0x0, 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:16 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f0000000280)=@raw=[@cb_func, @kfunc], &(0x7f0000000300)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:16 executing program 2: syz_clone(0x800000, &(0x7f00000002c0)="962afe0659a024b61a539cc3d083e1ae3f020ed204b257af91609a221979e1bff9c3ed357339ce58c0759e1c2fecb126c7514a9362073dee5afccf378aa3f251f7768c60daf10c7ad0f9e043abab91467eaccaa924ff1b573130dd0b45fa5787aeb37807c10befc57e18c0cb7330531211ef4f79", 0x74, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="92e6e181de94e25b7673b0ea39d29d9296b1b0c8c5a878f069df1e9af52b9318141fffd5dee425aae6abcdbfcc34a546a15627cb973b8410e115e6241e91daa9c8e1812033a13e8799797d9d268ee639e37428e40a33fa9951c6dd0ec2e9da8c") 05:15:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0xb4, 0x0, 0x6b7a4d2eaf42947d, 0x0, 0x0, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0x7}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x25}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x9}, {0x6, 0x16, 0x7f}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x7}, {0x8, 0xb, 0x1800000}}]}, 0xb4}}, 0x44000) 05:15:16 executing program 3: syz_clone(0x800000, 0x0, 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="92e6e181de94e25b7673b0ea39d29d9296b1b0c8c5a878f069df1e9af52b9318141fffd5dee425aae6abcdbfcc34a546a15627cb973b8410e115e6241e91daa9c8e1812033a13e8799797d9d268ee639e37428e40a33fa9951c6dd0ec2e9da8c") 05:15:16 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f0000000280)=@raw=[@cb_func, @kfunc], &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:16 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x2, &(0x7f0000000280)=@raw=[@cb_func], 0x0, 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:16 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x2, &(0x7f0000000280)=@raw=[@cb_func], 0x0, 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:16 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f0000000280)=@raw=[@cb_func, @kfunc], &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x64, 0x0, 0x6b7a4d2eaf42947d, 0x0, 0x0, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0x7}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x25}}]}, 0x64}}, 0x44000) 05:15:16 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x2, &(0x7f0000000280)=@raw=[@cb_func], &(0x7f0000000300)='GPL\x00', 0x0, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:18 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad", 0xb1, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:15:18 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x2, &(0x7f0000000280)=@raw=[@cb_func], &(0x7f0000000300)='GPL\x00', 0x0, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:18 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f0000000280)=@raw=[@cb_func, @kfunc], &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:18 executing program 2: syz_clone(0x0, &(0x7f00000002c0)="962afe0659a024b61a539cc3d083e1ae3f020ed204b257af91609a221979e1bff9c3ed357339ce58c0759e1c2fecb126c7514a9362073dee5afccf378aa3f251f7768c60daf10c7ad0f9e043abab91467eaccaa924ff1b573130dd0b45fa5787aeb37807c10befc57e18c0cb7330531211ef4f79", 0x74, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="92e6e181de94e25b7673b0ea39d29d9296b1b0c8c5a878f069df1e9af52b9318141fffd5dee425aae6abcdbfcc34a546a15627cb973b8410e115e6241e91daa9c8e1812033a13e8799797d9d268ee639e37428e40a33fa9951c6dd0ec2e9da8c") 05:15:18 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x14, 0x0, 0x6b7a4d2eaf42947d}, 0x14}}, 0x44000) 05:15:18 executing program 3: syz_clone(0x800000, 0x0, 0x0, 0x0, &(0x7f0000000380), &(0x7f00000003c0)="92e6e181de94e25b7673b0ea39d29d9296b1b0c8c5a878f069df1e9af52b9318141fffd5dee425aae6abcdbfcc34a546a15627cb973b8410e115e6241e91daa9c8e1812033a13e8799797d9d268ee639e37428e40a33fa9951c6dd0ec2e9da8c") 05:15:18 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)={0x14, 0x0, 0x6b7a4d2eaf42947d}, 0x14}}, 0x0) 05:15:18 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x2, &(0x7f0000000280)=@raw=[@cb_func], &(0x7f0000000300)='GPL\x00', 0x0, 0x8d, &(0x7f0000000900)=""/141, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:18 executing program 0: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f0000000280)=@raw=[@cb_func, @kfunc], &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:15:18 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x2, &(0x7f0000000280)=@raw=[@cb_func], &(0x7f0000000300)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:18 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x2, &(0x7f0000000280)=@raw=[@cb_func], &(0x7f0000000300)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:18 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b03", 0xa5, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:15:19 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x2, &(0x7f0000000280)=@raw=[@cb_func], &(0x7f0000000300)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:19 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b03", 0xa5, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:15:19 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad", 0xb1, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:15:19 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x2, &(0x7f0000000280)=@raw=[@cb_func], &(0x7f0000000300)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:19 executing program 3: syz_clone(0x800000, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)="92e6e181de94e25b7673b0ea39d29d9296b1b0c8c5a878f069df1e9af52b9318141fffd5dee425aae6abcdbfcc34a546a15627cb973b8410e115e6241e91daa9c8e1812033a13e8799797d9d268ee639e37428e40a33fa9951c6dd0ec2e9da8c") 05:15:19 executing program 2: syz_clone(0x0, &(0x7f00000002c0)="962afe0659a024b61a539cc3d083e1ae3f020ed204b257af91609a221979e1bff9c3ed357339ce58c0759e1c2fecb126c7514a9362073dee5afccf378aa3f251f7768c60daf10c7ad0f9e043abab91467eaccaa924ff1b573130dd0b45fa5787aeb37807c10befc57e18c0cb7330531211ef4f79", 0x74, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="92e6e181de94e25b7673b0ea39d29d9296b1b0c8c5a878f069df1e9af52b9318141fffd5dee425aae6abcdbfcc34a546a15627cb973b8410e115e6241e91daa9c8e1812033a13e8799797d9d268ee639e37428e40a33fa9951c6dd0ec2e9da8c") 05:15:19 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x2, &(0x7f0000000280)=@raw=[@cb_func], &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:19 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad", 0xb1, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:15:19 executing program 2: syz_clone(0x0, &(0x7f00000002c0)="962afe0659a024b61a539cc3d083e1ae3f020ed204b257af91609a221979e1bff9c3ed357339ce58c0759e1c2fecb126c7514a9362073dee5afccf378aa3f251f7768c60daf10c7ad0f9e043abab91467eaccaa924ff1b573130dd0b45fa5787aeb37807c10befc57e18c0cb7330531211ef4f79", 0x74, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="92e6e181de94e25b7673b0ea39d29d9296b1b0c8c5a878f069df1e9af52b9318141fffd5dee425aae6abcdbfcc34a546a15627cb973b8410e115e6241e91daa9c8e1812033a13e8799797d9d268ee639e37428e40a33fa9951c6dd0ec2e9da8c") 05:15:19 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x2, &(0x7f0000000280)=@raw=[@cb_func], &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:19 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x2, &(0x7f0000000280)=@raw=[@cb_func], &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:19 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x2, &(0x7f0000000280)=@raw=[@cb_func], &(0x7f0000000300)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:19 executing program 0: r0 = fcntl$getown(0xffffffffffffffff, 0x9) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan0\x00'}) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r2 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r1) pipe2$watch_queue(&(0x7f00000000c0), 0x80) r3 = getpgrp(0x0) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r4) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000180)={&(0x7f0000000700)={0x58, 0x0, 0x300, 0x70bd29, 0x25dfdbfc, {}, [@NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_PID={0x8, 0x1c, r0}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_NETNS_FD={0x8}, @NL802154_ATTR_NETNS_FD={0x8, 0x1d, r4}, @NL802154_ATTR_PID={0x8, 0x1c, r3}]}, 0x58}, 0x1, 0x0, 0x0, 0x4881}, 0x24000000) r5 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f0000000000), r5) bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) pipe2$watch_queue(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000680)={0x0, r6}, 0x10) pipe2$watch_queue(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) sendmsg$WG_CMD_GET_DEVICE(r7, &(0x7f00000002c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f00000003c0)=ANY=[@ANYBLOB="b8020000", @ANYRES16=r2, @ANYBLOB="000425bd4d00fddbdf0000000000080007000900000008000100", @ANYRES32=0x0, @ANYBLOB="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"], 0x2b8}, 0x1, 0x0, 0x0, 0x10}, 0x4000081) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f00000006c0), r8) 05:15:19 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x2, &(0x7f0000000280)=@raw=[@cb_func], &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:15:19 executing program 2: syz_clone(0x800000, 0x0, 0x0, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="92e6e181de94e25b7673b0ea39d29d9296b1b0c8c5a878f069df1e9af52b9318141fffd5dee425aae6abcdbfcc34a546a15627cb973b8410e115e6241e91daa9c8e1812033a13e8799797d9d268ee639e37428e40a33fa9951c6dd0ec2e9da8c") 05:15:19 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x2, &(0x7f0000000280)=@raw=[@cb_func], &(0x7f0000000300)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:19 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x2, &(0x7f0000000280)=@raw=[@cb_func], &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:15:19 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9", 0xb7, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:15:19 executing program 0: syz_clone(0x0, &(0x7f00000002c0)="962afe0659a024b61a539cc3d083e1ae3f020ed204b257af91609a221979e1bff9c3ed357339ce58c0759e1c2fecb126c7514a9362073dee5afccf378aa3f251f7768c60daf10c7ad0f9e043abab91467eaccaa924ff1b573130dd0b45fa5787aeb37807c10befc57e18c0cb7330531211ef4f79", 0x74, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0)="92e6e181de94e25b7673b0ea39d29d9296b1b0c8c5a878f069df1e9af52b9318141fffd5dee425aae6abcdbfcc34a546a15627cb973b8410e115e6241e91daa9c8e1812033a13e8799797d9d268ee639e37428e40a33fa9951c6dd0ec2e9da8c") 05:15:19 executing program 3: syz_clone(0x800000, 0x0, 0x0, 0x0, 0x0, 0x0) 05:15:19 executing program 5: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x2, &(0x7f0000000280)=@raw=[@cb_func], &(0x7f0000000300)='GPL\x00', 0x7, 0x8d, &(0x7f0000000900)=""/141, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:15:19 executing program 2: syz_clone(0x800000, 0x0, 0x0, 0x0, &(0x7f0000000380), &(0x7f00000003c0)="92e6e181de94e25b7673b0ea39d29d9296b1b0c8c5a878f069df1e9af52b9318141fffd5dee425aae6abcdbfcc34a546a15627cb973b8410e115e6241e91daa9c8e1812033a13e8799797d9d268ee639e37428e40a33fa9951c6dd0ec2e9da8c") 05:15:19 executing program 0: bpf$MAP_CREATE(0x4, &(0x7f0000002600)=@base={0x0, 0x0, 0xe97, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x48) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x9, 0x40040) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000004c0)={'ip6_vti0\x00', &(0x7f0000000440)={'syztnl0\x00', 0x0, 0x2f, 0x8, 0x7, 0x81, 0x0, @mcast1, @rand_addr=' \x01\x00', 0x7800, 0x1, 0x800, 0x7fffffff}}) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000580)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x3c, 0x0, 0x2, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x40}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x44}, 0x8040000) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000128bd7000fe0fd7250200000008001100010001000000220001000000"], 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x2000) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x50, r1, 0x120, 0x70bd26, 0x25dfdbfb, {}, [@FOU_ATTR_IPPROTO={0x5, 0x3, 0x5e}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e21}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_IFINDEX={0x5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @loopback}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e21}, @FOU_ATTR_TYPE={0x5, 0x4, 0x1}]}, 0x50}, 0x1, 0x0, 0x0, 0x8880}, 0x40000) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r4, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r4) sysfs$3(0x3) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r1, 0x0, 0x70bd28, 0x25dfdbfe, {}, [@FOU_ATTR_TYPE={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0xc00c081}, 0x8080) 05:15:19 executing program 5: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) socketpair(0x0, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2$watch_queue(&(0x7f0000004580)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000004600), r2) sendmsg$NL80211_CMD_SET_MAC_ACL(r3, &(0x7f0000004700)={&(0x7f00000045c0), 0xc, &(0x7f00000046c0)={&(0x7f0000004640)={0x7c, r4, 0x300, 0x70bd26, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MAC_ADDRS={0x58, 0xa6, 0x0, 0x1, [{0xa}, {0xa}, {0xa, 0x6, @broadcast}, {0xa}, {0xa, 0x6, @device_b}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}]}, @NL80211_ATTR_ACL_POLICY={0x8}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4804}, 0x81) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_GET_SCAN(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r4, 0x301, 0x70bd2a, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @val={0xc, 0x99, {0x10000, 0xb}}}}, ["", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4004000}, 0x8050) bpf$MAP_CREATE(0x5, &(0x7f0000002600), 0x48) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000004340), 0xffffffffffffffff) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r7, &(0x7f0000004800)={&(0x7f0000004740), 0xc, &(0x7f00000047c0)={&(0x7f0000004780)=ANY=[@ANYBLOB="1cc83d10", @ANYRES16=r6, @ANYBLOB="000026bd7000fddbdf2503000000080018007f000001"], 0x1c}}, 0x8005) socketpair(0x2c, 0xa, 0x55, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x54, r6, 0x10, 0x70bd2b, 0x25dfdbfc, {}, [@L2TP_ATTR_FD={0x8, 0x17, @l2tp=r8}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private0}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x81}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={'\x00', '\xff\xff', @multicast1}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000080}, 0x4000) 05:15:19 executing program 4: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 05:15:19 executing program 2: syz_clone(0x800000, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)="92e6e181de94e25b7673b0ea39d29d9296b1b0c8c5a878f069df1e9af52b9318141fffd5dee425aae6abcdbfcc34a546a15627cb973b8410e115e6241e91daa9c8e1812033a13e8799797d9d268ee639e37428e40a33fa9951c6dd0ec2e9da8c") 05:15:19 executing program 5: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) socketpair(0x0, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2$watch_queue(&(0x7f0000004580)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000004600), r2) sendmsg$NL80211_CMD_SET_MAC_ACL(r3, &(0x7f0000004700)={&(0x7f00000045c0), 0xc, &(0x7f00000046c0)={&(0x7f0000004640)={0x7c, r4, 0x300, 0x70bd26, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MAC_ADDRS={0x58, 0xa6, 0x0, 0x1, [{0xa}, {0xa}, {0xa, 0x6, @broadcast}, {0xa}, {0xa, 0x6, @device_b}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}]}, @NL80211_ATTR_ACL_POLICY={0x8}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4804}, 0x81) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_GET_SCAN(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r4, 0x301, 0x70bd2a, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @val={0xc, 0x99, {0x10000, 0xb}}}}, ["", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4004000}, 0x8050) bpf$MAP_CREATE(0x5, &(0x7f0000002600), 0x48) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000004340), 0xffffffffffffffff) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r7, &(0x7f0000004800)={&(0x7f0000004740), 0xc, &(0x7f00000047c0)={&(0x7f0000004780)=ANY=[@ANYBLOB="1cc83d10", @ANYRES16=r6, @ANYBLOB="000026bd7000fddbdf2503000000080018007f000001"], 0x1c}}, 0x8005) socketpair(0x2c, 0xa, 0x55, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x54, r6, 0x10, 0x70bd2b, 0x25dfdbfc, {}, [@L2TP_ATTR_FD={0x8, 0x17, @l2tp=r8}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private0}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x81}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={'\x00', '\xff\xff', @multicast1}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000080}, 0x4000) 05:15:19 executing program 2: syz_clone(0x800000, 0x0, 0x0, 0x0, 0x0, 0x0) 05:15:19 executing program 0: bpf$MAP_CREATE(0x4, &(0x7f0000002600)=@base={0x0, 0x0, 0xe97, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x48) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x9, 0x40040) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000004c0)={'ip6_vti0\x00', &(0x7f0000000440)={'syztnl0\x00', 0x0, 0x2f, 0x8, 0x7, 0x81, 0x0, @mcast1, @rand_addr=' \x01\x00', 0x7800, 0x1, 0x800, 0x7fffffff}}) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000580)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x3c, 0x0, 0x2, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x40}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x44}, 0x8040000) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000128bd7000fe0fd7250200000008001100010001000000220001000000"], 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x2000) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x50, r1, 0x120, 0x70bd26, 0x25dfdbfb, {}, [@FOU_ATTR_IPPROTO={0x5, 0x3, 0x5e}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e21}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_IFINDEX={0x5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @loopback}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e21}, @FOU_ATTR_TYPE={0x5, 0x4, 0x1}]}, 0x50}, 0x1, 0x0, 0x0, 0x8880}, 0x40000) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r4, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r4) sysfs$3(0x3) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r1, 0x0, 0x70bd28, 0x25dfdbfe, {}, [@FOU_ATTR_TYPE={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0xc00c081}, 0x8080) 05:15:20 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9", 0xb7, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:15:20 executing program 4: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 05:15:20 executing program 5: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) socketpair(0x0, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2$watch_queue(&(0x7f0000004580)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000004600), r2) sendmsg$NL80211_CMD_SET_MAC_ACL(r3, &(0x7f0000004700)={&(0x7f00000045c0), 0xc, &(0x7f00000046c0)={&(0x7f0000004640)={0x7c, r4, 0x300, 0x70bd26, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MAC_ADDRS={0x58, 0xa6, 0x0, 0x1, [{0xa}, {0xa}, {0xa, 0x6, @broadcast}, {0xa}, {0xa, 0x6, @device_b}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}]}, @NL80211_ATTR_ACL_POLICY={0x8}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4804}, 0x81) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_GET_SCAN(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r4, 0x301, 0x70bd2a, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r5}, @val={0xc, 0x99, {0x10000, 0xb}}}}, ["", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4004000}, 0x8050) bpf$MAP_CREATE(0x5, &(0x7f0000002600), 0x48) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000004340), 0xffffffffffffffff) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r7, &(0x7f0000004800)={&(0x7f0000004740), 0xc, &(0x7f00000047c0)={&(0x7f0000004780)=ANY=[@ANYBLOB="1cc83d10", @ANYRES16=r6, @ANYBLOB="000026bd7000fddbdf2503000000080018007f000001"], 0x1c}}, 0x8005) socketpair(0x2c, 0xa, 0x55, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$L2TP_CMD_SESSION_MODIFY(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x54, r6, 0x10, 0x70bd2b, 0x25dfdbfc, {}, [@L2TP_ATTR_FD={0x8, 0x17, @l2tp=r8}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @private0}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x81}, @L2TP_ATTR_UDP_SPORT={0x6, 0x1a, 0x4e22}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @ipv4={'\x00', '\xff\xff', @multicast1}}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000080}, 0x4000) 05:15:20 executing program 0: bpf$MAP_CREATE(0x4, &(0x7f0000002600)=@base={0x0, 0x0, 0xe97, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x48) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x9, 0x40040) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000004c0)={'ip6_vti0\x00', &(0x7f0000000440)={'syztnl0\x00', 0x0, 0x2f, 0x8, 0x7, 0x81, 0x0, @mcast1, @rand_addr=' \x01\x00', 0x7800, 0x1, 0x800, 0x7fffffff}}) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000580)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x3c, 0x0, 0x2, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x40}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x44}, 0x8040000) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000128bd7000fe0fd7250200000008001100010001000000220001000000"], 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x2000) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x50, r1, 0x120, 0x70bd26, 0x25dfdbfb, {}, [@FOU_ATTR_IPPROTO={0x5, 0x3, 0x5e}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e21}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_IFINDEX={0x5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @loopback}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e21}, @FOU_ATTR_TYPE={0x5, 0x4, 0x1}]}, 0x50}, 0x1, 0x0, 0x0, 0x8880}, 0x40000) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r4, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r4) sysfs$3(0x3) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r1, 0x0, 0x70bd28, 0x25dfdbfe, {}, [@FOU_ATTR_TYPE={0x5, 0x4, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0xc00c081}, 0x8080) 05:15:20 executing program 2: bpf$BPF_LINK_CREATE_XDP(0x6, 0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x9, 0x101200) pipe2$watch_queue(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r3) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1a, 0x39fb, 0x10001, 0x7ff, 0x2, 0x1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x48) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r5) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r6) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r7) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x8, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000008a9e0000000000009d000000186800000a000000000000000002000079bb8000fcff0000f8ffffff0000000400000000950000f800000000"], &(0x7f0000000100)='syzkaller\x00', 0xa2, 0x40, &(0x7f0000000140)=""/64, 0x40f00, 0x7, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f00000001c0)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000200)={0x3, 0x9, 0x6, 0x6d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r2, r3, r4, r5, r6, r7]}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x15, 0x0, 0xff, 0x80, 0x92, r0, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x3}, 0xfffffffffffffe5a) 05:15:20 executing program 3: syz_clone(0x800000, 0x0, 0x0, 0x0, 0x0, 0x0) 05:15:20 executing program 4: bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 05:15:20 executing program 2: bpf$BPF_LINK_CREATE_XDP(0x6, 0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x9, 0x101200) pipe2$watch_queue(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r3) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1a, 0x39fb, 0x10001, 0x7ff, 0x2, 0x1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x48) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r5) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r6) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r7) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x8, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000008a9e0000000000009d000000186800000a000000000000000002000079bb8000fcff0000f8ffffff0000000400000000950000f800000000"], &(0x7f0000000100)='syzkaller\x00', 0xa2, 0x40, &(0x7f0000000140)=""/64, 0x40f00, 0x7, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f00000001c0)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000200)={0x3, 0x9, 0x6, 0x6d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r2, r3, r4, r5, r6, r7]}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x15, 0x0, 0xff, 0x80, 0x92, r0, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x3}, 0xfffffffffffffe5a) 05:15:20 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x0, 0x0, &(0x7f0000000300)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:20 executing program 0: bpf$MAP_CREATE(0x4, &(0x7f0000002600)=@base={0x0, 0x0, 0xe97, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x48) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x9, 0x40040) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000004c0)={'ip6_vti0\x00', &(0x7f0000000440)={'syztnl0\x00', 0x0, 0x2f, 0x8, 0x7, 0x81, 0x0, @mcast1, @rand_addr=' \x01\x00', 0x7800, 0x1, 0x800, 0x7fffffff}}) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000580)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x3c, 0x0, 0x2, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x40}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x44}, 0x8040000) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000128bd7000fe0fd7250200000008001100010001000000220001000000"], 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x2000) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x50, r1, 0x120, 0x70bd26, 0x25dfdbfb, {}, [@FOU_ATTR_IPPROTO={0x5, 0x3, 0x5e}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e21}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_IFINDEX={0x5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @loopback}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e21}, @FOU_ATTR_TYPE={0x5, 0x4, 0x1}]}, 0x50}, 0x1, 0x0, 0x0, 0x8880}, 0x40000) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r4, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), r4) sysfs$3(0x3) 05:15:20 executing program 5: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) socketpair(0x0, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2$watch_queue(&(0x7f0000004580)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000004600), r1) sendmsg$NL80211_CMD_SET_MAC_ACL(r2, &(0x7f0000004700)={&(0x7f00000045c0), 0xc, &(0x7f00000046c0)={&(0x7f0000004640)={0x7c, r3, 0x300, 0x70bd26, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MAC_ADDRS={0x58, 0xa6, 0x0, 0x1, [{0xa}, {0xa}, {0xa, 0x6, @broadcast}, {0xa}, {0xa, 0x6, @device_b}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}]}, @NL80211_ATTR_ACL_POLICY={0x8}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4804}, 0x81) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_GET_SCAN(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r3, 0x301, 0x70bd2a, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x10000, 0xb}}}}, ["", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4004000}, 0x8050) bpf$MAP_CREATE(0x5, &(0x7f0000002600), 0x48) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000004340), 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r6, &(0x7f0000004800)={&(0x7f0000004740), 0xc, &(0x7f00000047c0)={&(0x7f0000004780)=ANY=[@ANYBLOB="1cc83d10", @ANYRES16=r5, @ANYBLOB="000026bd7000fddbdf2503000000080018007f000001"], 0x1c}}, 0x8005) socketpair(0x2c, 0xa, 0x55, &(0x7f00000001c0)) 05:15:20 executing program 5: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) socketpair(0x0, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2$watch_queue(&(0x7f0000004580)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000004600), r1) sendmsg$NL80211_CMD_SET_MAC_ACL(r2, &(0x7f0000004700)={&(0x7f00000045c0), 0xc, &(0x7f00000046c0)={&(0x7f0000004640)={0x7c, r3, 0x300, 0x70bd26, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MAC_ADDRS={0x58, 0xa6, 0x0, 0x1, [{0xa}, {0xa}, {0xa, 0x6, @broadcast}, {0xa}, {0xa, 0x6, @device_b}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}]}, @NL80211_ATTR_ACL_POLICY={0x8}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4804}, 0x81) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_GET_SCAN(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r3, 0x301, 0x70bd2a, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x10000, 0xb}}}}, ["", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4004000}, 0x8050) bpf$MAP_CREATE(0x5, &(0x7f0000002600), 0x48) syz_genetlink_get_family_id$l2tp(&(0x7f0000004340), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x2c, 0xa, 0x55, &(0x7f00000001c0)) 05:15:21 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9", 0xb7, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:15:21 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x0, 0x0, &(0x7f0000000300)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:21 executing program 2: bpf$BPF_LINK_CREATE_XDP(0x6, 0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x9, 0x101200) pipe2$watch_queue(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r3) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1a, 0x39fb, 0x10001, 0x7ff, 0x2, 0x1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x48) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r5) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r6) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r7) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x8, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000008a9e0000000000009d000000186800000a000000000000000002000079bb8000fcff0000f8ffffff0000000400000000950000f800000000"], &(0x7f0000000100)='syzkaller\x00', 0xa2, 0x40, &(0x7f0000000140)=""/64, 0x40f00, 0x7, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f00000001c0)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000200)={0x3, 0x9, 0x6, 0x6d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r2, r3, r4, r5, r6, r7]}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x15, 0x0, 0xff, 0x80, 0x92, r0, 0x100, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x3}, 0xfffffffffffffe5a) 05:15:21 executing program 5: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) socketpair(0x0, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2$watch_queue(&(0x7f0000004580)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000004600), r1) sendmsg$NL80211_CMD_SET_MAC_ACL(r2, &(0x7f0000004700)={&(0x7f00000045c0), 0xc, &(0x7f00000046c0)={&(0x7f0000004640)={0x7c, r3, 0x300, 0x70bd26, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MAC_ADDRS={0x58, 0xa6, 0x0, 0x1, [{0xa}, {0xa}, {0xa, 0x6, @broadcast}, {0xa}, {0xa, 0x6, @device_b}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}]}, @NL80211_ATTR_ACL_POLICY={0x8}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4804}, 0x81) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_GET_SCAN(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r3, 0x301, 0x70bd2a, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x10000, 0xb}}}}, ["", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4004000}, 0x8050) bpf$MAP_CREATE(0x5, &(0x7f0000002600), 0x48) syz_genetlink_get_family_id$l2tp(&(0x7f0000004340), 0xffffffffffffffff) socketpair(0x2c, 0xa, 0x55, &(0x7f00000001c0)) 05:15:21 executing program 3: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9", 0xb7, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:15:21 executing program 0: bpf$MAP_CREATE(0x4, &(0x7f0000002600)=@base={0x0, 0x0, 0xe97, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x48) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x9, 0x40040) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000004c0)={'ip6_vti0\x00', &(0x7f0000000440)={'syztnl0\x00', 0x0, 0x2f, 0x8, 0x7, 0x81, 0x0, @mcast1, @rand_addr=' \x01\x00', 0x7800, 0x1, 0x800, 0x7fffffff}}) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000580)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x3c, 0x0, 0x2, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x40}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x44}, 0x8040000) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000128bd7000fe0fd7250200000008001100010001000000220001000000"], 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x2000) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x50, r1, 0x120, 0x70bd26, 0x25dfdbfb, {}, [@FOU_ATTR_IPPROTO={0x5, 0x3, 0x5e}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e21}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_IFINDEX={0x5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @loopback}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e21}, @FOU_ATTR_TYPE={0x5, 0x4, 0x1}]}, 0x50}, 0x1, 0x0, 0x0, 0x8880}, 0x40000) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r4, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) sysfs$3(0x3) 05:15:21 executing program 0: bpf$MAP_CREATE(0x4, &(0x7f0000002600)=@base={0x0, 0x0, 0xe97, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x48) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x9, 0x40040) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000004c0)={'ip6_vti0\x00', &(0x7f0000000440)={'syztnl0\x00', 0x0, 0x2f, 0x8, 0x7, 0x81, 0x0, @mcast1, @rand_addr=' \x01\x00', 0x7800, 0x1, 0x800, 0x7fffffff}}) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000580)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x3c, 0x0, 0x2, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x40}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x44}, 0x8040000) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000128bd7000fe0fd7250200000008001100010001000000220001000000"], 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x2000) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x50, r1, 0x120, 0x70bd26, 0x25dfdbfb, {}, [@FOU_ATTR_IPPROTO={0x5, 0x3, 0x5e}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e21}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_IFINDEX={0x5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @loopback}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e21}, @FOU_ATTR_TYPE={0x5, 0x4, 0x1}]}, 0x50}, 0x1, 0x0, 0x0, 0x8880}, 0x40000) socket$nl_generic(0x10, 0x3, 0x10) sysfs$3(0x3) 05:15:21 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x0, 0x0, &(0x7f0000000300)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:21 executing program 2: bpf$BPF_LINK_CREATE_XDP(0x6, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000000), 0x9, 0x101200) pipe2$watch_queue(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r1) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1a, 0x39fb, 0x10001, 0x7ff, 0x2, 0x1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x48) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r4) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r5) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r6) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x8, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000008a9e0000000000009d000000186800000a000000000000000002000079bb8000fcff0000f8ffffff0000000400000000950000f800000000"], &(0x7f0000000100)='syzkaller\x00', 0xa2, 0x40, &(0x7f0000000140)=""/64, 0x40f00, 0x7, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f00000001c0)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000200)={0x3, 0x9, 0x6, 0x6d}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r1, r2, r3, r4, r5, r6]}, 0x80) 05:15:21 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x0, &(0x7f0000000280), &(0x7f0000000300)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:21 executing program 5: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) socketpair(0x0, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2$watch_queue(&(0x7f0000004580)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000004600), r1) sendmsg$NL80211_CMD_SET_MAC_ACL(r2, &(0x7f0000004700)={&(0x7f00000045c0), 0xc, &(0x7f00000046c0)={&(0x7f0000004640)={0x7c, r3, 0x300, 0x70bd26, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MAC_ADDRS={0x58, 0xa6, 0x0, 0x1, [{0xa}, {0xa}, {0xa, 0x6, @broadcast}, {0xa}, {0xa, 0x6, @device_b}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}]}, @NL80211_ATTR_ACL_POLICY={0x8}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4804}, 0x81) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_GET_SCAN(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r3, 0x301, 0x70bd2a, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x10000, 0xb}}}}, ["", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4004000}, 0x8050) bpf$MAP_CREATE(0x5, &(0x7f0000002600), 0x48) socketpair(0x2c, 0xa, 0x55, &(0x7f00000001c0)) 05:15:21 executing program 0: bpf$MAP_CREATE(0x4, &(0x7f0000002600)=@base={0x0, 0x0, 0xe97, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x48) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x9, 0x40040) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r2, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000004c0)={'ip6_vti0\x00', &(0x7f0000000440)={'syztnl0\x00', 0x0, 0x2f, 0x8, 0x7, 0x81, 0x0, @mcast1, @rand_addr=' \x01\x00', 0x7800, 0x1, 0x800, 0x7fffffff}}) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000580)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x3c, 0x0, 0x2, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x40}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x44}, 0x8040000) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000128bd7000fe0fd7250200000008001100010001000000220001000000"], 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x2000) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x50, r1, 0x120, 0x70bd26, 0x25dfdbfb, {}, [@FOU_ATTR_IPPROTO={0x5, 0x3, 0x5e}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e21}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_IFINDEX={0x5}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @loopback}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e21}, @FOU_ATTR_TYPE={0x5, 0x4, 0x1}]}, 0x50}, 0x1, 0x0, 0x0, 0x8880}, 0x40000) sysfs$3(0x3) 05:15:21 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236f", 0xba, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:15:21 executing program 3: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9", 0xb7, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:15:21 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x0, &(0x7f0000000280), &(0x7f0000000300)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:21 executing program 2: bpf$BPF_LINK_CREATE_XDP(0x6, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000000), 0x9, 0x101200) pipe2$watch_queue(&(0x7f0000000180), 0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r1) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1a, 0x39fb, 0x10001, 0x7ff, 0x2, 0x1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x48) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r3) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r4) 05:15:21 executing program 0: bpf$MAP_CREATE(0x4, &(0x7f0000002600)=@base={0x0, 0x0, 0xe97, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x48) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x9, 0x40040) syz_genetlink_get_family_id$fou(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000004c0)={'ip6_vti0\x00', &(0x7f0000000440)={'syztnl0\x00', 0x0, 0x2f, 0x8, 0x7, 0x81, 0x0, @mcast1, @rand_addr=' \x01\x00', 0x7800, 0x1, 0x800, 0x7fffffff}}) sendmsg$BATADV_CMD_GET_GATEWAYS(r1, &(0x7f0000000580)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x3c, 0x0, 0x2, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x40}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r2}]}, 0x3c}, 0x1, 0x0, 0x0, 0x44}, 0x8040000) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000128bd7000fe0fd7250200000008001100010001000000220001000000"], 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x2000) sysfs$3(0x3) 05:15:21 executing program 5: pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) socketpair(0x0, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2$watch_queue(&(0x7f0000004580)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000004600), r1) sendmsg$NL80211_CMD_SET_MAC_ACL(r2, &(0x7f0000004700)={&(0x7f00000045c0), 0xc, &(0x7f00000046c0)={&(0x7f0000004640)={0x7c, r3, 0x300, 0x70bd26, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MAC_ADDRS={0x58, 0xa6, 0x0, 0x1, [{0xa}, {0xa}, {0xa, 0x6, @broadcast}, {0xa}, {0xa, 0x6, @device_b}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}]}, @NL80211_ATTR_ACL_POLICY={0x8}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4804}, 0x81) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_GET_SCAN(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r3, 0x301, 0x70bd2a, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r4}, @val={0xc, 0x99, {0x10000, 0xb}}}}, ["", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4004000}, 0x8050) socketpair(0x2c, 0xa, 0x55, &(0x7f00000001c0)) 05:15:21 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x0, &(0x7f0000000280), &(0x7f0000000300)='GPL\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:21 executing program 0: bpf$MAP_CREATE(0x4, &(0x7f0000002600)=@base={0x0, 0x0, 0xe97, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x48) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x9, 0x40040) syz_genetlink_get_family_id$fou(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000004c0)={'ip6_vti0\x00', &(0x7f0000000440)={'syztnl0\x00', 0x0, 0x2f, 0x8, 0x7, 0x81, 0x0, @mcast1, @rand_addr=' \x01\x00', 0x7800, 0x1, 0x800, 0x7fffffff}}) sendmsg$BATADV_CMD_GET_GATEWAYS(r1, &(0x7f0000000580)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x3c, 0x0, 0x2, 0x70bd2d, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x40}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r2}]}, 0x3c}, 0x1, 0x0, 0x0, 0x44}, 0x8040000) sysfs$3(0x3) 05:15:22 executing program 2: bpf$BPF_LINK_CREATE_XDP(0x6, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000000), 0x9, 0x101200) pipe2$watch_queue(&(0x7f0000000180), 0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r1) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1a, 0x39fb, 0x10001, 0x7ff, 0x2, 0x1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x48) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r3) pipe2$watch_queue(&(0x7f0000000380), 0x80) 05:15:22 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x2, &(0x7f0000000280)=@raw=[@cb_func], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:22 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x2, &(0x7f0000000280)=@raw=[@cb_func], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:22 executing program 5: pipe2$watch_queue(&(0x7f0000000000), 0x80) socketpair(0x0, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2$watch_queue(&(0x7f0000004580)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000004600), r0) sendmsg$NL80211_CMD_SET_MAC_ACL(r1, &(0x7f0000004700)={&(0x7f00000045c0), 0xc, &(0x7f00000046c0)={&(0x7f0000004640)={0x7c, r2, 0x300, 0x70bd26, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MAC_ADDRS={0x58, 0xa6, 0x0, 0x1, [{0xa}, {0xa}, {0xa, 0x6, @broadcast}, {0xa}, {0xa, 0x6, @device_b}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}]}, @NL80211_ATTR_ACL_POLICY={0x8}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4804}, 0x81) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) socketpair(0x2c, 0xa, 0x55, &(0x7f00000001c0)) 05:15:22 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236f", 0xba, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:15:22 executing program 2: bpf$BPF_LINK_CREATE_XDP(0x6, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000000), 0x9, 0x101200) pipe2$watch_queue(&(0x7f0000000180), 0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r1) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1a, 0x39fb, 0x10001, 0x7ff, 0x2, 0x1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x48) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r3) 05:15:22 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x2, &(0x7f0000000280)=@raw=[@cb_func], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:22 executing program 5: pipe2$watch_queue(&(0x7f0000000000), 0x80) socketpair(0x0, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2$watch_queue(&(0x7f0000004580)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000004600), r0) sendmsg$NL80211_CMD_SET_MAC_ACL(r1, &(0x7f0000004700)={&(0x7f00000045c0), 0xc, &(0x7f00000046c0)={&(0x7f0000004640)={0x7c, r2, 0x300, 0x70bd26, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MAC_ADDRS={0x58, 0xa6, 0x0, 0x1, [{0xa}, {0xa}, {0xa, 0x6, @broadcast}, {0xa}, {0xa, 0x6, @device_b}, {0xa, 0x6, @broadcast}, {0xa, 0x6, @broadcast}]}, @NL80211_ATTR_ACL_POLICY={0x8}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4804}, 0x81) socketpair(0x2c, 0xa, 0x55, &(0x7f00000001c0)) 05:15:22 executing program 3: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9", 0xb7, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:15:22 executing program 0: bpf$MAP_CREATE(0x4, &(0x7f0000002600)=@base={0x0, 0x0, 0xe97, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x48) r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x9, 0x40040) syz_genetlink_get_family_id$fou(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r1, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f00000004c0)={'ip6_vti0\x00', &(0x7f0000000440)={'syztnl0\x00', 0x0, 0x2f, 0x8, 0x7, 0x81, 0x0, @mcast1, @rand_addr=' \x01\x00', 0x7800, 0x1, 0x800, 0x7fffffff}}) sysfs$3(0x3) 05:15:22 executing program 0: bpf$MAP_CREATE(0x4, &(0x7f0000002600)=@base={0x0, 0x0, 0xe97, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x48) syz_open_dev$vcsn(&(0x7f0000000000), 0x9, 0x40040) syz_genetlink_get_family_id$fou(&(0x7f0000000080), 0xffffffffffffffff) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) sysfs$3(0x3) 05:15:22 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x2, &(0x7f0000000280)=@raw=[@cb_func], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:22 executing program 2: bpf$BPF_LINK_CREATE_XDP(0x6, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000000), 0x9, 0x101200) pipe2$watch_queue(&(0x7f0000000180), 0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r1) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1a, 0x39fb, 0x10001, 0x7ff, 0x2, 0x1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x48) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) pipe2$watch_queue(&(0x7f0000000380), 0x80) 05:15:22 executing program 0: bpf$MAP_CREATE(0x4, &(0x7f0000002600)=@base={0x0, 0x0, 0xe97, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x48) syz_open_dev$vcsn(&(0x7f0000000000), 0x9, 0x40040) syz_genetlink_get_family_id$fou(&(0x7f0000000080), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) sysfs$3(0x3) 05:15:22 executing program 2: bpf$BPF_LINK_CREATE_XDP(0x6, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000000), 0x9, 0x101200) pipe2$watch_queue(&(0x7f0000000180), 0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r1) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1a, 0x39fb, 0x10001, 0x7ff, 0x2, 0x1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x48) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r2) 05:15:22 executing program 5: pipe2$watch_queue(&(0x7f0000000000), 0x80) socketpair(0x0, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2$watch_queue(&(0x7f0000004580), 0x80) syz_genetlink_get_family_id$nl80211(&(0x7f0000004600), r0) socketpair(0x2c, 0xa, 0x55, &(0x7f00000001c0)) 05:15:22 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236f", 0xba, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:15:22 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x2, &(0x7f0000000280)=@raw=[@cb_func], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x5, 0x5}, 0x8, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:22 executing program 0: bpf$MAP_CREATE(0x4, &(0x7f0000002600)=@base={0x0, 0x0, 0xe97, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x48) syz_open_dev$vcsn(&(0x7f0000000000), 0x9, 0x40040) syz_genetlink_get_family_id$fou(&(0x7f0000000080), 0xffffffffffffffff) sysfs$3(0x3) 05:15:22 executing program 2: bpf$BPF_LINK_CREATE_XDP(0x6, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000000), 0x9, 0x101200) pipe2$watch_queue(&(0x7f0000000180), 0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r1) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1a, 0x39fb, 0x10001, 0x7ff, 0x2, 0x1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x48) pipe2$watch_queue(&(0x7f0000000380), 0x80) 05:15:22 executing program 5: pipe2$watch_queue(&(0x7f0000000000), 0x80) socketpair(0x0, 0x1, 0x0, &(0x7f0000000500)) pipe2$watch_queue(&(0x7f0000004580), 0x80) socketpair(0x2c, 0xa, 0x55, &(0x7f00000001c0)) 05:15:22 executing program 3: r0 = bpf$MAP_CREATE(0x5, &(0x7f0000002600), 0x48) pipe2$watch_queue(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000300)={'syztnl1\x00', &(0x7f0000000480)={'gre0\x00', 0x0, 0x47, 0x8, 0x0, 0x0, {{0x2a, 0x4, 0x0, 0x1, 0xa8, 0x68, 0x0, 0x1, 0x2f, 0x0, @loopback, @local, {[@end, @cipso={0x86, 0x26, 0x1, [{0x0, 0x10, "c45bf0f3a5cb3f5ce6c88c037d38"}, {0x2, 0x5, "627c91"}, {0x5, 0x2}, {0x5, 0x9, "a4eeb9886352e9"}]}, @timestamp_addr={0x44, 0xc, 0xd1, 0x1, 0x0, [{@broadcast, 0x6}]}, @timestamp_addr={0x44, 0x24, 0xd7, 0x1, 0x5, [{@remote, 0x7}, {@dev={0xac, 0x14, 0x14, 0x14}, 0x80}, {@local, 0x80000001}, {@empty, 0x9}]}, @cipso={0x86, 0x19, 0x3, [{0x6, 0x7, "4494a3a3b5"}, {0x7, 0xc, "b0a822cc652875de5380"}]}, @timestamp={0x44, 0x14, 0x46, 0x0, 0x5, [0x8000, 0xfffffffd, 0xffffffe0, 0x1]}, @ssrr={0x89, 0xb, 0xc, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @end, @ra={0x94, 0x4, 0x1}]}}}}}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x12, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3f}, [@btf_id={0x18, 0x5, 0x3, 0x0, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x0, 0x2, 0xb, 0x6, 0xfffffffffffffef8, 0xffffffffffffffff}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3e45, 0x0, 0x0, 0x0, 0x400}, @cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffffe}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xffffffffffffffff}, @cb_func={0x18, 0x6, 0x4, 0x0, 0x5}]}, &(0x7f0000000280)='syzkaller\x00', 0x18f84cde, 0x0, 0x0, 0x41100, 0x18, '\x00', r2, 0x0, r1, 0x8, &(0x7f0000000580)={0x2, 0x3}, 0x8, 0x10, &(0x7f00000005c0)={0x0, 0xc, 0x5, 0x35}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000600)=[r0]}, 0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r3) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="c1dcaebc067e25831b6f661d97970709000000008a1700002b0000", @ANYRES32=r0, @ANYBLOB="0000000004000000"], &(0x7f0000000040)='GPL\x00', 0x3, 0x8b, &(0x7f0000000080)=""/139, 0x41100, 0x1, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000140)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0xd, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[r3, r0, r4, r0, r0]}, 0x80) 05:15:22 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x2, &(0x7f0000000280)=@raw=[@cb_func], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0)={0x3, 0x10, 0xd74, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:22 executing program 0: bpf$MAP_CREATE(0x4, &(0x7f0000002600)=@base={0x0, 0x0, 0xe97, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x48) syz_open_dev$vcsn(&(0x7f0000000000), 0x9, 0x40040) sysfs$3(0x3) 05:15:22 executing program 2: bpf$BPF_LINK_CREATE_XDP(0x6, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000000), 0x9, 0x101200) pipe2$watch_queue(&(0x7f0000000180), 0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r1) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1a, 0x39fb, 0x10001, 0x7ff, 0x2, 0x1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x48) 05:15:22 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x2, &(0x7f0000000280)=@raw=[@cb_func], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:22 executing program 2: bpf$BPF_LINK_CREATE_XDP(0x6, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000000), 0x9, 0x101200) pipe2$watch_queue(&(0x7f0000000180), 0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) pipe2$watch_queue(&(0x7f0000000380), 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1a, 0x39fb, 0x10001, 0x7ff, 0x2, 0x1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x48) 05:15:22 executing program 0: bpf$MAP_CREATE(0x4, &(0x7f0000002600)=@base={0x0, 0x0, 0xe97, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4}, 0x48) sysfs$3(0x3) 05:15:23 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe1", 0xbb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:15:23 executing program 4: bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x2, &(0x7f0000000280)=@raw=[@cb_func], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) 05:15:23 executing program 0: sysfs$3(0x3) 05:15:23 executing program 2: bpf$BPF_LINK_CREATE_XDP(0x6, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000000), 0x9, 0x101200) pipe2$watch_queue(&(0x7f0000000180), 0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1a, 0x39fb, 0x10001, 0x7ff, 0x2, 0x1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x48) 05:15:23 executing program 5: pipe2$watch_queue(&(0x7f0000000000), 0x80) socketpair(0x0, 0x1, 0x0, &(0x7f0000000500)) socketpair(0x2c, 0xa, 0x55, &(0x7f00000001c0)) 05:15:23 executing program 3: r0 = bpf$MAP_CREATE(0x5, &(0x7f0000002600), 0x48) pipe2$watch_queue(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000300)={'syztnl1\x00', &(0x7f0000000480)={'gre0\x00', 0x0, 0x47, 0x8, 0x0, 0x0, {{0x2a, 0x4, 0x0, 0x1, 0xa8, 0x68, 0x0, 0x1, 0x2f, 0x0, @loopback, @local, {[@end, @cipso={0x86, 0x26, 0x1, [{0x0, 0x10, "c45bf0f3a5cb3f5ce6c88c037d38"}, {0x2, 0x5, "627c91"}, {0x5, 0x2}, {0x5, 0x9, "a4eeb9886352e9"}]}, @timestamp_addr={0x44, 0xc, 0xd1, 0x1, 0x0, [{@broadcast, 0x6}]}, @timestamp_addr={0x44, 0x24, 0xd7, 0x1, 0x5, [{@remote, 0x7}, {@dev={0xac, 0x14, 0x14, 0x14}, 0x80}, {@local, 0x80000001}, {@empty, 0x9}]}, @cipso={0x86, 0x19, 0x3, [{0x6, 0x7, "4494a3a3b5"}, {0x7, 0xc, "b0a822cc652875de5380"}]}, @timestamp={0x44, 0x14, 0x46, 0x0, 0x5, [0x8000, 0xfffffffd, 0xffffffe0, 0x1]}, @ssrr={0x89, 0xb, 0xc, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @end, @ra={0x94, 0x4, 0x1}]}}}}}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x12, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3f}, [@btf_id={0x18, 0x5, 0x3, 0x0, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x0, 0x2, 0xb, 0x6, 0xfffffffffffffef8, 0xffffffffffffffff}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3e45, 0x0, 0x0, 0x0, 0x400}, @cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffffe}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xffffffffffffffff}, @cb_func={0x18, 0x6, 0x4, 0x0, 0x5}]}, &(0x7f0000000280)='syzkaller\x00', 0x18f84cde, 0x0, 0x0, 0x41100, 0x18, '\x00', r2, 0x0, r1, 0x8, &(0x7f0000000580)={0x2, 0x3}, 0x8, 0x10, &(0x7f00000005c0)={0x0, 0xc, 0x5, 0x35}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000600)=[r0]}, 0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r3) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="c1dcaebc067e25831b6f661d97970709000000008a1700002b0000", @ANYRES32=r0, @ANYBLOB="0000000004000000"], &(0x7f0000000040)='GPL\x00', 0x3, 0x8b, &(0x7f0000000080)=""/139, 0x41100, 0x1, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000140)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0xd, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[r3, r0, r4, r0, r0]}, 0x80) 05:15:23 executing program 4: r0 = bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r1 = request_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='\x00', 0x0) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) socketpair(0x9, 0x2, 0x1ff, &(0x7f0000000240)) keyctl$reject(0x13, r1, 0x42, 0x7, r2) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140)="12f1d733f59103cff8777d006360f1419176093e5c77f6", &(0x7f0000000180)=@buf="382d61a70ceff1ebf446ce135876ef59048bd6fde3022028fe6d2c4302f23b5b29f26609cf9e13abc6e7a85d69cf1606c8705b72e4032a9dc9087a534d64e0f15b4db6e68c93187662cbd406118314efa59ec072337f961e097de19997112b1c6d8b8f68f2af0146d1a69a5b488b541c20e5cacb02f19e52", 0x2}, 0x20) socket$l2tp(0x2, 0x2, 0x73) 05:15:23 executing program 2: bpf$BPF_LINK_CREATE_XDP(0x6, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000000), 0x9, 0x101200) pipe2$watch_queue(&(0x7f0000000180), 0x80) pipe2$watch_queue(&(0x7f0000000380), 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1a, 0x39fb, 0x10001, 0x7ff, 0x2, 0x1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x48) 05:15:23 executing program 0: r0 = bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r1 = request_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='\x00', 0x0) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) socketpair(0x9, 0x2, 0x1ff, &(0x7f0000000240)) keyctl$reject(0x13, r1, 0x42, 0x7, r2) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140)="12f1d733f59103cff8777d006360f1419176093e5c77f6", &(0x7f0000000180)=@buf="382d61a70ceff1ebf446ce135876ef59048bd6fde3022028fe6d2c4302f23b5b29f26609cf9e13abc6e7a85d69cf1606c8705b72e4032a9dc9087a534d64e0f15b4db6e68c93187662cbd406118314efa59ec072337f961e097de19997112b1c6d8b8f68f2af0146d1a69a5b488b541c20e5cacb02f19e52", 0x2}, 0x20) socket$l2tp(0x2, 0x2, 0x73) 05:15:23 executing program 4: r0 = bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r1 = request_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='\x00', 0x0) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) socketpair(0x9, 0x2, 0x1ff, &(0x7f0000000240)) keyctl$reject(0x13, r1, 0x42, 0x7, r2) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140)="12f1d733f59103cff8777d006360f1419176093e5c77f6", &(0x7f0000000180)=@buf="382d61a70ceff1ebf446ce135876ef59048bd6fde3022028fe6d2c4302f23b5b29f26609cf9e13abc6e7a85d69cf1606c8705b72e4032a9dc9087a534d64e0f15b4db6e68c93187662cbd406118314efa59ec072337f961e097de19997112b1c6d8b8f68f2af0146d1a69a5b488b541c20e5cacb02f19e52", 0x2}, 0x20) socket$l2tp(0x2, 0x2, 0x73) 05:15:23 executing program 3: r0 = bpf$MAP_CREATE(0x5, &(0x7f0000002600), 0x48) pipe2$watch_queue(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000300)={'syztnl1\x00', &(0x7f0000000480)={'gre0\x00', 0x0, 0x47, 0x8, 0x0, 0x0, {{0x2a, 0x4, 0x0, 0x1, 0xa8, 0x68, 0x0, 0x1, 0x2f, 0x0, @loopback, @local, {[@end, @cipso={0x86, 0x26, 0x1, [{0x0, 0x10, "c45bf0f3a5cb3f5ce6c88c037d38"}, {0x2, 0x5, "627c91"}, {0x5, 0x2}, {0x5, 0x9, "a4eeb9886352e9"}]}, @timestamp_addr={0x44, 0xc, 0xd1, 0x1, 0x0, [{@broadcast, 0x6}]}, @timestamp_addr={0x44, 0x24, 0xd7, 0x1, 0x5, [{@remote, 0x7}, {@dev={0xac, 0x14, 0x14, 0x14}, 0x80}, {@local, 0x80000001}, {@empty, 0x9}]}, @cipso={0x86, 0x19, 0x3, [{0x6, 0x7, "4494a3a3b5"}, {0x7, 0xc, "b0a822cc652875de5380"}]}, @timestamp={0x44, 0x14, 0x46, 0x0, 0x5, [0x8000, 0xfffffffd, 0xffffffe0, 0x1]}, @ssrr={0x89, 0xb, 0xc, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @end, @ra={0x94, 0x4, 0x1}]}}}}}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x12, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3f}, [@btf_id={0x18, 0x5, 0x3, 0x0, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x0, 0x2, 0xb, 0x6, 0xfffffffffffffef8, 0xffffffffffffffff}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3e45, 0x0, 0x0, 0x0, 0x400}, @cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffffe}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xffffffffffffffff}, @cb_func={0x18, 0x6, 0x4, 0x0, 0x5}]}, &(0x7f0000000280)='syzkaller\x00', 0x18f84cde, 0x0, 0x0, 0x41100, 0x18, '\x00', r2, 0x0, r1, 0x8, &(0x7f0000000580)={0x2, 0x3}, 0x8, 0x10, &(0x7f00000005c0)={0x0, 0xc, 0x5, 0x35}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000600)=[r0]}, 0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r3) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="c1dcaebc067e25831b6f661d97970709000000008a1700002b0000", @ANYRES32=r0, @ANYBLOB="0000000004000000"], &(0x7f0000000040)='GPL\x00', 0x3, 0x8b, &(0x7f0000000080)=""/139, 0x41100, 0x1, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000140)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0xd, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[r3, r0, r4, r0, r0]}, 0x80) 05:15:23 executing program 5: pipe2$watch_queue(&(0x7f0000000000), 0x80) socketpair(0x2c, 0xa, 0x55, &(0x7f00000001c0)) 05:15:23 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe1", 0xbb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:15:23 executing program 2: bpf$BPF_LINK_CREATE_XDP(0x6, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000000), 0x9, 0x101200) pipe2$watch_queue(&(0x7f0000000180), 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1a, 0x39fb, 0x10001, 0x7ff, 0x2, 0x1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x48) 05:15:23 executing program 0: r0 = bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r1 = request_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='\x00', 0x0) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) socketpair(0x9, 0x2, 0x1ff, &(0x7f0000000240)) keyctl$reject(0x13, r1, 0x42, 0x7, r2) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140)="12f1d733f59103cff8777d006360f1419176093e5c77f6", &(0x7f0000000180)=@buf="382d61a70ceff1ebf446ce135876ef59048bd6fde3022028fe6d2c4302f23b5b29f26609cf9e13abc6e7a85d69cf1606c8705b72e4032a9dc9087a534d64e0f15b4db6e68c93187662cbd406118314efa59ec072337f961e097de19997112b1c6d8b8f68f2af0146d1a69a5b488b541c20e5cacb02f19e52", 0x2}, 0x20) socket$l2tp(0x2, 0x2, 0x73) 05:15:23 executing program 5: socketpair(0x2c, 0xa, 0x55, &(0x7f00000001c0)) 05:15:23 executing program 4: r0 = bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r1 = request_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='\x00', 0x0) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) socketpair(0x9, 0x2, 0x1ff, &(0x7f0000000240)) keyctl$reject(0x13, r1, 0x42, 0x7, r2) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140)="12f1d733f59103cff8777d006360f1419176093e5c77f6", &(0x7f0000000180)=@buf="382d61a70ceff1ebf446ce135876ef59048bd6fde3022028fe6d2c4302f23b5b29f26609cf9e13abc6e7a85d69cf1606c8705b72e4032a9dc9087a534d64e0f15b4db6e68c93187662cbd406118314efa59ec072337f961e097de19997112b1c6d8b8f68f2af0146d1a69a5b488b541c20e5cacb02f19e52", 0x2}, 0x20) socket$l2tp(0x2, 0x2, 0x73) 05:15:23 executing program 3: r0 = bpf$MAP_CREATE(0x5, &(0x7f0000002600), 0x48) pipe2$watch_queue(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000300)={'syztnl1\x00', &(0x7f0000000480)={'gre0\x00', 0x0, 0x47, 0x8, 0x0, 0x0, {{0x2a, 0x4, 0x0, 0x1, 0xa8, 0x68, 0x0, 0x1, 0x2f, 0x0, @loopback, @local, {[@end, @cipso={0x86, 0x26, 0x1, [{0x0, 0x10, "c45bf0f3a5cb3f5ce6c88c037d38"}, {0x2, 0x5, "627c91"}, {0x5, 0x2}, {0x5, 0x9, "a4eeb9886352e9"}]}, @timestamp_addr={0x44, 0xc, 0xd1, 0x1, 0x0, [{@broadcast, 0x6}]}, @timestamp_addr={0x44, 0x24, 0xd7, 0x1, 0x5, [{@remote, 0x7}, {@dev={0xac, 0x14, 0x14, 0x14}, 0x80}, {@local, 0x80000001}, {@empty, 0x9}]}, @cipso={0x86, 0x19, 0x3, [{0x6, 0x7, "4494a3a3b5"}, {0x7, 0xc, "b0a822cc652875de5380"}]}, @timestamp={0x44, 0x14, 0x46, 0x0, 0x5, [0x8000, 0xfffffffd, 0xffffffe0, 0x1]}, @ssrr={0x89, 0xb, 0xc, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @end, @ra={0x94, 0x4, 0x1}]}}}}}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x12, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3f}, [@btf_id={0x18, 0x5, 0x3, 0x0, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x0, 0x2, 0xb, 0x6, 0xfffffffffffffef8, 0xffffffffffffffff}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3e45, 0x0, 0x0, 0x0, 0x400}, @cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffffe}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xffffffffffffffff}, @cb_func={0x18, 0x6, 0x4, 0x0, 0x5}]}, &(0x7f0000000280)='syzkaller\x00', 0x18f84cde, 0x0, 0x0, 0x41100, 0x18, '\x00', r2, 0x0, r1, 0x8, &(0x7f0000000580)={0x2, 0x3}, 0x8, 0x10, &(0x7f00000005c0)={0x0, 0xc, 0x5, 0x35}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000600)=[r0]}, 0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r3) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="c1dcaebc067e25831b6f661d97970709000000008a1700002b0000", @ANYRES32=r0, @ANYBLOB="0000000004000000"], &(0x7f0000000040)='GPL\x00', 0x3, 0x8b, &(0x7f0000000080)=""/139, 0x41100, 0x1, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000140)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0xd, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[r3, r0, r4, r0, r0]}, 0x80) 05:15:23 executing program 0: r0 = bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r1 = request_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='\x00', 0x0) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) socketpair(0x9, 0x2, 0x1ff, &(0x7f0000000240)) keyctl$reject(0x13, r1, 0x42, 0x7, r2) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140)="12f1d733f59103cff8777d006360f1419176093e5c77f6", &(0x7f0000000180)=@buf="382d61a70ceff1ebf446ce135876ef59048bd6fde3022028fe6d2c4302f23b5b29f26609cf9e13abc6e7a85d69cf1606c8705b72e4032a9dc9087a534d64e0f15b4db6e68c93187662cbd406118314efa59ec072337f961e097de19997112b1c6d8b8f68f2af0146d1a69a5b488b541c20e5cacb02f19e52", 0x2}, 0x20) socket$l2tp(0x2, 0x2, 0x73) 05:15:23 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = request_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='\x00', 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) socketpair(0x9, 0x2, 0x1ff, &(0x7f0000000240)) keyctl$reject(0x13, r0, 0x42, 0x7, r1) socket$l2tp(0x2, 0x2, 0x73) 05:15:23 executing program 5: socketpair(0x0, 0xa, 0x55, &(0x7f00000001c0)) 05:15:23 executing program 2: bpf$BPF_LINK_CREATE_XDP(0x6, 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000000), 0x9, 0x101200) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1a, 0x39fb, 0x10001, 0x7ff, 0x2, 0x1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x48) 05:15:23 executing program 0: r0 = bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r1 = request_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='\x00', 0x0) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) socketpair(0x9, 0x2, 0x1ff, &(0x7f0000000240)) keyctl$reject(0x13, r1, 0x42, 0x7, r2) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140)="12f1d733f59103cff8777d006360f1419176093e5c77f6", &(0x7f0000000180)=@buf="382d61a70ceff1ebf446ce135876ef59048bd6fde3022028fe6d2c4302f23b5b29f26609cf9e13abc6e7a85d69cf1606c8705b72e4032a9dc9087a534d64e0f15b4db6e68c93187662cbd406118314efa59ec072337f961e097de19997112b1c6d8b8f68f2af0146d1a69a5b488b541c20e5cacb02f19e52", 0x2}, 0x20) 05:15:23 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) request_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='\x00', 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) socketpair(0x9, 0x2, 0x1ff, &(0x7f0000000240)) socket$l2tp(0x2, 0x2, 0x73) [ 308.399491][ T9695] ================================================================== [ 308.407617][ T9695] BUG: KCSAN: data-race in blk_mq_dispatch_rq_list / blk_mq_do_dispatch_sched [ 308.416488][ T9695] [ 308.418809][ T9695] write to 0xffff888101aef0f8 of 4 bytes by task 41 on cpu 1: [ 308.426271][ T9695] blk_mq_dispatch_rq_list+0x1131/0x1250 [ 308.431915][ T9695] blk_mq_do_dispatch_sched+0x49d/0x7f0 [ 308.437476][ T9695] __blk_mq_sched_dispatch_requests+0x1cd/0x270 [ 308.443738][ T9695] blk_mq_sched_dispatch_requests+0x8f/0xf0 [ 308.449730][ T9695] __blk_mq_run_hw_queue+0x7e/0x100 [ 308.454935][ T9695] blk_mq_run_work_fn+0x3d/0x50 [ 308.459801][ T9695] process_one_work+0x3d3/0x720 [ 308.464661][ T9695] worker_thread+0x618/0xa70 [ 308.469259][ T9695] kthread+0x1a9/0x1e0 [ 308.473331][ T9695] ret_from_fork+0x1f/0x30 [ 308.477755][ T9695] [ 308.480083][ T9695] read to 0xffff888101aef0f8 of 4 bytes by task 9695 on cpu 0: [ 308.487625][ T9695] blk_mq_do_dispatch_sched+0xc9/0x7f0 [ 308.493094][ T9695] __blk_mq_sched_dispatch_requests+0x1cd/0x270 [ 308.499346][ T9695] blk_mq_sched_dispatch_requests+0x8f/0xf0 [ 308.505256][ T9695] __blk_mq_run_hw_queue+0x7e/0x100 [ 308.510469][ T9695] __blk_mq_delay_run_hw_queue+0x15b/0x2e0 [ 308.516287][ T9695] blk_mq_run_hw_queue+0x180/0x320 [ 308.521401][ T9695] blk_mq_sched_insert_requests+0x1cb/0x2a0 [ 308.527310][ T9695] blk_mq_dispatch_plug_list+0x1e9/0x2c0 [ 308.532953][ T9695] blk_mq_flush_plug_list+0x2ea/0x340 [ 308.538326][ T9695] blk_add_rq_to_plug+0x142/0x390 [ 308.543358][ T9695] blk_mq_submit_bio+0x90b/0xe90 [ 308.548300][ T9695] submit_bio_noacct_nocheck+0x83d/0xaa0 [ 308.553935][ T9695] submit_bio_noacct+0x6a5/0x810 [ 308.558960][ T9695] submit_bio+0xfb/0x110 [ 308.563202][ T9695] ext4_io_submit+0x86/0xa0 [ 308.567712][ T9695] ext4_writepages+0xaca/0x1cf0 [ 308.572577][ T9695] do_writepages+0x1db/0x350 [ 308.577172][ T9695] filemap_fdatawrite_wbc+0xd6/0xf0 [ 308.582373][ T9695] filemap_flush+0x93/0xc0 [ 308.586794][ T9695] ext4_alloc_da_blocks+0x47/0x100 [ 308.591913][ T9695] ext4_release_file+0x5b/0x1d0 [ 308.596767][ T9695] __fput+0x245/0x570 [ 308.600758][ T9695] ____fput+0x11/0x20 [ 308.604749][ T9695] task_work_run+0xde/0x110 [ 308.609253][ T9695] do_exit+0x5ad/0x1740 [ 308.613409][ T9695] do_group_exit+0xfe/0x140 [ 308.617919][ T9695] get_signal+0xb40/0xc60 [ 308.622248][ T9695] arch_do_signal_or_restart+0x87/0x2d0 [ 308.627789][ T9695] exit_to_user_mode_loop+0x78/0x130 [ 308.633087][ T9695] exit_to_user_mode_prepare+0x69/0x90 [ 308.638555][ T9695] irqentry_exit_to_user_mode+0x5/0x10 [ 308.644023][ T9695] irqentry_exit+0xe/0x40 [ 308.648362][ T9695] exc_general_protection+0x321/0x4b0 [ 308.653741][ T9695] asm_exc_general_protection+0x22/0x30 [ 308.659294][ T9695] [ 308.661615][ T9695] value changed: 0x00000007 -> 0x00000008 [ 308.667328][ T9695] [ 308.669647][ T9695] Reported by Kernel Concurrency Sanitizer on: [ 308.675787][ T9695] CPU: 0 PID: 9695 Comm: syz-executor.1 Not tainted 6.1.0-rc5-syzkaller-00307-gfe24a97cf254-dirty #0 [ 308.686639][ T9695] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 [ 308.696704][ T9695] ================================================================== 05:15:24 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe1", 0xbb, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:15:24 executing program 2: bpf$BPF_LINK_CREATE_XDP(0x6, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1a, 0x39fb, 0x10001, 0x7ff, 0x2, 0x1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x48) 05:15:24 executing program 5: socketpair(0x0, 0xa, 0x55, &(0x7f00000001c0)) 05:15:24 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = request_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='\x00', 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) socketpair(0x9, 0x2, 0x1ff, &(0x7f0000000240)) keyctl$reject(0x13, r0, 0x42, 0x7, r1) 05:15:24 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) request_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='\x00', 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) socket$l2tp(0x2, 0x2, 0x73) 05:15:24 executing program 3: r0 = bpf$MAP_CREATE(0x5, &(0x7f0000002600), 0x48) pipe2$watch_queue(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000300)={'syztnl1\x00', &(0x7f0000000480)={'gre0\x00', 0x0, 0x47, 0x8, 0x0, 0x0, {{0x2a, 0x4, 0x0, 0x1, 0xa8, 0x68, 0x0, 0x1, 0x2f, 0x0, @loopback, @local, {[@end, @cipso={0x86, 0x26, 0x1, [{0x0, 0x10, "c45bf0f3a5cb3f5ce6c88c037d38"}, {0x2, 0x5, "627c91"}, {0x5, 0x2}, {0x5, 0x9, "a4eeb9886352e9"}]}, @timestamp_addr={0x44, 0xc, 0xd1, 0x1, 0x0, [{@broadcast, 0x6}]}, @timestamp_addr={0x44, 0x24, 0xd7, 0x1, 0x5, [{@remote, 0x7}, {@dev={0xac, 0x14, 0x14, 0x14}, 0x80}, {@local, 0x80000001}, {@empty, 0x9}]}, @cipso={0x86, 0x19, 0x3, [{0x6, 0x7, "4494a3a3b5"}, {0x7, 0xc, "b0a822cc652875de5380"}]}, @timestamp={0x44, 0x14, 0x46, 0x0, 0x5, [0x8000, 0xfffffffd, 0xffffffe0, 0x1]}, @ssrr={0x89, 0xb, 0xc, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @end, @ra={0x94, 0x4, 0x1}]}}}}}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x12, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3f}, [@btf_id={0x18, 0x5, 0x3, 0x0, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x0, 0x2, 0xb, 0x6, 0xfffffffffffffef8, 0xffffffffffffffff}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3e45, 0x0, 0x0, 0x0, 0x400}, @cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffffe}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xffffffffffffffff}, @cb_func={0x18, 0x6, 0x4, 0x0, 0x5}]}, &(0x7f0000000280)='syzkaller\x00', 0x18f84cde, 0x0, 0x0, 0x41100, 0x18, '\x00', r2, 0x0, r1, 0x8, &(0x7f0000000580)={0x2, 0x3}, 0x8, 0x10, &(0x7f00000005c0)={0x0, 0xc, 0x5, 0x35}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000600)=[r0]}, 0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r3) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="c1dcaebc067e25831b6f661d97970709000000008a1700002b0000", @ANYRES32=r0, @ANYBLOB="0000000004000000"], &(0x7f0000000040)='GPL\x00', 0x3, 0x8b, &(0x7f0000000080)=""/139, 0x41100, 0x1, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000140)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0xd, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[r3, r0, 0xffffffffffffffff, r0, r0]}, 0x80) 05:15:24 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) request_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='\x00', 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) socketpair(0x9, 0x2, 0x1ff, &(0x7f0000000240)) 05:15:24 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1a, 0x39fb, 0x10001, 0x7ff, 0x2, 0x1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x48) 05:15:24 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) request_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='\x00', 0x0) socket$l2tp(0x2, 0x2, 0x73) 05:15:24 executing program 5: socketpair(0x0, 0xa, 0x55, &(0x7f00000001c0)) 05:15:24 executing program 3: r0 = bpf$MAP_CREATE(0x5, &(0x7f0000002600), 0x48) pipe2$watch_queue(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000300)={'syztnl1\x00', &(0x7f0000000480)={'gre0\x00', 0x0, 0x47, 0x8, 0x0, 0x0, {{0x2a, 0x4, 0x0, 0x1, 0xa8, 0x68, 0x0, 0x1, 0x2f, 0x0, @loopback, @local, {[@end, @cipso={0x86, 0x26, 0x1, [{0x0, 0x10, "c45bf0f3a5cb3f5ce6c88c037d38"}, {0x2, 0x5, "627c91"}, {0x5, 0x2}, {0x5, 0x9, "a4eeb9886352e9"}]}, @timestamp_addr={0x44, 0xc, 0xd1, 0x1, 0x0, [{@broadcast, 0x6}]}, @timestamp_addr={0x44, 0x24, 0xd7, 0x1, 0x5, [{@remote, 0x7}, {@dev={0xac, 0x14, 0x14, 0x14}, 0x80}, {@local, 0x80000001}, {@empty, 0x9}]}, @cipso={0x86, 0x19, 0x3, [{0x6, 0x7, "4494a3a3b5"}, {0x7, 0xc, "b0a822cc652875de5380"}]}, @timestamp={0x44, 0x14, 0x46, 0x0, 0x5, [0x8000, 0xfffffffd, 0xffffffe0, 0x1]}, @ssrr={0x89, 0xb, 0xc, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @end, @ra={0x94, 0x4, 0x1}]}}}}}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x12, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3f}, [@btf_id={0x18, 0x5, 0x3, 0x0, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x0, 0x2, 0xb, 0x6, 0xfffffffffffffef8, 0xffffffffffffffff}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3e45, 0x0, 0x0, 0x0, 0x400}, @cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffffe}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xffffffffffffffff}, @cb_func={0x18, 0x6, 0x4, 0x0, 0x5}]}, &(0x7f0000000280)='syzkaller\x00', 0x18f84cde, 0x0, 0x0, 0x41100, 0x18, '\x00', r2, 0x0, r1, 0x8, &(0x7f0000000580)={0x2, 0x3}, 0x8, 0x10, &(0x7f00000005c0)={0x0, 0xc, 0x5, 0x35}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000600)=[r0]}, 0x80) pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="c1dcaebc067e25831b6f661d97970709000000008a1700002b0000", @ANYRES32=r0, @ANYBLOB="0000000004000000"], &(0x7f0000000040)='GPL\x00', 0x3, 0x8b, &(0x7f0000000080)=""/139, 0x41100, 0x1, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000140)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0xd, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[r3, r0, 0xffffffffffffffff, r0, r0]}, 0x80) 05:15:24 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) request_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='\x00', 0x0) socketpair(0x9, 0x2, 0x1ff, &(0x7f0000000240)) 05:15:25 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, 0x0, &(0x7f0000000100), &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:15:25 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) 05:15:25 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) socket$l2tp(0x2, 0x2, 0x73) 05:15:25 executing program 0: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) socketpair(0x9, 0x2, 0x1ff, &(0x7f0000000240)) 05:15:25 executing program 5: socketpair(0x2c, 0x0, 0x55, &(0x7f00000001c0)) 05:15:25 executing program 3: r0 = bpf$MAP_CREATE(0x5, &(0x7f0000002600), 0x48) pipe2$watch_queue(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000300)={'syztnl1\x00', &(0x7f0000000480)={'gre0\x00', 0x0, 0x47, 0x8, 0x0, 0x0, {{0x2a, 0x4, 0x0, 0x1, 0xa8, 0x68, 0x0, 0x1, 0x2f, 0x0, @loopback, @local, {[@end, @cipso={0x86, 0x26, 0x1, [{0x0, 0x10, "c45bf0f3a5cb3f5ce6c88c037d38"}, {0x2, 0x5, "627c91"}, {0x5, 0x2}, {0x5, 0x9, "a4eeb9886352e9"}]}, @timestamp_addr={0x44, 0xc, 0xd1, 0x1, 0x0, [{@broadcast, 0x6}]}, @timestamp_addr={0x44, 0x24, 0xd7, 0x1, 0x5, [{@remote, 0x7}, {@dev={0xac, 0x14, 0x14, 0x14}, 0x80}, {@local, 0x80000001}, {@empty, 0x9}]}, @cipso={0x86, 0x19, 0x3, [{0x6, 0x7, "4494a3a3b5"}, {0x7, 0xc, "b0a822cc652875de5380"}]}, @timestamp={0x44, 0x14, 0x46, 0x0, 0x5, [0x8000, 0xfffffffd, 0xffffffe0, 0x1]}, @ssrr={0x89, 0xb, 0xc, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @end, @ra={0x94, 0x4, 0x1}]}}}}}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x12, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3f}, [@btf_id={0x18, 0x5, 0x3, 0x0, 0x4}, @btf_id={0x18, 0x0, 0x3, 0x0, 0x5}, @jmp={0x5, 0x0, 0x2, 0xb, 0x6, 0xfffffffffffffef8, 0xffffffffffffffff}, @btf_id={0x18, 0xb, 0x3, 0x0, 0x5}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3e45, 0x0, 0x0, 0x0, 0x400}, @cb_func={0x18, 0xa, 0x4, 0x0, 0xfffffffffffffffe}, @cb_func={0x18, 0x2, 0x4, 0x0, 0xffffffffffffffff}, @cb_func={0x18, 0x6, 0x4, 0x0, 0x5}]}, &(0x7f0000000280)='syzkaller\x00', 0x18f84cde, 0x0, 0x0, 0x41100, 0x18, '\x00', r2, 0x0, r1, 0x8, &(0x7f0000000580)={0x2, 0x3}, 0x8, 0x10, &(0x7f00000005c0)={0x0, 0xc, 0x5, 0x35}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000600)=[r0]}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="c1dcaebc067e25831b6f661d97970709000000008a1700002b0000", @ANYRES32=r0, @ANYBLOB="0000000004000000"], &(0x7f0000000040)='GPL\x00', 0x3, 0x8b, &(0x7f0000000080)=""/139, 0x41100, 0x1, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000140)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0xd, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0]}, 0x80) 05:15:25 executing program 5: socketpair(0x2c, 0x0, 0x0, &(0x7f00000001c0)) 05:15:25 executing program 0: socketpair(0x9, 0x2, 0x1ff, &(0x7f0000000240)) 05:15:25 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) 05:15:25 executing program 4: socket$l2tp(0x2, 0x2, 0x73) 05:15:25 executing program 0: socketpair(0x0, 0x2, 0x1ff, &(0x7f0000000240)) 05:15:25 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) 05:15:25 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:15:25 executing program 3: r0 = bpf$MAP_CREATE(0x5, &(0x7f0000002600), 0x48) pipe2$watch_queue(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r1) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r1, 0x89f3, &(0x7f0000000300)={'syztnl1\x00', &(0x7f0000000480)={'gre0\x00', 0x0, 0x47, 0x8, 0x0, 0x0, {{0x2a, 0x4, 0x0, 0x1, 0xa8, 0x68, 0x0, 0x1, 0x2f, 0x0, @loopback, @local, {[@end, @cipso={0x86, 0x26, 0x1, [{0x0, 0x10, "c45bf0f3a5cb3f5ce6c88c037d38"}, {0x2, 0x5, "627c91"}, {0x5, 0x2}, {0x5, 0x9, "a4eeb9886352e9"}]}, @timestamp_addr={0x44, 0xc, 0xd1, 0x1, 0x0, [{@broadcast, 0x6}]}, @timestamp_addr={0x44, 0x24, 0xd7, 0x1, 0x5, [{@remote, 0x7}, {@dev={0xac, 0x14, 0x14, 0x14}, 0x80}, {@local, 0x80000001}, {@empty, 0x9}]}, @cipso={0x86, 0x19, 0x3, [{0x6, 0x7, "4494a3a3b5"}, {0x7, 0xc, "b0a822cc652875de5380"}]}, @timestamp={0x44, 0x14, 0x46, 0x0, 0x5, [0x8000, 0xfffffffd, 0xffffffe0, 0x1]}, @ssrr={0x89, 0xb, 0xc, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @end, @ra={0x94, 0x4, 0x1}]}}}}}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="c1dcaebc067e25831b6f661d97970709000000008a1700002b0000", @ANYRES32=r0, @ANYBLOB="0000000004000000"], &(0x7f0000000040)='GPL\x00', 0x3, 0x8b, &(0x7f0000000080)=""/139, 0x41100, 0x1, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000140)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0xd, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0]}, 0x80) 05:15:25 executing program 5: socketpair(0x2c, 0x0, 0x0, 0x0) 05:15:25 executing program 4: r0 = bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r1 = request_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='\x00', 0x0) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) socketpair(0x9, 0x2, 0x1ff, &(0x7f0000000240)) keyctl$reject(0x13, r1, 0x42, 0x7, r2) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140)="12f1d733f59103cff8777d006360f1419176093e5c77f6", &(0x7f0000000180)=@buf="382d61a70ceff1ebf446ce135876ef59048bd6fde3022028fe6d2c4302f23b5b29f26609cf9e13abc6e7a85d69cf1606c8705b72e4032a9dc9087a534d64e0f15b4db6e68c93187662cbd406118314efa59ec072337f961e097de19997112b1c6d8b8f68f2af0146d1a69a5b488b541c20e5cacb02f19e52", 0x2}, 0x20) socket$l2tp(0x2, 0x2, 0x73) 05:15:25 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x39fb, 0x10001, 0x7ff, 0x2, 0x1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x48) 05:15:25 executing program 0: socketpair(0x0, 0x2, 0x1ff, &(0x7f0000000240)) 05:15:25 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x39fb, 0x10001, 0x7ff, 0x2, 0x1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x48) 05:15:25 executing program 3: r0 = bpf$MAP_CREATE(0x5, &(0x7f0000002600), 0x48) pipe2$watch_queue(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="c1dcaebc067e25831b6f661d97970709000000008a1700002b0000", @ANYRES32=r0, @ANYBLOB="0000000004000000"], &(0x7f0000000040)='GPL\x00', 0x3, 0x8b, &(0x7f0000000080)=""/139, 0x41100, 0x1, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000140)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0xd, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0]}, 0x80) 05:15:25 executing program 4: r0 = bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r1 = request_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='\x00', 0x0) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) socketpair(0x9, 0x2, 0x1ff, &(0x7f0000000240)) keyctl$reject(0x13, r1, 0x42, 0x7, r2) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140)="12f1d733f59103cff8777d006360f1419176093e5c77f6", &(0x7f0000000180)=@buf="382d61a70ceff1ebf446ce135876ef59048bd6fde3022028fe6d2c4302f23b5b29f26609cf9e13abc6e7a85d69cf1606c8705b72e4032a9dc9087a534d64e0f15b4db6e68c93187662cbd406118314efa59ec072337f961e097de19997112b1c6d8b8f68f2af0146d1a69a5b488b541c20e5cacb02f19e52", 0x2}, 0x20) socket$l2tp(0x2, 0x2, 0x73) 05:15:25 executing program 5: socketpair(0x2c, 0x0, 0x0, 0x0) 05:15:25 executing program 3: r0 = bpf$MAP_CREATE(0x5, &(0x7f0000002600), 0x48) pipe2$watch_queue(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="c1dcaebc067e25831b6f661d97970709000000008a1700002b0000", @ANYRES32=r0, @ANYBLOB="0000000004000000"], &(0x7f0000000040)='GPL\x00', 0x3, 0x8b, &(0x7f0000000080)=""/139, 0x41100, 0x1, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f0000000140)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0xd, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0]}, 0x80) 05:15:25 executing program 0: socketpair(0x0, 0x2, 0x1ff, &(0x7f0000000240)) 05:15:25 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:15:25 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x39fb, 0x10001, 0x7ff, 0x2, 0x1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x48) 05:15:25 executing program 4: r0 = bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r1 = request_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='\x00', 0x0) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) socketpair(0x9, 0x2, 0x1ff, &(0x7f0000000240)) keyctl$reject(0x13, r1, 0x42, 0x7, r2) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140)="12f1d733f59103cff8777d006360f1419176093e5c77f6", &(0x7f0000000180)=@buf="382d61a70ceff1ebf446ce135876ef59048bd6fde3022028fe6d2c4302f23b5b29f26609cf9e13abc6e7a85d69cf1606c8705b72e4032a9dc9087a534d64e0f15b4db6e68c93187662cbd406118314efa59ec072337f961e097de19997112b1c6d8b8f68f2af0146d1a69a5b488b541c20e5cacb02f19e52", 0x2}, 0x20) socket$l2tp(0x2, 0x2, 0x73) 05:15:25 executing program 5: socketpair(0x2c, 0x0, 0x0, 0x0) 05:15:25 executing program 3: r0 = bpf$MAP_CREATE(0x5, &(0x7f0000002600), 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="c1dcaebc067e25831b6f661d97970709000000008a1700002b0000", @ANYRES32=r0, @ANYBLOB="0000000004000000"], &(0x7f0000000040)='GPL\x00', 0x3, 0x8b, &(0x7f0000000080)=""/139, 0x41100, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0xd, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, r0, 0xffffffffffffffff, r0, r0]}, 0x80) 05:15:25 executing program 0: socketpair(0x9, 0x0, 0x1ff, &(0x7f0000000240)) 05:15:25 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1a, 0x0, 0x10001, 0x7ff, 0x2, 0x1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x48) 05:15:25 executing program 4: r0 = bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r1 = request_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='\x00', 0x0) r2 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) socketpair(0x9, 0x2, 0x1ff, &(0x7f0000000240)) keyctl$reject(0x13, r1, 0x42, 0x7, r2) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000200)={r0, &(0x7f0000000140)="12f1d733f59103cff8777d006360f1419176093e5c77f6", &(0x7f0000000180)=@buf="382d61a70ceff1ebf446ce135876ef59048bd6fde3022028fe6d2c4302f23b5b29f26609cf9e13abc6e7a85d69cf1606c8705b72e4032a9dc9087a534d64e0f15b4db6e68c93187662cbd406118314efa59ec072337f961e097de19997112b1c6d8b8f68f2af0146d1a69a5b488b541c20e5cacb02f19e52", 0x2}, 0x20) 05:15:25 executing program 5: ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) request_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='\x00', 0xfffffffffffffff8) 05:15:25 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="c1dcaebc067e25831b6f661d97970709000000008a1700002b0000", @ANYRES32, @ANYBLOB="0000000004000000"], &(0x7f0000000040)='GPL\x00', 0x3, 0x8b, &(0x7f0000000080)=""/139, 0x41100, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0xd, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:25 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = request_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='\x00', 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) socketpair(0x9, 0x2, 0x1ff, &(0x7f0000000240)) keyctl$reject(0x13, r0, 0x42, 0x7, r1) 05:15:25 executing program 0: socketpair(0x9, 0x0, 0x0, &(0x7f0000000240)) 05:15:26 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, 0x0, 0x0, &(0x7f0000000140)="b422970c4229114ff208a681373911f70c5e810e6cdb946ae460ee3f47afb3e2eb270fce243677b89a5d18262a61bf8d5d20c7ff8600767a6fc07ad9df63409677c05a58bb765ea9d5d474e9481752caaf77b3ce4a2aec78aef788c395d2b8e61f46beea33d1bf96ba1beae2893f36591832bbf6ce00912f8fa1dbc0880c49cfca4b2bc5285604d1599a") 05:15:26 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1a, 0x0, 0x0, 0x7ff, 0x2, 0x1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x48) 05:15:26 executing program 5: ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) request_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='\x00', 0xfffffffffffffff8) 05:15:26 executing program 0: socketpair(0x9, 0x0, 0x0, 0x0) 05:15:26 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) request_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='\x00', 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) socketpair(0x9, 0x2, 0x1ff, &(0x7f0000000240)) 05:15:26 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 05:15:26 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) request_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='\x00', 0x0) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) 05:15:26 executing program 0: socketpair(0x9, 0x0, 0x0, 0x0) 05:15:26 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1a, 0x0, 0x0, 0x0, 0x2, 0x1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x48) 05:15:26 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 05:15:26 executing program 5: ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) request_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='\x00', 0xfffffffffffffff8) 05:15:26 executing program 4: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) 05:15:26 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, 0x0, &(0x7f0000000100), 0x0) 05:15:26 executing program 0: socketpair(0x9, 0x0, 0x0, 0x0) 05:15:26 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 05:15:26 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x48) 05:15:26 executing program 4: add_key$keyring(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) 05:15:26 executing program 5: request_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='\x00', 0xfffffffffffffff8) 05:15:26 executing program 0: rt_sigsuspend(&(0x7f0000000000)={[0x2]}, 0x8) bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) r1 = request_key(&(0x7f0000000140)='asymmetric\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='.\x00', 0x0) keyctl$negate(0xd, r1, 0x9, 0xfffffffffffffffc) sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x200, 0x70bd2a, 0x25dfdbfd, {}, [@FOU_ATTR_IPPROTO={0x5, 0x3, 0x2c}, @FOU_ATTR_PEER_V4={0x8, 0x8, @local}]}, 0x24}, 0x1, 0x0, 0x0, 0x4004}, 0x20000000) 05:15:26 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x48) 05:15:26 executing program 5: request_key(0x0, &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='\x00', 0xfffffffffffffff8) 05:15:26 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="c1dcaebc067e25831b6f661d97970709000000008a1700002b0000", @ANYRES32, @ANYBLOB="0000000004000000"], &(0x7f0000000040)='GPL\x00', 0x3, 0x8b, &(0x7f0000000080)=""/139, 0x41100, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0xd, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:26 executing program 4: add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) 05:15:26 executing program 5: request_key(0x0, &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='\x00', 0xfffffffffffffff8) 05:15:26 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, 0x0, &(0x7f0000000100), 0x0) 05:15:26 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x2}, 0x48) 05:15:26 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="c1dcaebc067e25831b6f661d97970709000000008a1700002b0000", @ANYRES32, @ANYBLOB="0000000004000000"], &(0x7f0000000040)='GPL\x00', 0x3, 0x8b, &(0x7f0000000080)=""/139, 0x41100, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0xd, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:26 executing program 4: add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) 05:15:26 executing program 5: request_key(0x0, &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='\x00', 0xfffffffffffffff8) 05:15:26 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x2}, 0x48) [ 310.986952][ T9695] syz-executor.1 (9695) used greatest stack depth: 9448 bytes left 05:15:27 executing program 0: rt_sigsuspend(&(0x7f0000000000)={[0x2]}, 0x8) bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) r1 = request_key(&(0x7f0000000140)='asymmetric\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='.\x00', 0x0) keyctl$negate(0xd, r1, 0x9, 0xfffffffffffffffc) sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x200, 0x70bd2a, 0x25dfdbfd, {}, [@FOU_ATTR_IPPROTO={0x5, 0x3, 0x2c}, @FOU_ATTR_PEER_V4={0x8, 0x8, @local}]}, 0x24}, 0x1, 0x0, 0x0, 0x4004}, 0x20000000) 05:15:27 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="c1dcaebc067e25831b6f661d97970709000000008a1700002b0000", @ANYRES32, @ANYBLOB="0000000004000000"], &(0x7f0000000040)='GPL\x00', 0x3, 0x8b, &(0x7f0000000080)=""/139, 0x41100, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0xd, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:27 executing program 4: add_key$keyring(0x0, &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) 05:15:27 executing program 5: request_key(&(0x7f0000000000)='big_key\x00', 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff8) 05:15:27 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x2}, 0x48) 05:15:27 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, 0x0, &(0x7f0000000100), 0x0) 05:15:27 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, 0x0, &(0x7f0000000040)='GPL\x00', 0x3, 0x8b, &(0x7f0000000080)=""/139, 0x41100, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0xd, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:27 executing program 5: request_key(&(0x7f0000000000)='big_key\x00', 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff8) 05:15:27 executing program 4: add_key$keyring(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0xfffffffffffffffa) 05:15:27 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x2}, 0x48) 05:15:27 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x2}, 0x48) 05:15:27 executing program 5: request_key(&(0x7f0000000000)='big_key\x00', 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffff8) 05:15:28 executing program 0: rt_sigsuspend(&(0x7f0000000000)={[0x2]}, 0x8) bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) r1 = request_key(&(0x7f0000000140)='asymmetric\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='.\x00', 0x0) keyctl$negate(0xd, r1, 0x9, 0xfffffffffffffffc) sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x200, 0x70bd2a, 0x25dfdbfd, {}, [@FOU_ATTR_IPPROTO={0x5, 0x3, 0x2c}, @FOU_ATTR_PEER_V4={0x8, 0x8, @local}]}, 0x24}, 0x1, 0x0, 0x0, 0x4004}, 0x20000000) 05:15:28 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x2}, 0x48) 05:15:28 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, 0x0, &(0x7f0000000040)='GPL\x00', 0x3, 0x8b, &(0x7f0000000080)=""/139, 0x41100, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0xd, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:28 executing program 5: request_key(&(0x7f0000000000)='big_key\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0xfffffffffffffff8) 05:15:28 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) 05:15:28 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, 0x0, &(0x7f0000000100), &(0x7f0000000140)) 05:15:28 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x2}, 0x48) 05:15:28 executing program 5: rt_sigsuspend(&(0x7f0000000000)={[0x2]}, 0x8) bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) r1 = request_key(&(0x7f0000000140)='asymmetric\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='.\x00', 0x0) keyctl$negate(0xd, r1, 0x9, 0xfffffffffffffffc) sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x200, 0x70bd2a, 0x25dfdbfd, {}, [@FOU_ATTR_IPPROTO={0x5, 0x3, 0x2c}, @FOU_ATTR_PEER_V4={0x8, 0x8, @local}]}, 0x24}, 0x1, 0x0, 0x0, 0x4004}, 0x20000000) 05:15:28 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, 0x0, &(0x7f0000000040)='GPL\x00', 0x3, 0x8b, &(0x7f0000000080)=""/139, 0x41100, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0xd, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:28 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) 05:15:28 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) 05:15:28 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) 05:15:29 executing program 0: rt_sigsuspend(&(0x7f0000000000)={[0x2]}, 0x8) bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) r1 = request_key(&(0x7f0000000140)='asymmetric\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='.\x00', 0x0) keyctl$negate(0xd, r1, 0x9, 0xfffffffffffffffc) 05:15:29 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="c1dcaebc067e25831b6f661d97970709000000008a1700002b0000", @ANYRES32], &(0x7f0000000040)='GPL\x00', 0x3, 0x8b, &(0x7f0000000080)=""/139, 0x41100, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0xd, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:29 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) 05:15:29 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) 05:15:29 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, 0x0, &(0x7f0000000100), &(0x7f0000000140)) 05:15:29 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="c1dcaebc067e25831b6f661d97970709000000008a1700002b0000"], &(0x7f0000000040)='GPL\x00', 0x3, 0x8b, &(0x7f0000000080)=""/139, 0x41100, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0xd, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:29 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x2}, 0x48) 05:15:29 executing program 5: rt_sigsuspend(&(0x7f0000000000)={[0x2]}, 0x8) bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) r1 = request_key(&(0x7f0000000140)='asymmetric\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='.\x00', 0x0) keyctl$negate(0xd, r1, 0x9, 0xfffffffffffffffc) sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x200, 0x70bd2a, 0x25dfdbfd, {}, [@FOU_ATTR_IPPROTO={0x5, 0x3, 0x2c}, @FOU_ATTR_PEER_V4={0x8, 0x8, @local}]}, 0x24}, 0x1, 0x0, 0x0, 0x4004}, 0x20000000) 05:15:29 executing program 2: bpf$MAP_CREATE(0x4, &(0x7f0000002600), 0x48) io_uring_setup(0x7b6e, &(0x7f0000000000)={0x0, 0xb4e7, 0x80, 0x2, 0x332}) 05:15:29 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000006c0)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x3, 0x8b, &(0x7f0000000080)=""/139, 0x41100, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0xd, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:29 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x2}, 0x48) 05:15:29 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000002600)=@base={0x0, 0x0, 0x0, 0x0, 0x1246, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, 0x48) 05:15:30 executing program 0: rt_sigsuspend(&(0x7f0000000000)={[0x2]}, 0x8) bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) request_key(&(0x7f0000000140)='asymmetric\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='.\x00', 0x0) 05:15:30 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000006c0)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x3, 0x8b, &(0x7f0000000080)=""/139, 0x41100, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0xd, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:30 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000002600)=@base={0x0, 0x0, 0x0, 0x0, 0x1246, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, 0x48) 05:15:30 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x2}, 0x48) 05:15:30 executing program 1: bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) getpgrp(0x0) syz_clone(0x8082200, &(0x7f0000000000)="52c308a5bf527a12c3f42d88680642420d519cef671988721306483cec69f756e8423af65208a4f0d5dd18dcab4b95338a6120842e120787bc6e00cdea47b2193e952e15993b9c4cbf440b1e1370ee175bc896c50575057d52906ff4e14315cb6bd2fc911171281f0e12a572890e8ed1d60b1bfd86a410b609ab7ba026419b6fc45974959899670c09ebb521ee7b0d77427e9f2b4da1a1fd8284f68abfc55d876f77c37b038ca8dda604be9939adeb45ad49f935e56cb9a6236fe178", 0xbc, 0x0, &(0x7f0000000100), &(0x7f0000000140)) 05:15:30 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000002600)=@base={0x0, 0x0, 0x0, 0x0, 0x1246, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, 0x48) 05:15:30 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000006c0)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x3, 0x8b, &(0x7f0000000080)=""/139, 0x41100, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0xd, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:30 executing program 5: rt_sigsuspend(&(0x7f0000000000)={[0x2]}, 0x8) bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) r1 = request_key(&(0x7f0000000140)='asymmetric\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='.\x00', 0x0) keyctl$negate(0xd, r1, 0x9, 0xfffffffffffffffc) sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000100)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, 0x0, 0x200, 0x70bd2a, 0x25dfdbfd, {}, [@FOU_ATTR_IPPROTO={0x5, 0x3, 0x2c}, @FOU_ATTR_PEER_V4={0x8, 0x8, @local}]}, 0x24}, 0x1, 0x0, 0x0, 0x4004}, 0x20000000) 05:15:30 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) 05:15:30 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x3, 0x8b, &(0x7f0000000080)=""/139, 0x41100, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0xd, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:30 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) 05:15:30 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) 05:15:30 executing program 0: rt_sigsuspend(&(0x7f0000000000)={[0x2]}, 0x8) bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) socket$nl_generic(0x10, 0x3, 0x10) request_key(&(0x7f0000000140)='asymmetric\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='.\x00', 0x0) 05:15:30 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x3, 0x8b, &(0x7f0000000080)=""/139, 0x41100, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0xd, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:30 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) 05:15:30 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) 05:15:30 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) 05:15:30 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x3, 0x8b, &(0x7f0000000080)=""/139, 0x41100, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0xd, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:30 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) 05:15:30 executing program 5: rt_sigsuspend(&(0x7f0000000000)={[0x2]}, 0x8) bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) r1 = request_key(&(0x7f0000000140)='asymmetric\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='.\x00', 0x0) keyctl$negate(0xd, r1, 0x9, 0xfffffffffffffffc) 05:15:30 executing program 2: bpf$MAP_CREATE(0x0, 0x0, 0x0) 05:15:30 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="c1dcaebc067e25831b6f661d9797"], &(0x7f0000000040)='GPL\x00', 0x3, 0x8b, &(0x7f0000000080)=""/139, 0x41100, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0xd, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:30 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000002600)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, 0x48) 05:15:30 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) 05:15:31 executing program 0: rt_sigsuspend(&(0x7f0000000000)={[0x2]}, 0x8) bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) request_key(&(0x7f0000000140)='asymmetric\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='.\x00', 0x0) 05:15:31 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) 05:15:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="c1"], &(0x7f0000000040)='GPL\x00', 0x3, 0x8b, &(0x7f0000000080)=""/139, 0x41100, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0xd, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:31 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) 05:15:31 executing program 2: rt_sigsuspend(&(0x7f0000000000)={[0x2]}, 0x8) bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) r1 = request_key(&(0x7f0000000140)='asymmetric\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='.\x00', 0x0) keyctl$negate(0xd, r1, 0x9, 0xfffffffffffffffc) 05:15:31 executing program 5: rt_sigsuspend(&(0x7f0000000000)={[0x2]}, 0x8) bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) request_key(&(0x7f0000000140)='asymmetric\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='.\x00', 0x0) 05:15:31 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) 05:15:31 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) 05:15:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x3, 0x8b, &(0x7f0000000080)=""/139, 0x41100, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0xd, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:31 executing program 4: keyctl$chown(0x4, 0x0, 0xee01, 0x0) r0 = request_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='@@(\'[\x00', 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f00000000c0)={r0, 0x81, 0x57}, 0x0, &(0x7f0000000100)="8c782c3b62eb159b4a5b0776fb9d3f2ad8f6115080692bbd261b4db3590813fff601f3b264080d7163fa89b8640ea5c942f1ef072cd49b4f34566fd80ca1ddf4089dd3ca3339a9a5053e4326d918d53f26f729e4fb4a29a06931f75fb16d8ecc52ac436430f4e73111ab60a26c7b4905b8e732b4f974adefde27f08e06bb3c4928", &(0x7f00000001c0)=""/87) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$search(0xa, r1, &(0x7f00000002c0)='pkcs7_test\x00', &(0x7f0000000300)={'syz', 0x2}, r0) bpf$BPF_LINK_CREATE_XDP(0x3, 0x0, 0x0) 05:15:31 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) 05:15:31 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x3, 0x8b, &(0x7f0000000080)=""/139, 0x41100, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0xd, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:32 executing program 0: rt_sigsuspend(&(0x7f0000000000)={[0x2]}, 0x8) request_key(&(0x7f0000000140)='asymmetric\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='.\x00', 0x0) 05:15:32 executing program 4: keyctl$chown(0x4, 0x0, 0xee01, 0x0) r0 = request_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='@@(\'[\x00', 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f00000000c0)={r0, 0x81, 0x57}, 0x0, &(0x7f0000000100)="8c782c3b62eb159b4a5b0776fb9d3f2ad8f6115080692bbd261b4db3590813fff601f3b264080d7163fa89b8640ea5c942f1ef072cd49b4f34566fd80ca1ddf4089dd3ca3339a9a5053e4326d918d53f26f729e4fb4a29a06931f75fb16d8ecc52ac436430f4e73111ab60a26c7b4905b8e732b4f974adefde27f08e06bb3c4928", &(0x7f00000001c0)=""/87) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$search(0xa, r1, &(0x7f00000002c0)='pkcs7_test\x00', &(0x7f0000000300)={'syz', 0x2}, r0) bpf$BPF_LINK_CREATE_XDP(0x3, 0x0, 0x0) 05:15:32 executing program 1: bpf$MAP_CREATE(0x0, 0x0, 0x0) 05:15:32 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x3, 0x8b, &(0x7f0000000080)=""/139, 0x41100, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0xd, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:32 executing program 2: rt_sigsuspend(&(0x7f0000000000)={[0x2]}, 0x8) bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) r1 = request_key(&(0x7f0000000140)='asymmetric\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='.\x00', 0x0) keyctl$negate(0xd, r1, 0x9, 0xfffffffffffffffc) 05:15:32 executing program 5: rt_sigsuspend(&(0x7f0000000000)={[0x2]}, 0x8) bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) 05:15:32 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) 05:15:32 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="c1"], 0x0, 0x3, 0x8b, &(0x7f0000000080)=""/139, 0x41100, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0xd, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:32 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) 05:15:32 executing program 4: keyctl$chown(0x4, 0x0, 0xee01, 0x0) r0 = request_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='@@(\'[\x00', 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f00000000c0)={r0, 0x81, 0x57}, 0x0, &(0x7f0000000100)="8c782c3b62eb159b4a5b0776fb9d3f2ad8f6115080692bbd261b4db3590813fff601f3b264080d7163fa89b8640ea5c942f1ef072cd49b4f34566fd80ca1ddf4089dd3ca3339a9a5053e4326d918d53f26f729e4fb4a29a06931f75fb16d8ecc52ac436430f4e73111ab60a26c7b4905b8e732b4f974adefde27f08e06bb3c4928", &(0x7f00000001c0)=""/87) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$search(0xa, r1, &(0x7f00000002c0)='pkcs7_test\x00', &(0x7f0000000300)={'syz', 0x2}, r0) bpf$BPF_LINK_CREATE_XDP(0x3, 0x0, 0x0) 05:15:32 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x48) 05:15:32 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="c1"], 0x0, 0x3, 0x8b, &(0x7f0000000080)=""/139, 0x41100, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0xd, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:33 executing program 0: request_key(&(0x7f0000000140)='asymmetric\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='.\x00', 0x0) 05:15:33 executing program 4: keyctl$chown(0x4, 0x0, 0xee01, 0x0) r0 = request_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='@@(\'[\x00', 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f00000000c0)={r0, 0x81, 0x57}, 0x0, &(0x7f0000000100)="8c782c3b62eb159b4a5b0776fb9d3f2ad8f6115080692bbd261b4db3590813fff601f3b264080d7163fa89b8640ea5c942f1ef072cd49b4f34566fd80ca1ddf4089dd3ca3339a9a5053e4326d918d53f26f729e4fb4a29a06931f75fb16d8ecc52ac436430f4e73111ab60a26c7b4905b8e732b4f974adefde27f08e06bb3c4928", &(0x7f00000001c0)=""/87) r1 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$search(0xa, r1, &(0x7f00000002c0)='pkcs7_test\x00', &(0x7f0000000300)={'syz', 0x2}, r0) 05:15:33 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 05:15:33 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="c1"], 0x0, 0x3, 0x8b, &(0x7f0000000080)=""/139, 0x41100, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0xd, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:33 executing program 2: rt_sigsuspend(&(0x7f0000000000)={[0x2]}, 0x8) bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) r1 = request_key(&(0x7f0000000140)='asymmetric\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='.\x00', 0x0) keyctl$negate(0xd, r1, 0x9, 0xfffffffffffffffc) 05:15:33 executing program 5: rt_sigsuspend(&(0x7f0000000000)={[0x2]}, 0x8) bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) socket$nl_generic(0x10, 0x3, 0x10) 05:15:33 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="c1"], &(0x7f0000000040)='GPL\x00', 0x0, 0x8b, &(0x7f0000000080)=""/139, 0x41100, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0xd, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:33 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 05:15:33 executing program 4: keyctl$chown(0x4, 0x0, 0xee01, 0x0) r0 = request_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='@@(\'[\x00', 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f00000000c0)={r0, 0x81, 0x57}, 0x0, &(0x7f0000000100)="8c782c3b62eb159b4a5b0776fb9d3f2ad8f6115080692bbd261b4db3590813fff601f3b264080d7163fa89b8640ea5c942f1ef072cd49b4f34566fd80ca1ddf4089dd3ca3339a9a5053e4326d918d53f26f729e4fb4a29a06931f75fb16d8ecc52ac436430f4e73111ab60a26c7b4905b8e732b4f974adefde27f08e06bb3c4928", &(0x7f00000001c0)=""/87) add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x1}, 0x0, 0x0, r0) 05:15:33 executing program 0: request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='.\x00', 0x0) 05:15:33 executing program 0: request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='.\x00', 0x0) 05:15:33 executing program 0: request_key(0x0, &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='.\x00', 0x0) 05:15:33 executing program 4: keyctl$chown(0x4, 0x0, 0xee01, 0x0) r0 = request_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)='@@(\'[\x00', 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f00000000c0)={r0, 0x81, 0x57}, 0x0, &(0x7f0000000100)="8c782c3b62eb159b4a5b0776fb9d3f2ad8f6115080692bbd261b4db3590813fff601f3b264080d7163fa89b8640ea5c942f1ef072cd49b4f34566fd80ca1ddf4089dd3ca3339a9a5053e4326d918d53f26f729e4fb4a29a06931f75fb16d8ecc52ac436430f4e73111ab60a26c7b4905b8e732b4f974adefde27f08e06bb3c4928", &(0x7f00000001c0)=""/87) 05:15:33 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="c1"], &(0x7f0000000040)='GPL\x00', 0x0, 0x8b, &(0x7f0000000080)=""/139, 0x41100, 0x1, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x1, 0x5}, 0x8, 0x10, &(0x7f0000000180)={0x5, 0xd, 0x10001}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, 0x80) 05:15:33 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x1a, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x48) 05:15:33 executing program 1: pipe2$watch_queue(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) syz_genetlink_get_family_id$wireguard(&(0x7f0000000340), r0) write$P9_RREADDIR(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="6800000029020035ea6a0655abb69e054084a4cedc834a4a0000001004000000060000000000000000000080000000007f07002e2f66696c65300201000000020000000000000000000000010000001407002e2f66696c653004010000000200000000000000039817d0da6327957a480cbbab000000000000002007002e2f66696c653034fccdacb53c20a48a29f2fa1dc349e11a4afc3af569926ab2c9326f6f43a7b81f961dff286b309ff0cb79be9dc7ddf27b5fd49c41b07b7d23a109b09dfa89ace6f5b28d772e88601792a4b7e5a659e24d4f062004ef817540b5d6e1ce0133c0bd18e3c2005ff7f82d2fd5cb56bd5a6e"], 0x68) r1 = request_key(&(0x7f0000000000)='.request_key_auth\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)='$+#-\xd4\xe3$\'\x00', 0xfffffffffffffff8) request_key(&(0x7f0000000140)='.request_key_auth\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f0000000280)='syz', r1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000000c0)='ceph\x00', &(0x7f00000002c0)=@keyring={'key_or_keyring:', r1}) bpf$MAP_CREATE(0x4, &(0x7f0000002600)=@bloom_filter={0x1e, 0x7fff, 0x80000001, 0x4d2e, 0x108, r0, 0x9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3, 0x0, 0xa}, 0x48) request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000240)='\x00', 0xfffffffffffffffb) 05:15:34 executing program 2: rt_sigsuspend(&(0x7f0000000000)={[0x2]}, 0x8) bpf$MAP_CREATE(0x3, &(0x7f0000002600), 0x48) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f0000004800)={0x0, 0x0, &(0x7f00000047c0)={0x0}}, 0x8005) request_key(&(0x7f0000000140)='asymmetric\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)='.\x00', 0x0)